This module is a resource for lecturers  


Core reading


The following readings are (mostly open source) required readings that should be completed before taking a class based on this Module:

Materials with this icon can be found in the E4J Library of Resources.

Benoliel, Daniel. (2015). Towards a Cybersecurity Policy Model: Israel National Cyber Bureau Case Study. North Carolina Journal of Law & Technology, Vol. 16(3).

Carr, Madeline. (2016). Public-private partnerships in national cyber-security strategies. International Affairs, Vol. 92(1), 43-62.

ENISA. (2014). An Evaluation Framework for National Cyber Security Strategies .

Henschke, Adam and Shannon Brandt Ford. (2017). Cybersecurity, trustworthiness and resilient systems: guiding values for policy. Journal of Cyber Policy, Vol. 2(1), 82-95.

Internet Society. (2016). Internet Governance - Why the Multistakeholder Approach Works .

ITU. (2018). A Guide to Developing A National Cybersecurity Strategy .

Lindstrom, Gustav and Eric Luiijf. (2012). Political Aims & Policy Methods. In Alexander Klimburg (Ed.). National Cyber Security Framework Manual (pp. 44-65). NATO CCD COE Publication, Tallinn.

Morgus, Robert and Justin Sherman. (2018). The Idealized Internet vs. Internet Realities: Analytical Framework for Assessing the Freedom, Openness, Interoperability, Security, and Resiliency of the Global Internet (Version 1.0).

Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. (2017). National Initiative for Cybersecurity Education (NICE). Cybersecurity Workforce Framework. NIST Special Publication 800-181.

Reich, Pauline, Pravin Anand, Vaishal Mittal, Ayushi Kiran, Anna Maria Osula, and Stuart Weinstein (2014). Internet governance: International law and global order in cyberspace. In Manfred Steger, Paul Battersby, and Joseph Siracusa. (eds.). The SAGE Handbook of Globalization (pp. 592-620), Sage.

Seger, Alexander. (2012). Cybercrime strategies. Global Project on Cybercrime.

Whitmore, Andrew, Namjoo Choi and Anna Arzrumtsyan. (2009). One Size Fits All? On the Feasibility of International Internet Governance. Journal of Information Technology & Politics, Vol. 6:1, 4-11.

Next: Advanced reading
Back to top