scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "Eneken Tikk"

1 - 10 of 23 results for
 "Eneken Tikk"
Results per page:
Routledge Handbook of International Cybersecurity

Routledge Handbook of International Cybersecurity

Publication Type:eBook

Abstract:The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and securi...

View details

The leaps and bounds of e-Estonia.

Publication Type:Academic Journal

Source(s):Media Development; 2021, Vol. 67 Issue 2, p29-32, 4p

Abstract:Copyright of Media Development is the property of World Association for Christian Communication and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, u...

View details

WILL CYBER CONSEQUENCES DEEPEN DISAGREEMENT ON INTERNATIONAL LAW?

Publication Type:Academic Journal

Source(s):Temple International & Comparative Law Journal; Summer2018, Vol. 32 Issue 2, p185-195, 11p

Abstract:Copyright of Temple International & Comparative Law Journal is the property of Temple International & Comparative Law Journal and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express ...

View details

Privacy online: up, close and personal

Publication Type:Periodical

Source(s):Health and Technology; December 2017, Vol. 7 Issue: 4 p489-499, 11p

Abstract:In the era of information, administration of personal data protection mingles with expectations of access to information as well as the overall sense of cyber (in)security. A failure to appropriately consider the systemof data processing relationships ...

View details

Legal Framework of Cyber Security.

Publication Type:Book

Source(s):Cyber Security: Analytics, Technology & Automation; 2015, p109-127, 19p

View details

International Cyber Norms Dialogue as an Exercise of Normative Power.

Publication Type:Academic Journal

Source(s):Georgetown Journal of International Affairs; Fall/Winter2016, Vol. 17 Issue 3, p47-59, 13p

Abstract:The article offers information on the normative power from the liberalist-ethical considerations. It explores how the exercise of normative power approach helps in observing what states make international law, adding dimensions to international law's d...

View details

The Cyber Attack on Saudi Aramco.

Publication Type:Academic Journal

Source(s):Survival (00396338); Apr/May2013, Vol. 55 Issue 2, p81-96, 16p

Abstract:The article discusses the effect of the self-replicating virus that infected the computer network of the national oil and gas firm Saudi Aramco to the oil industry of Saudi Arabia. It says that the function of the virus Shamoon is an indiscriminate del...

View details

Legal Cooperation to Investigate Cyber Incidents: Estonian Case Study and Lessons.

Publication Type:Conference

Source(s):Proceedings of the European Conference on Information Warfare & Security; 2010, p288-294, 7p

Abstract:Copyright of Proceedings of the European Conference on Information Warfare & Security is the property of Academic Conferences International and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright hol...

View details

Legal and Policy Evaluation: International Coordination of Prosecution and Prevention of Cyber Terrorism.

Publication Type:Book

Source(s):Responses to Cyber Terrorism; 2008, Vol. 34 Issue 1, p89-103, 15p, 4 Graphs

Abstract:Copyright of Responses to Cyber Terrorism is the property of IOS Press and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download,...

View details

banner_970x250 (970x250)

sponsored