Showing 1 - 10 of 1,623
Persistent link: https://www.econbiz.de/10014342972
Persistent link: https://www.econbiz.de/10014282060
perspective, cyber-securitization is only legitimate if it serves to protect critical infrastructure. Whilst Floyd’s JST focuses …The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat … construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just …
Persistent link: https://www.econbiz.de/10014262972
translates the fundamental building blocks of data privacy and (cyber)security law into basic knowledge that is equally …
Persistent link: https://www.econbiz.de/10012814665
Persistent link: https://www.econbiz.de/10013500599
Persistent link: https://www.econbiz.de/10012204484
Persistent link: https://www.econbiz.de/10011915569
Persistent link: https://www.econbiz.de/10012252799
Persistent link: https://www.econbiz.de/10012016108
We model how a cyber attack may be amplified through the U.S. financial system, focusing on the wholesale payments …
Persistent link: https://www.econbiz.de/10012161511