IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Cybersecurity as Emerging Challenge to Yemen Security


    Author(s): HUMIED, Ismail A.

    Quick view | Full article | Citations | Views: 397


    Author(s) keywords: , , , ,


    Reference keywords: ,


    Abstract:

    This research places the concept of cybersecurity in the context of a theoretical understanding of security and highlighting the destructive capabilities of cyber-attacks. This study examines the progress made by the country’s policy with regard to cybersecurity and provides some recommendations on how to enhance its cybersecurity.



    References:

    [1]. African Union, 2014. Africa Union Convention on Cyber Security and Personal Data Protection. [Online] Available at: http://www.au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection [Accessed 1 August 2022].
    [2]. Austin, G., 2016. Evaluating China's Cyber Power. [Online] Available at: http://thediplomat.com/2016/10/evaluating-chinas-cyber-power/ [Accessed 27 May 2022].
    [3]. Chon, G., 2015. US pursues case against Chinese army hackers. [Online] Available at: https://www.ft.com/content/a378b4c6-62b0-11e5-9846-de406ccb37f2 [Accessed 29 October 2021].
    [4]. Council of Europe, 2016. Chart of signatures and ratifications of Treaty 185. [Online] Available at: http://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures [Accessed 14 March 2022].
    [5]. Denning, D., 1999. Information Warfare and Security. Essex: Addison-Wesley Longman Ltd. Department of Communications, 2013. Electronic Communications Act: South Africa Connect: Creating opportunity, ensuring inclusion. [Online] Available at: www.gov.za [Accessed 16 January 2022].
    [6]. Estonian Ministry of Defence, 2008. Cyber Security Strategy, s.l.: Cyber Security Strategy Committee.
    [7]. Grobler, M. & Jansen van Vuuren, J., 2012. Collaboration as proactive measure against cyber warfare in South Africa. African Security Review, Volume 21:2, pp. 61-73.
    [8]. Grobler, M., Jansen van Vuuren, J. & Zaaiman, J., 2013. Preparing South Africa for cyber-crime and cyber defence. Systemics, cybernetics and informatics volume, p. Vol 11 No.7.
    [9]. Kuehl, D., 2009. Cyberspace and Cyberpower. In: F. Kramer, S. Starr & L. Wentz, eds. Cyberpower and Security. Dulles: Potomac Books, p. 28.
    [10]. Nissenbaum, H., 2005. Where computer security meets Security. Ethics and Information Security, 2(7), pp. 61-73.
    [11]. Ogundeji, O., 2016. AU, China unite to tackle cybercrime. [Online] Available at: http://www.itwebafrica.com/security/513-africa/236293-au-china-unite-to-tackle-cybercrime [Accessed 2 August 2022].
    [12]. Sheldon, J., 2013. The Rise of Cyberpower. In: Strategy in the contemporary world. New York: Oxford University Press, pp. 303-319.
    [13]. Singer, P. & Friedman, A., 2014. Cybersecurity and Cyberwar: What everyone needs to know. New York: Oxford University Press.
    [14]. US Department of Justice, 2014. U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage. [Online] Available at: http://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor [Accessed 12 August 2022].
    [15]. Wolfpack, 2013. 2012/2013 The South African Cyber Threat Barometer, Johannesburg: Wolfpack.



    Additional Information

    Article Title: Cybersecurity as Emerging Challenge to Yemen Security
    Author(s): HUMIED, Ismail A.
    Date of Publication: 2022-12-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2022.02.03
    Issue: Volume 11, Issue 2, Year 2022
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 35-44 (10 pages)



    Copyright ©2012-2025
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.