Introduction to Country Reports: Difference between revisions
No edit summary |
No edit summary |
||
(2 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
==Full Citation== | ==Full Citation== | ||
ENISA, ''Introduction to Country Reports'' (2010). Report funded and prepared by ENISA. | European Network and Information Security Agency (ENISA), ''Introduction to Country Reports'' (2010). Report funded and prepared by ENISA. | ||
[http://www.enisa.europa.eu/act/sr/files/country-reports/ | [http://www.enisa.europa.eu/act/sr/files/country-reports/enisa_country_reports_introduction.pdf ''Web''] | ||
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=ENISA:2010&f=wikibiblio.bib ''BibTeX''] | [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=ENISA:2010&f=wikibiblio.bib ''BibTeX''] | ||
Line 12: | Line 12: | ||
==Categorization== | ==Categorization== | ||
Issues: [[States]] | Issues: [[States]] | ||
Approaches: [[International Cooperation]]; [[Government Organization]] | Approaches: [[International Cooperation]]; [[Government Organization]] |
Latest revision as of 10:49, 17 June 2010
Full Title of Reference
Introduction to Country Reports
Full Citation
European Network and Information Security Agency (ENISA), Introduction to Country Reports (2010). Report funded and prepared by ENISA. Web
Categorization
Issues: States
Approaches: International Cooperation; Government Organization
Key Words
E.U. Cybersecurity, Outreach and Collaboration
Synopsis
This report was conducted to get a comprehensive overview on the status of Network and Information Security in Europe, including mapping of stakeholders and trends.
The report was prepared for and funded by ENISA and represents the results of a research project that took place between July and December 2008.
The aim of the project was to produce a series of country reports that provide an overview of the “state of the art” of NIS in each country regarding stakeholders, activities, events and current trends. We foccussed on security breaches in this first edition.
One of the most important aims of the report was a categorization and mapping of stakeholders and their mutual relations. The results of this are shown in the Key Stakeholders Overview section of each Country chapter.