Open Access

Study on Japan’s Cybersecurity Strategy and Regional Cybersecurity Construction in the Face of Global Competition

  
Oct 04, 2024

Cite
Download Cover

Yamada, R. (2024). Impact of Cybersecurity Regulations on Corporate Compliance Practices in Japan. International Journal of Law and Policy, 9(2), 28-38. Search in Google Scholar

Akimoto, D. (2021). Japan’s Multi-Domain Defense Force: The Space, Cyber, and Electromagnetic Domains. Institute for Security & Development Policy, Stockholm, Sweden. Search in Google Scholar

Kim, N., & Lee, S. (2021). Cybersecurity breach and crisis response: An analysis of organizations’ official statements in the United States and South Korea. International Journal of Business Communication, 58(4), 560-581. Search in Google Scholar

Beuran, R., Tang, D., Pham, C., Chinen, K. I., Tan, Y., & Shinoda, Y. (2018). Integrated framework for hands-on cybersecurity training: CyTrONE. Computers & Security, 78, 43-59. Search in Google Scholar

Harold, S. W., Nakagawa, Y., Fukuda, J., Davis, J. A., Kono, K., Cheng, D., & Suzuki, K. (2017). The US-Japan alliance and deterring gray zone coercion in the maritime, cyber, and space domains. Santa Monica: Rand Corporation. Search in Google Scholar

Mohamed Mizan, N. S., Ma’arif, M. Y., Mohd Satar, N. S., & Shahar, S. M. (2019). CNDS-cybersecurity: issues and challenges in ASEAN countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(1.4). Search in Google Scholar

Teoh, C. S., & Mahmood, A. K. (2017, July). National cyber security strategies for digital economy. In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE. Search in Google Scholar

Beuran, R., Pham, C., Tang, D., Chinen, K. I., Tan, Y., & Shinoda, Y. (2018). Cybersecurity education and training support system: CyRIS. IEICE TRANSACTIONS on Information and Systems, 101(3), 740-749. Search in Google Scholar

Matsuda, W., Fujimoto, M., Aoyama, T., & Mitsunaga, T. (2019, November). Cyber security risk assessment on industry 4.0 using ics testbed with ai and cloud. In 2019 IEEE conference on application, information and network security (AINS) (pp. 54-59). IEEE. Search in Google Scholar

Kim, E., & Beuran, R. (2018, October). On designing a cybersecurity educational program for higher education. In Proceedings of the 10th International Conference on Education Technology and Computers (pp. 195-200). Search in Google Scholar

Vosse, W. (2023). A conceptional broadening of the security order in the Indo-Pacific: The role of EU-Japan cooperation in ICT and cybersecurity. In Alliances in Asia and Europe (pp. 163-184). Routledge. Search in Google Scholar

Osawa, J. (2017). The escalation of state sponsored cyberattack and national cyber security affairs: Is strategic cyber deterrence the key to solving the problem?. Asia-Pacific Review, 24(2), 113-131. Search in Google Scholar

Panneerselvam, P., & Mohan, V. (2023). India-Japan Emerging Cooperation in Cybersecurity. In Seventy Years of India-Japan Diplomatic Relations (pp. 140-153). Routledge. Search in Google Scholar

Douha, N. G. Y. R., Renaud, K., Taenaka, Y., & Kadobayashi, Y. (2023). Smart home cybersecurity awareness and behavioral incentives. Information & Computer Security, 31(5), 545-575. Search in Google Scholar

Kallender, P., & Hughes, C. W. (2017). Japan’s emerging trajectory as a ‘cyber power’: from securitization to militarization of cyberspace. Journal of Strategic Studies, 40(1-2), 118-145. Search in Google Scholar

Jun Osawa.(2023).Direction of Japan’s New Cybersecurity Policy.Asia-Pacific Review(3),63-78. Search in Google Scholar

Dahanayaka Thilini,Ginige Yasod,Huang Yi,Jourjon Guillaume & Seneviratne Suranga.(2023).Robust open-set classification for encrypted traffic fingerprinting.Computer Networks Search in Google Scholar

Miyamoto Henrique K.,Meneghetti Fábio C. C. & Costa Sueli I. R..(2022).The Fisher–Rao loss for learning under label noise.Information Geometry(1),107-126. Search in Google Scholar

Niu Lu,Li Zhenping & Li Shaobo.(2024).MMD Fence GAN Unsupervised Anomaly Detection Model Based on Maximum Mean Discrepancy.International Journal of Cognitive Informatics and Natural Intelligence (IJCINI)(1),1-13. Search in Google Scholar

Nihat Daldal,Kemal Polat & Yanhui Guo.(2019).Classification of multi-carrier digital modulation signals using NCM clustering based feature-weighting method.Computers in Industry45-58. Search in Google Scholar

Language:
English