Access the full text.
Sign up today, get DeepDyve free for 14 days.
Alex Burns, B. Eltham (2009)
Twitter free Iran: An evaluation of Twitter's role in public diplomacy and information operations in Iran's 2009 election crisis
(2016)
Analysis of the cyber attack on the Ukrainian power grid
(2018)
Ciberseguridad, available at: from https://republicadigital
Maurice Dawson (2018)
Applying a holistic cybersecurity framework for global IT organizationsBusiness Information Review, 35
(2018)
Itʼs time to stop laughing at Nigerian scammers – because theyʼre stealing billions of dollars, available at: from https://www.washingtonpost
Maurice Dawson, Ping Wang, Kenneth Williams (2018)
The Role of CAE-CDE in Cybersecurity Education for Workforce Development
(2017)
Crime without borders, another scourge of economic security and peace in the DR
(2007)
Law number 53 of 2007, on “High Technology Crimes and Offenses
(2017)
Europe faces shortage of 350,000 cyber security professionals by 2022
T. Pultarova (2016)
News Briefing: Cyber security - Ukraine grid hack is wake-up call for network operatorsEngineering & Technology, 11
(2017)
The Storms Moved On
Maurice Dawson (2017)
Hyper-connectivity: intricacies of national and international cyber securities
AbstractMany developed countries are placing resources to combat the growing threats in cyberspace, and emerging nations are no different. Since 2016, the Dominican Republic is undergoing massive changes within the current government to prioritize cybersecurity through laws, policies, and doctrine. This initiative is causing politicians, industry, and even government entities such as the national police to start the journey to begin to fully understand what are the issues in cybersecurity as they apply to the nation. It is essential that the security challenges and problems identified are addressed through a process of discovery while mitigating risks. This paper is to present those challenges and offer solutions that can be used to achieve an acceptable level of cyber risk.
Land Forces Academy Review – de Gruyter
Published: Sep 1, 2018
Keywords: Cybersecurity; Workforce Development; Policy; STEM Education
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.