[AMORETTI, Francesco. ICTs Policies: E-Democracy and E-Government for Political Development, 2007.10.1111/j.1541-1338.2007.00286.x]Search in Google Scholar
[BEBBER, Robert “Jake”. Cyber power and cyber effectiveness: An analytic framework. Comparative Strategy, 2017, vol. 36, no. 5, pp. 426–436.10.1080/01495933.2017.1379833]Search in Google Scholar
[BOYD, Stephen, ---amp--- KEROMYTIS, Angelos, SQLrand: Preventing SQL injection attacks. In International Conference on Applied Cryptography and Network Security, 2004, pp. 292–302. Springer, Berlin, Heidelberg.10.1007/978-3-540-24852-1_21]Search in Google Scholar
[CARR, Madeline. Public–private partnerships in national cyber-security strategies. International Affairs, 2016, vol. 92, no. 1, pp. 43–62.10.1111/1468-2346.12504]Search in Google Scholar
[CHEE-WOOI, Ten. CHEN-CHING, Liu. GOVINDARSU, Manimaran. Vulnerability assessment of cybersecurity for SCADA systems. IEEE Transactions on Power Systems, 2008, vol. 23, no. 4, pp. 1836–1846.10.1109/TPWRS.2008.2002298]Search in Google Scholar
[CHOCHIA, Archil ---amp--- POPJANEVSKI, Johanna. Change of Power and Its Influence on Country’s Europeanization Process. Case Study: Georgia. In: KERIKMÄE, Tanel. CHOCHIA, A. (Eds.). Political and Legal Perspectives of the EU Eastern Partnership Policy, Cham: Springer, 2016, pp. 197–210.]Search in Google Scholar
[CHOCHIA, Archil ---amp--- KERIKMÄE, Tanel. Digital Single Market as an Element in EU-Georgian Cooperation. Baltic Journal of European Studies, 2018, vol. 8, no. 2, pp. 3–6.10.1515/bjes-2018-0012]Search in Google Scholar
[CHARAIA, Vakhtang, CHOCHIA, Archil, LASHKHI, Mariam. Caucasus 3 plus Baltic 3 and Economic Cooperation with China. Baltic Journal of European Studies, 2018, vol. 8, no. 2, pp. 44–64.10.1515/bjes-2018-0015]Search in Google Scholar
[DE BRUIJN, Hans ---amp--- JANSSEN, Marijn. Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 2017, vol. 34, no. 1, pp. 1–7.10.1016/j.giq.2017.02.007]Search in Google Scholar
[DADIANI, Natalia. Kindergarten web-portal failure. Online, Retrieved from: https://www.ambebi.ge/article/106265-sabavshvo-bagis-garet-darchenili-bavshvebida-gamcarebuli-mshoblebi-mougvarebeli-problemis-mizezebi-da-shedegebi/ Accessed: 12.11.2019.]Search in Google Scholar
[DUNN CAVELTY, Myriam. Europe’s cyber-power. European Politics and Society, 2018, vol. 19, no. 3, pp. 304–320.10.1080/23745118.2018.1430718]Search in Google Scholar
[E-Governance Academy. NCSI-National Cyber Security Index, 2018. Online; Available at: https://ega.ee/wp-content/uploads/2018/05/ncsi_digital_smaller.pdf; Accessed: 15.09.2019.]Search in Google Scholar
[European Union Agency for Cybersecurity (ENISA). National Cybersecurity Strategies Evaluation Tool. Available at: https://www.enisa.europa.eu/topics/national-cyber-security-strategies/national-cyber-security-strategies-guidelines-tools/national-cyber-security-strategies-evaluation-tool Accessed: 10.11.2019.]Search in Google Scholar
[HEEKS, Richard. Understanding e-governance for development. Manchester: Institute for Development Policy and Management, 2001.10.2139/ssrn.3540058]Search in Google Scholar
[International Telecommunication Union. Global Cybersecurity Index (GCI) 2017. Online; Available at: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf; Accessed: 15.09.2019.]Search in Google Scholar
[International Telecommunication Union. Global Cybersecurity Index (GCI) 2018. Online. Available at https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf; Accessed: 15.09.2019.]Search in Google Scholar
[International Telecommunication Union. Definition of cybersecurity. Online; Available at: https://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx; Accessed: 15.09.2019]Search in Google Scholar
[KERIKMÄE, Tanel ---amp--- RULL, Addi. The Future of Law and eTechnologies. Heidelberg: Springer-Verlag, 2016.10.1007/978-3-319-26896-5]Search in Google Scholar
[KERIKMÄE, Tanel, HOFFMANN, Thomas, CHOCHIA, Archil. Legal Technology for Law Firms: Determining Roadmaps for Innovation. Croatian International Relations Review, 2018, vol. 24, no. 81, pp. 91–112.10.2478/cirr-2018-0005]Search in Google Scholar
[LEPIK, Toomas ---amp--- TABATADZE, David. Estoniana ---amp--- Georgian Cyber Attacks. 21stAnnual FIRST Conference, Kyoto, June 28 – July 3, 2009. Online, Available at: https://www.first.org/resources/papers/conference2009/lepiktabatadze-sliders.pdf Accessed: 15.10.2019.]Search in Google Scholar
[LOMIDZE, Irakli. Cyber Attacks Against Georgia. Report for Georgian It Innovations; Online; Data exchange agency, 2011; Retrieved from: http://dea.gov.ge/uploads/GITI%202011/GITI2011_3.pdf; Accessed: 15.09.2019.]Search in Google Scholar
[LUIIJF, Eric, BESSELING, Kim, SPOELSTRA, Maartje, GRAAF, Patrick. Ten National Cyber Security Strategies: a Comparison: Critical Information Infrastructure Security, 2013.10.1007/978-3-642-41476-3_1]Search in Google Scholar
[MADON, Shirin. Evaluating the developmental impact of e-governance initiatives: An exploratory framework. The Electronic Journal of Information Systems in Developing Countries, 2004, vol. 20, no. 1, pp. 1–13.10.1002/j.1681-4835.2004.tb00132.x]Search in Google Scholar
[Ministry of Defence of Georgia. Threat Assessment Document for 2010–2013. Retrieved from: https://mod.gov.ge/uploads/2018/pdf/TAD-ENG.pdf Accessed: 02.10.2019.]Search in Google Scholar
[Ministry of Defence of Georgia. Cyber Security Bureau. Retrieved from: https://mod.gov.ge/en/page/59/cyber-security-bureau Accessed: 02.10.2019.]Search in Google Scholar
[Ministry of Internal Affairs of Georgia. Actions carried out by the ministry of internal affairs of Georgia. Retrieved from: https://police.ge/en/projects/kiberdanashauli/shinagan-saqmeta-saministros-mier-gankhortsielebuli-ghonisdziebebi Accessed: 02.10.2019]Search in Google Scholar
[MIRKOVIC, Jelena. ---amp--- REIHER, Peter. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 2004, vol. 34, no. 2, pp. 39–53.10.1145/997150.997156]Search in Google Scholar
[North Atlantic Treaty Organization (NATO). Cyber defence. Online. Retrieved from: https://www.nato.int/cps/en/natohq/topics_78170.htm; Accessed: 20.10.2019]Search in Google Scholar
[PALVIA, Shailendra. ---amp--- SHARMA, Sushil. E-government and e-governance: definitions/domain framework and status around the world. In International Conference on E-governance, 2007, pp. 1–12.]Search in Google Scholar
[RIOS, Billy. Sun Tzu was a hacker: An examination of the tactics and operations from a real world cyber attack. In: CZOSSEC, Christian ---amp--- Geers, Kenneth (Eds.) The Virtual Battlefield: Perspectives on Cyber Warfare, 2009, vol. 3, pp. 143–155.]Search in Google Scholar
[SCHLAMP, Johann. HOLZE, Ralph. JACQUEMART, Quentin. HEAP: reliable assessment of BGP hijacking attacks. IEEE Journal on Selected Areas in Communications, 2016, vol. 34, no. 6, pp. 1849–1861.10.1109/JSAC.2016.2558978]Search in Google Scholar
[SVANADZE, Vladimer. Akhali gamotsveva saqartvelos internet sivrcistvis [ახალი გამოწვევა საქართველოს ინტერნეტ სივრცისთვის]. Internet Development Initiative – IDI, 2015. Retrieved from: http://indein.net/wp-content/uploads/2015/09/New-Challenges-for-Georgian-Cyber-Space.pdf; Accessed: 15.09.2019;]Search in Google Scholar
[TAMBUR, Silver. How Estonia became a global heavyweight in cyber security, 2017. Online. Available at: http://estonianworld.com/security/estonia-became-global-heavyweight-cyber-security/; Accessed: 16.09.2019;]Search in Google Scholar
[TOLBERT, Caroline J., and MOSSBERGER, Karen. The effects of e-government on trust and confidence in government. Public administration review, 2006, vol. 66, no. 3, pp. 354–369.10.1111/j.1540-6210.2006.00594.x]Search in Google Scholar
[UN E-Government Survey 2010; Online. Available at: https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-Government-Survey-2010; Accessed: 16.09.2019.]Search in Google Scholar
[UN E-Government Survey 2018. Online. Available at: https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-Government-Survey-2018; Accessed: 16.09.2019.]Search in Google Scholar
[VALUCH, Jozef; GÁBRIŠ, Tomáš; HAMUĽÁK, Ondrej. Cyber attacks, information attacks, and postmodern warfare. Baltic Journal of Law ---amp--- Politics, 2017, vol. 10, no. 1, pp. 63–89.10.1515/bjlp-2017-0003]Search in Google Scholar
[VALUCH, Jozef; HAMUĽÁK, Ondrej. Abuse of cyberspace within the crisis in Ukraine.” The Lawyer Quarterly, 2018, vol. 8, no. 2, 94–107.]Search in Google Scholar
[ZINETS, Natalia. Ukraine hit by 6,500 hack attacks, sees Russian ‘cyberwar’, Reuters. Online, Retrieved from: https://www.reuters.com/article/us-ukraine-crisis-cyber/ukraine-hit-by-6500-hack-attacks-sees-russian-cyberwar-idUSKBN14I1QC Accessed: 17.10.2019.]Search in Google Scholar