Have a personal or library account? Click to login
Cybersecurity in the Making – Policy and Law: a Case Study of Georgia Cover

Cybersecurity in the Making – Policy and Law: a Case Study of Georgia

Open Access
|Feb 2020

References

  1. AMORETTI, Francesco. ICTs Policies: E-Democracy and E-Government for Political Development, 2007.10.1111/j.1541-1338.2007.00286.x
  2. BEBBER, Robert “Jake”. Cyber power and cyber effectiveness: An analytic framework. Comparative Strategy, 2017, vol. 36, no. 5, pp. 426–436.10.1080/01495933.2017.1379833
  3. BOYD, Stephen, ---amp--- KEROMYTIS, Angelos, SQLrand: Preventing SQL injection attacks. In International Conference on Applied Cryptography and Network Security, 2004, pp. 292–302. Springer, Berlin, Heidelberg.10.1007/978-3-540-24852-1_21
  4. CARR, Madeline. Public–private partnerships in national cyber-security strategies. International Affairs, 2016, vol. 92, no. 1, pp. 43–62.10.1111/1468-2346.12504
  5. CHEE-WOOI, Ten. CHEN-CHING, Liu. GOVINDARSU, Manimaran. Vulnerability assessment of cybersecurity for SCADA systems. IEEE Transactions on Power Systems, 2008, vol. 23, no. 4, pp. 1836–1846.10.1109/TPWRS.2008.2002298
  6. CHOCHIA, Archil ---amp--- POPJANEVSKI, Johanna. Change of Power and Its Influence on Country’s Europeanization Process. Case Study: Georgia. In: KERIKMÄE, Tanel. CHOCHIA, A. (Eds.). Political and Legal Perspectives of the EU Eastern Partnership Policy, Cham: Springer, 2016, pp. 197–210.
  7. CHOCHIA, Archil ---amp--- KERIKMÄE, Tanel. Digital Single Market as an Element in EU-Georgian Cooperation. Baltic Journal of European Studies, 2018, vol. 8, no. 2, pp. 3–6.10.1515/bjes-2018-0012
  8. CHARAIA, Vakhtang, CHOCHIA, Archil, LASHKHI, Mariam. Caucasus 3 plus Baltic 3 and Economic Cooperation with China. Baltic Journal of European Studies, 2018, vol. 8, no. 2, pp. 44–64.10.1515/bjes-2018-0015
  9. DE BRUIJN, Hans ---amp--- JANSSEN, Marijn. Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 2017, vol. 34, no. 1, pp. 1–7.10.1016/j.giq.2017.02.007
  10. DADIANI, Natalia. Kindergarten web-portal failure. Online, Retrieved from: https://www.ambebi.ge/article/106265-sabavshvo-bagis-garet-darchenili-bavshvebida-gamcarebuli-mshoblebi-mougvarebeli-problemis-mizezebi-da-shedegebi/ Accessed: 12.11.2019.
  11. DUNN CAVELTY, Myriam. Europe’s cyber-power. European Politics and Society, 2018, vol. 19, no. 3, pp. 304–320.10.1080/23745118.2018.1430718
  12. E-Governance Academy. NCSI-National Cyber Security Index, 2018. Online; Available at: https://ega.ee/wp-content/uploads/2018/05/ncsi_digital_smaller.pdf; Accessed: 15.09.2019.
  13. European Union Agency for Cybersecurity (ENISA). National Cybersecurity Strategies Evaluation Tool. Available at: https://www.enisa.europa.eu/topics/national-cyber-security-strategies/national-cyber-security-strategies-guidelines-tools/national-cyber-security-strategies-evaluation-tool Accessed: 10.11.2019.
  14. HEEKS, Richard. Understanding e-governance for development. Manchester: Institute for Development Policy and Management, 2001.10.2139/ssrn.3540058
  15. International Telecommunication Union. Global Cybersecurity Index (GCI) 2017. Online; Available at: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf; Accessed: 15.09.2019.
  16. International Telecommunication Union. Global Cybersecurity Index (GCI) 2018. Online. Available at https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf; Accessed: 15.09.2019.
  17. International Telecommunication Union. Definition of cybersecurity. Online; Available at: https://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx; Accessed: 15.09.2019
  18. KERIKMÄE, Tanel ---amp--- RULL, Addi. The Future of Law and eTechnologies. Heidelberg: Springer-Verlag, 2016.10.1007/978-3-319-26896-5
  19. KERIKMÄE, Tanel, HOFFMANN, Thomas, CHOCHIA, Archil. Legal Technology for Law Firms: Determining Roadmaps for Innovation. Croatian International Relations Review, 2018, vol. 24, no. 81, pp. 91–112.10.2478/cirr-2018-0005
  20. LEPIK, Toomas ---amp--- TABATADZE, David. Estoniana ---amp--- Georgian Cyber Attacks. 21stAnnual FIRST Conference, Kyoto, June 28 – July 3, 2009. Online, Available at: https://www.first.org/resources/papers/conference2009/lepiktabatadze-sliders.pdf Accessed: 15.10.2019.
  21. LOMIDZE, Irakli. Cyber Attacks Against Georgia. Report for Georgian It Innovations; Online; Data exchange agency, 2011; Retrieved from: http://dea.gov.ge/uploads/GITI%202011/GITI2011_3.pdf; Accessed: 15.09.2019.
  22. LUIIJF, Eric, BESSELING, Kim, SPOELSTRA, Maartje, GRAAF, Patrick. Ten National Cyber Security Strategies: a Comparison: Critical Information Infrastructure Security, 2013.10.1007/978-3-642-41476-3_1
  23. MADON, Shirin. Evaluating the developmental impact of e-governance initiatives: An exploratory framework. The Electronic Journal of Information Systems in Developing Countries, 2004, vol. 20, no. 1, pp. 1–13.10.1002/j.1681-4835.2004.tb00132.x
  24. Ministry of Defence of Georgia. Threat Assessment Document for 2010–2013. Retrieved from: https://mod.gov.ge/uploads/2018/pdf/TAD-ENG.pdf Accessed: 02.10.2019.
  25. Ministry of Defence of Georgia. Cyber Security Bureau. Retrieved from: https://mod.gov.ge/en/page/59/cyber-security-bureau Accessed: 02.10.2019.
  26. Ministry of Internal Affairs of Georgia. Actions carried out by the ministry of internal affairs of Georgia. Retrieved from: https://police.ge/en/projects/kiberdanashauli/shinagan-saqmeta-saministros-mier-gankhortsielebuli-ghonisdziebebi Accessed: 02.10.2019
  27. MIRKOVIC, Jelena. ---amp--- REIHER, Peter. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 2004, vol. 34, no. 2, pp. 39–53.10.1145/997150.997156
  28. North Atlantic Treaty Organization (NATO). Cyber defence. Online. Retrieved from: https://www.nato.int/cps/en/natohq/topics_78170.htm; Accessed: 20.10.2019
  29. PALVIA, Shailendra. ---amp--- SHARMA, Sushil. E-government and e-governance: definitions/domain framework and status around the world. In International Conference on E-governance, 2007, pp. 1–12.
  30. RIOS, Billy. Sun Tzu was a hacker: An examination of the tactics and operations from a real world cyber attack. In: CZOSSEC, Christian ---amp--- Geers, Kenneth (Eds.) The Virtual Battlefield: Perspectives on Cyber Warfare, 2009, vol. 3, pp. 143–155.
  31. SCHLAMP, Johann. HOLZE, Ralph. JACQUEMART, Quentin. HEAP: reliable assessment of BGP hijacking attacks. IEEE Journal on Selected Areas in Communications, 2016, vol. 34, no. 6, pp. 1849–1861.10.1109/JSAC.2016.2558978
  32. SVANADZE, Vladimer. Akhali gamotsveva saqartvelos internet sivrcistvis [ახალი გამოწვევა საქართველოს ინტერნეტ სივრცისთვის]. Internet Development Initiative – IDI, 2015. Retrieved from: http://indein.net/wp-content/uploads/2015/09/New-Challenges-for-Georgian-Cyber-Space.pdf; Accessed: 15.09.2019;
  33. TAMBUR, Silver. How Estonia became a global heavyweight in cyber security, 2017. Online. Available at: http://estonianworld.com/security/estonia-became-global-heavyweight-cyber-security/; Accessed: 16.09.2019;
  34. TOLBERT, Caroline J., and MOSSBERGER, Karen. The effects of e-government on trust and confidence in government. Public administration review, 2006, vol. 66, no. 3, pp. 354–369.10.1111/j.1540-6210.2006.00594.x
  35. UN E-Government Survey 2010; Online. Available at: https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-Government-Survey-2010; Accessed: 16.09.2019.
  36. UN E-Government Survey 2018. Online. Available at: https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-Government-Survey-2018; Accessed: 16.09.2019.
  37. VALUCH, Jozef; GÁBRIŠ, Tomáš; HAMUĽÁK, Ondrej. Cyber attacks, information attacks, and postmodern warfare. Baltic Journal of Law ---amp--- Politics, 2017, vol. 10, no. 1, pp. 63–89.10.1515/bjlp-2017-0003
  38. VALUCH, Jozef; HAMUĽÁK, Ondrej. Abuse of cyberspace within the crisis in Ukraine.” The Lawyer Quarterly, 2018, vol. 8, no. 2, 94–107.
  39. ZINETS, Natalia. Ukraine hit by 6,500 hack attacks, sees Russian ‘cyberwar’, Reuters. Online, Retrieved from: https://www.reuters.com/article/us-ukraine-crisis-cyber/ukraine-hit-by-6500-hack-attacks-sees-russian-cyberwar-idUSKBN14I1QC Accessed: 17.10.2019.
DOI: https://doi.org/10.2478/iclr-2019-0019 | Journal eISSN: 2464-6601 | Journal ISSN: 12138770
Language: English
Page range: 155 - 180
Published on: Feb 7, 2020
Published by: Palacký University Olomouc
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2020 Vladimeri Napetvaridze, Archil Chochia, published by Palacký University Olomouc
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.