This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Braw, E. (2022). The Defender’s Dilemma: Identifying and Deterring Gray-Zone Aggression. Rowman & Littlefield. AEI Press, ISBN-10 : 0844750409, SBN-13 : 978-0844750408BrawE.2022The Defender’s Dilemma: Identifying and Deterring Gray-Zone AggressionRowman & LittlefieldAEI Press, ISBN-10 : 0844750409, SBN-13 : 978-0844750408Search in Google Scholar
Department for Digital, Culture, Media & Sport, National Cyber Security Centre, & Dowden, O. (2020, July 14). Press release: Huawei to be removed from UK 5G networks by 2027: Decision follows a technical review by the National Cyber Security Centre in response to US sanctions. Retrieved from: https://www.gov.uk/government/news/huawei-to-be-removed-from-uk-5g-networks-by-2027Department for Digital, Culture, Media & Sport, National Cyber Security CentreDowdenO.2020July14Press release: Huawei to be removed from UK 5G networks by 2027: Decision follows a technical review by the National Cyber Security Centre in response to US sanctionsRetrieved from: https://www.gov.uk/government/news/huawei-to-be-removed-from-uk-5g-networks-by-2027Search in Google Scholar
Department for Science, Innovation & Technology. (2023, April 19). Cyber security breaches survey 2023: Education institutions annex. Retrieved from: https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2023/cyber-security-breaches-survey-2023-education-institutions-annexDepartment for Science, Innovation & Technology2023April19Cyber security breaches survey 2023: Education institutions annexRetrieved from: https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2023/cyber-security-breaches-survey-2023-education-institutions-annexSearch in Google Scholar
European Commission. (2020). EU toolbox on 5G cybersecurity. Retrieved from: https://ec.europa.eu/commission/presscorner/detail/en/qanda_20_127European Commission2020EU toolbox on 5G cybersecurityRetrieved from: https://ec.europa.eu/commission/presscorner/detail/en/qanda_20_127Search in Google Scholar
European Parliament & Council of the European Union. (2022). Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No. 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive). Official Journal of the European Union, L 333, 80. Retrieved from: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555European Parliament & Council of the European Union2022Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No. 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive)Official Journal of the European UnionL 33380Retrieved from: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555Search in Google Scholar
Henry Jackson Society. (2023). Research collaboration with high-risk countries: What does the UK public think? Retrieved from: https://henryjacksonsociety.org/publications/research-collaboration-with-high-risk-countries-what-does-the-uk-public-think/Henry Jackson Society2023Research collaboration with high-risk countries: What does the UK public think?Retrieved from: https://henryjacksonsociety.org/publications/research-collaboration-with-high-risk-countries-what-does-the-uk-public-think/Search in Google Scholar
International Organization for Standardization. (2019). ISO 22301:2019 – Security and resilience – Business continuity management systems – Requirements. Retrieved from: https://www.iso.org/standard/75106.htmlInternational Organization for Standardization2019ISO 22301:2019 – Security and resilience – Business continuity management systems – RequirementsRetrieved from: https://www.iso.org/standard/75106.htmlSearch in Google Scholar
Ivanov, H. (2023). Research collaboration with high-risk countries: What does the UK public think? Retrieved from: https://henryjacksonsociety.org/publications/research-collaboration-with-high-risk-countries-what-does-the-uk-public-think/IvanovH.2023Research collaboration with high-risk countries: What does the UK public think?Retrieved from: https://henryjacksonsociety.org/publications/research-collaboration-with-high-risk-countries-what-does-the-uk-public-think/Search in Google Scholar
Kost, E. (2024). The state of university cybersecurity: 3 major problems in 2024. UpGuard. Retrieved from: https://www.upguard.com/blog/top-cybersecurity-problems-for-universities-collegesKostE.2024The state of university cybersecurity: 3 major problems in 2024UpGuardRetrieved from: https://www.upguard.com/blog/top-cybersecurity-problems-for-universities-collegesSearch in Google Scholar
National Cyber Security Centre. (2021, June 4). Alert: Targeted ransomware attacks on UK education sector. Retrieved from: https://www.ncsc.gov.uk/news/alert-targeted-ransomware-attacks-on-uk-education-sector#section_1National Cyber Security Centre2021June4Alert: Targeted ransomware attacks on UK education sectorRetrieved from: https://www.ncsc.gov.uk/news/alert-targeted-ransomware-attacks-on-uk-education-sector#section_1Search in Google Scholar
Piazza, A., Vasudevan, A., Carr, M. (2023). Cybersecurity in UK universities: Mapping (or managing) threat intelligence sharing within the higher education sector. Journal of Cybersecurity, 9 (1). tyad019. https://doi.org/10.1093/cybsec/tyad019PiazzaA.VasudevanA.CarrM.2023Cybersecurity in UK universities: Mapping (or managing) threat intelligence sharing within the higher education sectorJournal of Cybersecurity91tyad019https://doi.org/10.1093/cybsec/tyad019Search in Google Scholar
Rakstiņš, V., Palkova, K., Sprūds, A., Agapova, O. (2024). ‘Minimising the risks of foreign influence in research and academic context’, in M. Nechyporuk, V. Pavlikov, and D. Krytskyi (eds), Integrated computer technologies in mechanical engineering – 2023. ICTM 2023 (Vol. 996, pp. 89–103). Springer. https://doi.org/10.1007/978-3-031-60549-9_RakstiņšV.PalkovaK.SprūdsA.AgapovaO.2024‘Minimising the risks of foreign influence in research and academic context’inNechyporukM.PavlikovV.KrytskyiD.(eds),Integrated computer technologies in mechanical engineering – 2023. ICTM 202399689103Springerhttps://doi.org/10.1007/978-3-031-60549-9_Search in Google Scholar
Schwartz, N. (2023). Data breaches cost higher education and training organizations $3.7M on average in 2023. Higher Ed Dive. Retrieved from: https://www.highereddive.comSchwartzN.2023Data breaches cost higher education and training organizations $3.7M on average in 2023Higher Ed DiveRetrieved from: https://www.highereddive.comSearch in Google Scholar
Sharma, Y., Black, R. (2021, February 9). Scrutiny Surrounds Genetic Sequencing Giant, as US and Australia Investigate Equipment Donation. ABC News. Retrieved from: https://www.abc.net.au/news/2021-02-09/scrutiny-surrounds-giant-genome-sequencing-firm-bgi/13126514SharmaY.BlackR.2021February9Scrutiny Surrounds Genetic Sequencing Giant, as US and Australia Investigate Equipment DonationABC NewsRetrieved from: https://www.abc.net.au/news/2021-02-09/scrutiny-surrounds-giant-genome-sequencing-firm-bgi/13126514Search in Google Scholar
U.S. Department of State. (2021). The Clean Network. Retrieved from: https://2017-2021.state.gov/the-clean-network/index.htmlU.S. Department of State2021The Clean NetworkRetrieved from: https://2017-2021.state.gov/the-clean-network/index.htmlSearch in Google Scholar
UK Government. (2023). National Security and Investment Act: Guidance for the higher education and research-intensive sectors. Retrieved from: https://www.gov.uk/government/publications/national-security-and-investment-act-guidance-for-the-higher-education-and-research-intensive-sectors/national-security-and-investment-act-guidance-for-the-higher-education-and-research-intensive-sectorsUK Government2023National Security and Investment Act: Guidance for the higher education and research-intensive sectorsRetrieved from: https://www.gov.uk/government/publications/national-security-and-investment-act-guidance-for-the-higher-education-and-research-intensive-sectors/national-security-and-investment-act-guidance-for-the-higher-education-and-research-intensive-sectorsSearch in Google Scholar
University Foreign Interference Taskforce. (2021). Guidelines to counter foreign interference in the Australian university sector. Retrieved from: https://www.education.gov.au/guidelines-counter-foreign-interference-australian-university-sectorUniversity Foreign Interference Taskforce2021Guidelines to counter foreign interference in the Australian university sectorRetrieved from: https://www.education.gov.au/guidelines-counter-foreign-interference-australian-university-sectorSearch in Google Scholar
White House Office of Trade and Manufacturing Policy. (2018). How China’s economic aggression threatens the technologies and intellectual property of the United States and the world. Retrieved from: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/06/FINAL-China-Technology-Report-6.18.18-PDF.pdfWhite House Office of Trade and Manufacturing Policy2018How China’s economic aggression threatens the technologies and intellectual property of the United States and the worldRetrieved from: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/06/FINAL-China-Technology-Report-6.18.18-PDF.pdfSearch in Google Scholar