Showing 1 - 10 of 43,018
Persistent link: https://www.econbiz.de/10014342972
Persistent link: https://www.econbiz.de/10014282060
perspective, cyber-securitization is only legitimate if it serves to protect critical infrastructure. Whilst Floyd’s JST focuses …The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat … construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just …
Persistent link: https://www.econbiz.de/10014262972
translates the fundamental building blocks of data privacy and (cyber)security law into basic knowledge that is equally …
Persistent link: https://www.econbiz.de/10012814665
Persistent link: https://www.econbiz.de/10013500599
Persistent link: https://www.econbiz.de/10012204484
notions such as place, have led to concerns of inappropriate cyber securitisation of government programmes. …
Persistent link: https://www.econbiz.de/10012502187
Persistent link: https://www.econbiz.de/10011915569
Persistent link: https://www.econbiz.de/10012252799
Persistent link: https://www.econbiz.de/10012016108