Poster presented in the workshop on “People, Power, and CyberPolitics,” MIT, Cambridge, MA, United States, December 7–8, 2011.Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metrics, especially in the international perspective across multiple countries, multiple years, and multiple categories. Organizations ask why they should spend valuable time and resources collecting and standardizing data. This report aims to provide an encouraging answer to this question by demonstrating the value that even limited metrics can provide in a comparative perspective. We present some findings generated through the use of the Explorations in Cyber Internet Relations (ECIR) Data Dashboard. In essence, this...
Recent years and modern warfare have shown an increasing reliance on the cyber domain to maintain na...
Cyber threats are on the increase. Authorities need to respond to growing challenges by increasing c...
In the field of cybersecurity, the top-level management make use of metrics to decide if the organiz...
Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metri...
With the increasing interconnection of computer networks and sophistication of cyber attacks, it is ...
Disclaimer: This report relies on publicly available information, especially from the CERTs’ pubic w...
With the increasing interconnection of computer networks and sophistication of cyber attacks, it is ...
With the increasing interconnection of computer networks and sophistication of cyber attacks, it is ...
A Comparative Analysis of Cybersecurity Initiatives Worldwide The worst possible consequences of ris...
Cybersecurity risk is among the top risks that every organization must consider and manage, especial...
Disclaimer: This report relies on publicly available information, especially from the CERTs' pubic w...
The growing centrality of cybersecurity has led many governments and international organisations to ...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Within the last decade, nation-states and their populations have experienced an exponential rise in ...
In today’s inter-connected world, threats from anywhere in the world can have serious global repercu...
Recent years and modern warfare have shown an increasing reliance on the cyber domain to maintain na...
Cyber threats are on the increase. Authorities need to respond to growing challenges by increasing c...
In the field of cybersecurity, the top-level management make use of metrics to decide if the organiz...
Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metri...
With the increasing interconnection of computer networks and sophistication of cyber attacks, it is ...
Disclaimer: This report relies on publicly available information, especially from the CERTs’ pubic w...
With the increasing interconnection of computer networks and sophistication of cyber attacks, it is ...
With the increasing interconnection of computer networks and sophistication of cyber attacks, it is ...
A Comparative Analysis of Cybersecurity Initiatives Worldwide The worst possible consequences of ris...
Cybersecurity risk is among the top risks that every organization must consider and manage, especial...
Disclaimer: This report relies on publicly available information, especially from the CERTs' pubic w...
The growing centrality of cybersecurity has led many governments and international organisations to ...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Within the last decade, nation-states and their populations have experienced an exponential rise in ...
In today’s inter-connected world, threats from anywhere in the world can have serious global repercu...
Recent years and modern warfare have shown an increasing reliance on the cyber domain to maintain na...
Cyber threats are on the increase. Authorities need to respond to growing challenges by increasing c...
In the field of cybersecurity, the top-level management make use of metrics to decide if the organiz...