Open Access

Issues in Cybersecurity: Security Challenges and Problems in the Dominican Republic


Cite

Ashford, W. (2017). Europe faces shortage of 350,000 cyber security professionals by 2022, available at: https://www.computerweekly.com/news/450420193/Europe-faces-shortage-of-350000-cyber-security-professionals-by-2022, accessed on: July 19, 2018.Search in Google Scholar

Burns, A., & Eltham, B. (2009). Twitter free Iran: An evaluation of Twitterʼs role in public diplomacy and information operations in Iranʼs 2009 election crisis.Search in Google Scholar

Bosman, J. (2017). The Storms Moved On. The Caribbean Islands Fear the Tourists Might, Too. available at: https://www.nytimes.com/2017/09/23/us/tourism-hurricane-economy-caribbean-islands.html, accessed on: July 19, 2018.Search in Google Scholar

Case, D. U. (2016). Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC).Search in Google Scholar

Clark, F. (2015). Generalities of the cybersecurity regulation in the members States of COMTELCA, available at: https://www.itu.int/en/ITU-D/Regional-Presence/Americas/Documents/EVENTS/2015/0910-PA-IXP/6%20Viernes%20SIT%20Clark%20Generalidades%20Regulaci%C3%B3n%20Ciberseguridad.pdfSearch in Google Scholar

Dawson, M. (2017). Hyper-connectivity: Intricacies of national and international cyber securities. (Doctoral dissertation). London, UK: London Metropolitan University.Search in Google Scholar

Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, 35(2), 60-67.10.1177/0266382118773624Search in Google Scholar

Dawson, M., Wang, P., & Williams, K. (2018). The Role of CAE-CDE in Cybersecurity Education for Workforce Development. Information Technology-New Generations, 15th International Conference on Information Technology, 127-132.10.1007/978-3-319-77028-4_20Search in Google Scholar

Isa, M. (2017). Crime without borders, another scourge of economic security and peace in the DR, available at: http://hoy.com.do/ciberdelincuencia-delito-sin-fronteras-otro-azote-a-la-seguridad-economica-y-sosiego-en-rd/Search in Google Scholar

ITU. (2009a). ICT Applications and Cybersecurity Background Note to the 2009 Pacific ICT Ministerial Forum, available at: http://www.itu.int/ITU-D/asp/CMS/Events/2009/PacMinForum/doc/Background%20Note-Theme-4-ICT%20Apps%20&%20Cybersecurity.pdfSearch in Google Scholar

ITU. (2009b). Cybercrime: A guide for developing countries, available at: https://www.itu.int/dms_pub/itu-d/oth/01/0B/D010B0000073301PDFS.pdfSearch in Google Scholar

National Congress of the Dominican Republic. (2007). Law number 53 of 2007, on “High Technology Crimes and Offenses”. Santo Domingo.Search in Google Scholar

Pultarova, T. (2016). News Briefing: Cyber security-Ukraine grid hack is wake-up call for network operators. Engineering & Technology, 11(1), 12-13.10.1049/et.2016.0116Search in Google Scholar

Republica Digital. (2018). Ciberseguridad, available at: from https://republicadigital.gob.do/eje/ciberseguridad/, accessed on: July 21, 2018.Search in Google Scholar

Wootson, C. R., Jr. (2018). Itʼs time to stop laughing at Nigerian scammers – because theyʼre stealing billions of dollars, available at: from https://www.washingtonpost.com/news/business/wp/2018/06/12/its-time-to-stop-laughing-at-nigerian-scammers-because-theyre-stealing-billions-of-dollars/?noredirect=on&utm_term=.e64a26210213, accessed on: June 27, 2018.Search in Google Scholar

Yunes, L. (2017, June 12). Personal interview.Search in Google Scholar