Institutions, Laws and Policies
This chapter summarizes the research done and presented in the book; it also identifies a set of recommendations for future research, specifically longitudinal country analysis to provide more depth in the impact of cybersecurity policy on the protection of cyber space.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.