Is this page useful for you? Then, help us to keep the service working. Please have a look to our donations page ... Thanks for your help!!

Citation Profile [Updated: 2023-11-03 08:28:08]
5 Years H Index
7
Impact Factor (IF)
0.12
5 Years IF
0.16
Data available in this report

[Raw data] [50 most cited papers] [50 most relevant papers] [cites used to compute IF] [Recent citations ][Frequent citing series ] [more data in EconPapers] [trace new citations] [Missing citations? Add them now] [Incorrect content? Let us know]

Main indicators
Raw Data

 

IF AIF CIF IF5 DOC CDO CIT NCI CCU D2Y C2Y D5Y C5Y SC %SC CiY II AII
2016 0 0.53 0.09 0 22 22 28 2 2 0 0 0 2 0.09 0.21
2017 0 0.54 0.02 0 33 55 52 1 3 22 22 0 1 0.03 0.22
2018 0.02 0.56 0.05 0.02 31 86 29 4 7 55 1 55 1 0 2 0.06 0.24
2019 0.13 0.58 0.11 0.12 31 117 9 11 20 64 8 86 10 0 0 0.23
2020 0.11 0.7 0.2 0.21 27 144 20 29 49 62 7 117 24 0 3 0.11 0.33
2021 0.21 0.87 0.26 0.27 30 174 2 46 95 58 12 144 39 0 0 0.32
2022 0.12 1 0.18 0.16 25 199 3 36 131 57 7 152 25 0 0 0.31
IF: Two years Impact Factor: C2Y / D2Y
AIF: Average Impact Factor for all series in RePEc in year y
CIF: Cumulative impact factor
IF5: Five years Impact Factor: C5Y / D5Y
DOC: Number of documents published in year y
CDO: Cumulative number of documents published until year y
CIT: Number of citations to papers published in year y
NCI: Number of citations in year y
CCU: Cumulative number of citations to papers published until year y
D2Y: Number of articles published in y-1 plus y-2
C2Y: Cites in y to articles published in y-1 plus y-2
D5Y: Number of articles published in y-1 until y-5
C5Y: Cites in y to articles published in y-1 until y-5
SC: selft citations in y to articles published in y-1 plus y-2
%SC: Percentage of selft citations in y to articles published in y-1 plus y-2
CiY: Cites in year y to documents published in year y
II: Immediacy Index: CiY / Documents.
AII: Average Immediacy Index for series in RePEc in year y
50 most cited documents in this series
#YearTitleCited
12017Blockchain technology for social impact: opportunities and challenges ahead. (2017). Seidler, Nicolas ; Al-Saqaf, Walid . In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:3:p:338-354.

Full description at Econpapers || Download paper

18
22017Cyber risk and the changing role of insurance. (2017). Camillo, Mark. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:1:p:53-63.

Full description at Econpapers || Download paper

13
32016Multi-stakeholderism in Internet governance: putting a fiction into practice. (2016). Hofmann, Jeanette. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:1:y:2016:i:1:p:29-49.

Full description at Econpapers || Download paper

13
42018Fake news, disinformation, manipulation and online tactics to undermine democracy. (2018). Morgan, Susan. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:1:p:39-43.

Full description at Econpapers || Download paper

9
52016The evolution of the Internet: from military experiment to General Purpose Technology. (2016). Naughton, John. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:1:y:2016:i:1:p:5-28.

Full description at Econpapers || Download paper

8
62017Security and privacy in the internet of things. (2017). Maple, Carsten. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:2:p:155-184.

Full description at Econpapers || Download paper

7
72020Unpacking interoperability in competition. (2020). Riley, Chris . In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:1:p:94-106.

Full description at Econpapers || Download paper

7
82018Unpacking cyber norms: private companies as norm entrepreneurs. (2018). Lobato, Luisa Cruz ; Hurel, Louise Marie. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:1:p:61-76.

Full description at Econpapers || Download paper

6
92017A public policy perspective of the Dark Web. (2017). Chertoff, Michael. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:1:p:26-38.

Full description at Econpapers || Download paper

5
102020On market concentration and cybersecurity risk. (2020). Leverett, Eireann ; Jardine, Eric ; Geer, Dan. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:1:p:9-29.

Full description at Econpapers || Download paper

4
112018Maritime cybersecurity policy: the scope and impact of evolving technology on international shipping. (2018). Jones, Kevin D ; Tam, Kimberly. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:2:p:147-164.

Full description at Econpapers || Download paper

3
122018Review of cybersecurity frameworks: context and shared concepts. (2018). Win, Khin Than ; Tibben, William ; Azmi, Riza. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:2:p:258-283.

Full description at Econpapers || Download paper

3
132017Net neutrality, zero rating and the Minitelisation of the internet. (2017). Belli, Luca. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:1:p:96-122.

Full description at Econpapers || Download paper

3
142020The influence of internet architecture on centralised versus distributed internet services. (2020). Arkko, Jari. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:1:p:30-45.

Full description at Econpapers || Download paper

3
152020Standardising the splinternet: how China’s technical standards could fragment the internet. (2020). Taylor, Emily ; Lazanski, Dominique ; Hoffmann, Stacie. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:2:p:239-264.

Full description at Econpapers || Download paper

3
162020Reshaping the internet – the impact of the securitisation of internet infrastructure on approaches to internet governance: the case of Russia and the EU. (2020). Claessen, Eva. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:1:p:140-157.

Full description at Econpapers || Download paper

3
172016Data gathering, surveillance and human rights: recasting the debate. (2016). Bernal, Paul. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:1:y:2016:i:2:p:243-264.

Full description at Econpapers || Download paper

3
182017Policy measures and cyber insurance: a framework. (2017). Simpson, Andrew ; Woods, Daniel. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:2:p:209-226.

Full description at Econpapers || Download paper

3
192020Hacking democracy: managing influence campaigns and disinformation in the digital age. (2020). Gjesvik, Lars ; Schia, Niels Nagelhus. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:3:p:413-428.

Full description at Econpapers || Download paper

2
202019Cyber negotiation: a cyber risk management approach to defend urban critical infrastructure from cyberattacks. (2019). Susskind, Lawrence ; Noriega, Alicia ; Falco, Gregory. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:4:y:2019:i:1:p:90-116.

Full description at Econpapers || Download paper

2
212022Information vs the cyberspace domain. (2022). Nakayama, Bryan James. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:7:y:2022:i:2:p:213-229.

Full description at Econpapers || Download paper

2
222019The state of Microsoft?: the role of corporations in international norm creation. (2019). Fairbank, Nancy Ayer. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:4:y:2019:i:3:p:380-403.

Full description at Econpapers || Download paper

2
232022Rules, institutions, or both? Estimating the drivers of telecommunication investment in Latin America. (2022). Melguizo, Angel ; Jung, Juan. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:7:y:2022:i:1:p:5-23.

Full description at Econpapers || Download paper

2
242018Challenges and opportunities for cyber norms in ASEAN. (2018). Gomez, Miguel Alberto ; Dai, Candice Tran. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:2:p:217-235.

Full description at Econpapers || Download paper

2
252016Challenges and opportunities for advancing Internet access in developing countries while upholding net neutrality. (2016). Sambuli, Nanjira. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:1:y:2016:i:1:p:61-74.

Full description at Econpapers || Download paper

2
262021Why cybersecurity insurance should be regulated and compulsory. (2021). Lemnitzer, Jan Martin. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:6:y:2021:i:2:p:118-136.

Full description at Econpapers || Download paper

2
272017Children as Internet users: how can evidence better inform policy debate?. (2017). Burton, Patrick ; Byrne, Jasmina. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:1:p:39-52.

Full description at Econpapers || Download paper

2
282018Mind the denominator: towards a more effective measurement system for cybersecurity. (2018). Jardine, Eric. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:1:p:116-139.

Full description at Econpapers || Download paper

2
292018A centralised cybersecurity strategy for Taiwan. (2018). Li, Tien-Shen ; Huang, Hsini. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:3:p:344-362.

Full description at Econpapers || Download paper

1
302019The Uberization of the United Nations’ regime to prevent the online financing of terrorism: tackling the problem of obfuscation in virtual currencies. (2019). Ilbiz, Ethem. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:4:y:2019:i:3:p:404-424.

Full description at Econpapers || Download paper

1
312016Building national cyber resilience and protecting critical information infrastructure. (2016). Tiirmaa-Klaar, Heli. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:1:y:2016:i:1:p:94-106.

Full description at Econpapers || Download paper

1
322020Consolidation in the DNS resolver market – how much, how fast, how dangerous?. (2020). Hausding, Michael ; RADU, Roxana . In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:1:p:46-64.

Full description at Econpapers || Download paper

1
332018Introduction from the editor. (2018). editor, The. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:1:p:1-4.

Full description at Econpapers || Download paper

1
342016The cybercrime landscape and our policing response. (2016). McMurdie, Charlie. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:1:y:2016:i:1:p:85-93.

Full description at Econpapers || Download paper

1
352020The cybersecurity of municipalities in the United States: an exploratory survey of policies and practices. (2020). Heslen, John ; Meares, Wesley L ; Hatcher, William. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:2:p:302-325.

Full description at Econpapers || Download paper

1
362019Determinants of cyber readiness. (2019). Smeets, Max ; Makridis, Christos Andreas. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:4:y:2019:i:1:p:72-89.

Full description at Econpapers || Download paper

1
372017Politics of cybersecurity capacity building: conundrum and opportunity. (2017). Barmpaliou, Panagiota-Nayia ; Pawlak, Patryk . In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:1:p:123-144.

Full description at Econpapers || Download paper

1
382019Governance in international technical standards-making: a tripartite model. (2019). Lazanski, Dominique. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:4:y:2019:i:3:p:362-379.

Full description at Econpapers || Download paper

1
392018Taming cyber warfare: lessons from preventive arms control. (2018). Dickow, Marcel ; Mutschler, Max ; Hansel, Mischa. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:1:p:44-60.

Full description at Econpapers || Download paper

1
402018UK cybersecurity industrial policy: an analysis of drivers, market failures and interventions. (2018). Tanczer, Leonie Maria ; Carr, Madeline. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:3:p:430-444.

Full description at Econpapers || Download paper

1
412021Functional systems within cryptolaundering processes: a work domain analysis model of cryptolaundering activities. (2021). Lacey, David ; Salmon, Paul ; Desmond, Dennis. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:6:y:2021:i:2:p:155-176.

Full description at Econpapers || Download paper

1
422018‘Cyber’ semantics: why we should retire the latest buzzword in security studies. (2018). Futter, Andrew . In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:2:p:201-216.

Full description at Econpapers || Download paper

1
432019Criminal use of cryptocurrencies: a great new threat or is cash still king?. (2019). Butler, Simon. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:4:y:2019:i:3:p:326-345.

Full description at Econpapers || Download paper

1
442017Tackling cybercrime – the UK response. (2017). Saunders, Jamie. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:1:p:4-15.

Full description at Econpapers || Download paper

1
452018A comprehensive security approach: bolstering Finnish cybersecurity capacity. (2018). Griffith, Melissa K. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:3:p:407-429.

Full description at Econpapers || Download paper

1
462019The AI-cyber nexus: implications for military escalation, deterrence and strategic stability. (2019). Johnson, James. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:4:y:2019:i:3:p:442-460.

Full description at Econpapers || Download paper

1
472016Exploring the multi-stakeholder experience in Kenya. (2016). Munyua, Alice Wanjira. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:1:y:2016:i:2:p:206-221.

Full description at Econpapers || Download paper

1
482017The Internet of Automotive Things: vulnerabilities, risks and policy implications. (2017). Bryans, Jeremy W. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:2:p:185-194.

Full description at Econpapers || Download paper

1
492018From editorial obligation to procedural accountability: policy approaches to online content in the era of information intermediaries. (2018). Bunting, Mark. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:2:p:165-186.

Full description at Econpapers || Download paper

1
502019Online child sexual exploitation: towards an optimal international response. (2019). Baines, Victoria. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:4:y:2019:i:2:p:197-215.

Full description at Econpapers || Download paper

1
50 most relevant documents in this series (papers most cited in the last two years)
#YearTitleCited
12017Blockchain technology for social impact: opportunities and challenges ahead. (2017). Seidler, Nicolas ; Al-Saqaf, Walid . In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:3:p:338-354.

Full description at Econpapers || Download paper

10
22016Multi-stakeholderism in Internet governance: putting a fiction into practice. (2016). Hofmann, Jeanette. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:1:y:2016:i:1:p:29-49.

Full description at Econpapers || Download paper

8
32017Cyber risk and the changing role of insurance. (2017). Camillo, Mark. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:1:p:53-63.

Full description at Econpapers || Download paper

7
42016The evolution of the Internet: from military experiment to General Purpose Technology. (2016). Naughton, John. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:1:y:2016:i:1:p:5-28.

Full description at Econpapers || Download paper

6
52017Security and privacy in the internet of things. (2017). Maple, Carsten. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:2:p:155-184.

Full description at Econpapers || Download paper

6
62020Unpacking interoperability in competition. (2020). Riley, Chris . In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:1:p:94-106.

Full description at Econpapers || Download paper

6
72018Fake news, disinformation, manipulation and online tactics to undermine democracy. (2018). Morgan, Susan. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:1:p:39-43.

Full description at Econpapers || Download paper

5
82017A public policy perspective of the Dark Web. (2017). Chertoff, Michael. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:2:y:2017:i:1:p:26-38.

Full description at Econpapers || Download paper

4
92018Unpacking cyber norms: private companies as norm entrepreneurs. (2018). Lobato, Luisa Cruz ; Hurel, Louise Marie. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:1:p:61-76.

Full description at Econpapers || Download paper

4
102020Standardising the splinternet: how China’s technical standards could fragment the internet. (2020). Taylor, Emily ; Lazanski, Dominique ; Hoffmann, Stacie. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:2:p:239-264.

Full description at Econpapers || Download paper

3
112020Reshaping the internet – the impact of the securitisation of internet infrastructure on approaches to internet governance: the case of Russia and the EU. (2020). Claessen, Eva. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:1:p:140-157.

Full description at Econpapers || Download paper

3
122018Review of cybersecurity frameworks: context and shared concepts. (2018). Win, Khin Than ; Tibben, William ; Azmi, Riza. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:2:p:258-283.

Full description at Econpapers || Download paper

3
132018Challenges and opportunities for cyber norms in ASEAN. (2018). Gomez, Miguel Alberto ; Dai, Candice Tran. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:2:p:217-235.

Full description at Econpapers || Download paper

2
142020On market concentration and cybersecurity risk. (2020). Leverett, Eireann ; Jardine, Eric ; Geer, Dan. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:1:p:9-29.

Full description at Econpapers || Download paper

2
152020The influence of internet architecture on centralised versus distributed internet services. (2020). Arkko, Jari. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:1:p:30-45.

Full description at Econpapers || Download paper

2
162022Rules, institutions, or both? Estimating the drivers of telecommunication investment in Latin America. (2022). Melguizo, Angel ; Jung, Juan. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:7:y:2022:i:1:p:5-23.

Full description at Econpapers || Download paper

2
172021Why cybersecurity insurance should be regulated and compulsory. (2021). Lemnitzer, Jan Martin. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:6:y:2021:i:2:p:118-136.

Full description at Econpapers || Download paper

2
182016Data gathering, surveillance and human rights: recasting the debate. (2016). Bernal, Paul. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:1:y:2016:i:2:p:243-264.

Full description at Econpapers || Download paper

2
192019Cyber negotiation: a cyber risk management approach to defend urban critical infrastructure from cyberattacks. (2019). Susskind, Lawrence ; Noriega, Alicia ; Falco, Gregory. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:4:y:2019:i:1:p:90-116.

Full description at Econpapers || Download paper

2
202018Maritime cybersecurity policy: the scope and impact of evolving technology on international shipping. (2018). Jones, Kevin D ; Tam, Kimberly. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:3:y:2018:i:2:p:147-164.

Full description at Econpapers || Download paper

2
212020Hacking democracy: managing influence campaigns and disinformation in the digital age. (2020). Gjesvik, Lars ; Schia, Niels Nagelhus. In: Journal of Cyber Policy. RePEc:taf:rcybxx:v:5:y:2020:i:3:p:413-428.

Full description at Econpapers || Download paper

2
Citing documents used to compute impact factor: 7
YearTitle
2022Das Netz und die Netze. Vom Wandel des Internets und der globalen digitalen Ordnung. (2022). Voelsen, Daniel ; Pohle, Julia. In: EconStor Open Access Articles and Book Chapters. RePEc:zbw:espost:263915.

Full description at Econpapers || Download paper

2022The Development of a Service System for Facilitating Food Resource Allocation and Service Exchange. (2022). Lin, Fu-Ren ; Trieu, Viet-Cuong. In: Sustainability. RePEc:gam:jsusta:v:14:y:2022:i:19:p:11987-:d:922439.

Full description at Econpapers || Download paper

2022Dangerous games: A literature review on cybersecurity investments. (2022). Fedele, Alessandro ; Roner, Cristian. In: Journal of Economic Surveys. RePEc:bla:jecsur:v:36:y:2022:i:1:p:157-187.

Full description at Econpapers || Download paper

2022Governable spaces: A feminist agenda for platform policy. (2022). Schneider, Nathan. In: Internet Policy Review: Journal on Internet Regulation. RePEc:zbw:iprjir:254277.

Full description at Econpapers || Download paper

2022Why has multilateral space and spectrum resource management become more difficult?. (2022). Frieden, Rob. In: Telecommunications Policy. RePEc:eee:telpol:v:46:y:2022:i:10:s0308596122001288.

Full description at Econpapers || Download paper

2022Politicisation of the Domestic: Populist Narratives About Covid-19 Among Influencers. (2022). Hemanova, Marie. In: Media and Communication. RePEc:cog:meanco:v:10:y:2022:i:4:p:180-190.

Full description at Econpapers || Download paper

2022Crimes Related to Cryptocurrency and Regulations to Combat Crypto Crimes. (2022). Ali, Naheeda. In: Journal of Policy Research (JPR). RePEc:rfh:jprjor:v:8:y:2022:i:3:p:289-302.

Full description at Econpapers || Download paper

Recent citations
Recent citations received in 2022

YearCiting document

Recent citations received in 2021

YearCiting document

Recent citations received in 2020

YearCiting document
2020Observable Cyber Risk on Cournot Oligopoly Data Storage Markets. (2020). Hoxell, Amanda ; Franke, Ulrik. In: Risks. RePEc:gam:jrisks:v:8:y:2020:i:4:p:119-:d:444184.

Full description at Econpapers || Download paper

2020The Saga of the Covid-19 Contact Tracing Apps: Lessons for Data Governance. (2020). Savona, Maria. In: SPRU Working Paper Series. RePEc:sru:ssewps:2020-10.

Full description at Econpapers || Download paper

2020The Case against Commercial Antivirus Software: Risk Homeostasis and Information Problems in Cybersecurity. (2020). Jardine, Eric. In: Risk Analysis. RePEc:wly:riskan:v:40:y:2020:i:8:p:1571-1588.

Full description at Econpapers || Download paper

Recent citations received in 2019

YearCiting document