Public-private partnerships in national cyber-security strategies

Article Properties
  • Language
    English
  • Publication Date
    2016/01/01
  • Indian UGC (journal)
  • Citations
    81
  • MADELINE CARR Senior Lecturer in International Politics and the Cyber Dimension at Aberystwyth University.
Journal Categories
Political science
International relations
Political science
Political institutions and public administration (General)
Social Sciences
Citations
Title Journal Journal Categories Citations Publication Date
Evidence-based cybersecurity policy? A meta-review of security control effectiveness Journal of Cyber Policy 2024
An Emergent Community of Cyber Sovereignty: The Reproduction of Boundaries?

Global Studies Quarterly
  • Political science
  • Social Sciences
2024
Information Security and Cybersecurity Policy

World Economy and International Relations
  • Political science: International relations
2024
The regulatory security state in Europe Journal of European Public Policy
  • Political science: Political institutions and public administration (General)
  • Political science
  • Political science: Political institutions and public administration (General)
  • Social Sciences
13 2023
Regulatory cybersecurity governance in the making: the formation of ENISA and its struggle for epistemic authority Journal of European Public Policy
  • Political science: Political institutions and public administration (General)
  • Political science
  • Political science: Political institutions and public administration (General)
  • Social Sciences
16 2023
Citations Analysis
Category Category Repetition
Social Sciences32
Political science: Political institutions and public administration (General)22
Political science: International relations17
Political science17
Science: Science (General): Cybernetics: Information theory7
Social Sciences: Economic theory. Demography: Economics as a science6
Science: Mathematics: Instruments and machines: Electronic computers. Computer science5
Social Sciences: Commerce: Business5
Social Sciences: Sociology (General)5
Technology: Technology (General): Industrial engineering. Management engineering: Information technology4
Geography. Anthropology. Recreation: Environmental sciences4
Social Sciences: Social pathology. Social and public welfare. Criminology4
Law4
Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication3
Technology: Engineering (General). Civil engineering (General)3
Technology: Environmental technology. Sanitary engineering2
Science: Biology (General): Ecology2
Social Sciences: Social history and conditions. Social problems. Social reform2
Technology: Technology (General): Industrial engineering. Management engineering2
Social Sciences: Industries. Land use. Labor2
Technology: Mechanical engineering and machinery: Renewable energy sources1
Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software1
Social Sciences: Finance1
Geography. Anthropology. Recreation1
Social Sciences: Industries. Land use. Labor: Special industries and trades: Construction industry1
History (General) and history of Europe: History (General)1
Social Sciences: Social sciences (General)1
Language and Literature: Philology. Linguistics: Communication. Mass media1
Language and Literature: Philology. Linguistics1
Technology: Hydraulic engineering: River, lake, and water-supply engineering (General)1
Social Sciences: Transportation and communications1
Military Science1
The category Social Sciences 32 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled Makt og avmakt i cyberspace: hvordan styre det digitale rom? and was published in 2016. The most recent citation comes from a 2024 study titled Information Security and Cybersecurity Policy. This article reached its peak citation in 2022, with 16 citations. It has been cited in 60 different journals, 11% of which are open access. Among related journals, the Journal of Cyber Policy cited this research the most, with 9 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year