Total Pageviews

Wednesday, April 26, 2017

Getting beyond Norms When Violating the Agreement Becomes Customary Practice

"Getting beyond Norms When Violating the Agreement Becomes Customary Practice", Melissa Hathaway, CIGI Papers No. 127 — April 2017, 16 pages. 

About Cyber-Routine Activities Theory

"Capable Guardianship and CRISIS of IdentityTheft in the United States: ExpandingCyber-Routine Activities Theory", Back Sinchul, Sung Yongeun, Cruz Erik, International journal of crisis & safety, 2017 2(1) 16-24. 

Fair Use and IP Infringement on Instagram, Pinterest and Other Social Media

"Fair Use and IP Infringement on Instagram, Pinterest and Other Social Media. Policing and Protecting Licenses, Copyright and Trademark Rights ", April 26, 2017, Strafford. Presenting a live 90-minute webinar with interactive Q&A. The online program provides a copy of "Copyright Fair Use", Excerpted from Chapter 4 (Copyright Protection in Cyberspace) of E-Commerce and Internet Law: A Legal Treatise With Forms, Second Edition, a 5-volume legal treatise by Ian C. Ballon (Thomson/West Publishing 2017). 

Cybercrime Coordination and Partnership Exercise

"Cybercrime Coordination and Partnership Exercise", 24-28 April 2017, Tbilisi, Georgia, Provided under iPROCEEDS and Cybercrime@EAP III projects. More information... 

Tuesday, April 25, 2017

Summer School on Cybercrime

"Summer School on Cybercrime", Milan, Italy, 3 – 6 July 2017. More information...

Monday, April 24, 2017

Theorizing cyber coercion: The 2014 North Korean operation against Sony

"Theorizing cyber coercion: The 2014 North Korean operation against Sony" by Trevis Sharp, Journal of Strategic Studies, Pages 1-29 | Published online: 11 April 2017.  Abstract...

Thursday, April 20, 2017

Cyber Security: strategies, policies...


  • "Cyber Security: Collaboration. Antigua and Barbuda". ITU, 23 March 2017, 30 pages. Download
  • "The UK’s National Cyber Security Strategy 2016 – 2021", UK Government, April 2017. Download
  • "CyberSecurity Strategy 2017-2019. State of Illinois", Department of Innovation and Technology, State of Illinois, 24 pages. Download
  • "National Security and Emergency Preparedness Department 2017 Cybersecurity Policy Priorities (Select Examples) ". US Chamber of Commerce. March 2017. 4 pages. Download.