Publication
Kosovo – Law No. 08/L-173 on Cyber Security
Authors
Year
- 2023
Description
- The law passed by the Assembly of Kosovo in February 2023 establishes the principles of cyber securi…
Kosovo – Law No. 08/L-173 on Cyber Security
The law passed by the Assembly of Kosovo in February 2023 establishes the principles of cyber security, outlines the responsibilities of authorities, and promotes inter-institutional cooperation to prevent and combat cybercrime, ultimately leading to the creation of the Cyber Security Agency. Additionally, the law partially transposes European Union directives (EU) […]
Publication
Kosovo’s National Cybersecurity Strategy (2023 – 2027)
Authors
Year
- 2023
Description
- This strategy focuses on advancing legislation and institutional framework, enhancing cybersecurity …
Kosovo’s National Cybersecurity Strategy (2023 – 2027)
This strategy focuses on advancing legislation and institutional framework, enhancing cybersecurity awareness, fostering national and international cooperation, supporting private sector development, and embracing public-private partnerships. It also places a strong emphasis on building a sustainable workforce and increasing capabilities in cyber investigation and defence.
Publication
Emerging Practices in Cybersecurity-Related Public-Private Partnerships and Collaboration in OSCE participating States
Authors
Year
- 2023
Description
- This report is the result of research conducted on concrete examples of public-private partnerships …
Emerging Practices in Cybersecurity-Related Public-Private Partnerships and Collaboration in OSCE participating States
This report is the result of research conducted on concrete examples of public-private partnerships (PPPs) for cyber/ICT security in OSCE participating States. It presents emerging practices in PPPs as baseline recommendations and organizes them under the rubrics of purpose, policy, process and people. This report could be used as a […]
Publication
Guidelines on cybercrime investigation
Authors
Year
- 2022
Description
- This publication serves as a comprehensive guide for understanding and addressing computer-related c…
Guidelines on cybercrime investigation
This publication serves as a comprehensive guide for understanding and addressing computer-related crimes, offering guidance from the initial receipt of a crime complaint through the planning of suspect arrests and digital media seizures. It aims to simplify the complexities of technology and the internet for public prosecution offices and law […]
Publication
The role of technology in preventing and combating organized crime, finacial and corruption : international academic conference : book of proceedings
Authors
Year
- 2022
Description
- This publication explores various aspects of the intersection between technology and criminal law, c…
The role of technology in preventing and combating organized crime, finacial and corruption : international academic conference : book of proceedings
This publication explores various aspects of the intersection between technology and criminal law, covering topics such as corporate criminal liability in the context of new technologies, the use of technology in preventing and investigating economic crimes, cybercrime, and its impact on human rights and privacy. It also delves into issues […]
Publication
Protecting Transnational Critical Information Infrastructure: Vitality, Vulnerability and Diplomacy
Authors
Year
- 2023
Description
- This paper considers how the governance of transnational critical information infrastructure (CII) c…
Protecting Transnational Critical Information Infrastructure: Vitality, Vulnerability and Diplomacy
This paper considers how the governance of transnational critical information infrastructure (CII) could be approached at the global level. It suggests that when one is thinking about the (potential) governance of CII, it is important to recognise that not all infrastructure that is critical is also necessarily vulnerable
Publication
Western Balkan CERT Cooperation
Year
- 2021
Description
- This publication focuses on providing concrete proposals for enhancing cooperation among national Co…
Western Balkan CERT Cooperation
This publication focuses on providing concrete proposals for enhancing cooperation among national Computer Security Incident Response Teams (CSIRTs) in the Western Balkans. It addresses questions related to areas of cooperation, successful CSIRT networks, and strategies for improving multilateral cooperation, while considering individual capacities and capabilities of the participating CSIRTs. Additional […]
Publication
Kosovo’s Take on Cybersecurity
Authors
Year
- 2023
Description
- This security brief discusses the surge in cybercrimes in Kosovo in 2014 and the subsequent developm…
Kosovo’s Take on Cybersecurity
This security brief discusses the surge in cybercrimes in Kosovo in 2014 and the subsequent development of a National Cyber Security Strategy and Action Plan. It highlights the impact of cyberattacks on Kosovo’s economy and societal stability and presents challenges in cybersecurity education, ultimately proposing measures to enhance cybersecurity in […]
Publication
Introduction to Computer Security Incident Response Teams (CSIRTs): Structures and Functions of Cybersecurity’s First Responders
Authors
Year
- 2024
Description
- This Guidebook is intended to help, in particular, new employees of Computer Security Incident Respo…
Introduction to Computer Security Incident Response Teams (CSIRTs): Structures and Functions of Cybersecurity’s First Responders
This Guidebook is intended to help, in particular, new employees of Computer Security Incident Response Teams (CSIRTs) (though it is likely relevant for existing CSIRT employees) understand the structure of CSIRTs, and clarify the expectations and how they can best be achieved.
Publication
Cybersecurity and Human Rights in the Western Balkans: Mapping Governance and Actors
Authors
Year
- 2024
Description
- Description This publication focuses on mapping cybersecurity-related human rights opportunities and…
Cybersecurity and Human Rights in the Western Balkans: Mapping Governance and Actors
Description This publication focuses on mapping cybersecurity-related human rights opportunities and challenges in WB. There are six chapters in total, one for each economy in the Western Balkans. Each begins with essential conceptual background information regarding the cybersecurity and human rights contexts of each economy. Finally, they present ways forward, […]
Publication
Geneva Manual on Responsible State Behaviour: Implementation of Norms of Responsible Behaviour in Cyberspace by Relevant Non-State Stakeholders
Authors
Year
- 2023
Description
- This document stems from the Geneva Dialogue on Responsible Behaviour in Cyberspace, which investiga…
Geneva Manual on Responsible State Behaviour: Implementation of Norms of Responsible Behaviour in Cyberspace by Relevant Non-State Stakeholders
This document stems from the Geneva Dialogue on Responsible Behaviour in Cyberspace, which investigates the consequences of agreed upon norms for relevant non-state stakeholders from the private sector, academia, civil society, and technical community, and tries to clarify their roles and responsibilities. It does not aim to find consensus, but […]
Publication
‘Leapfrogging’ or ‘lagging’?: highlighting critical information infrastructure protection challenges and opportunities in Egypt and Nigeria
Year
- 2024
Description
- Emerging economies are experiencing dramatic rises in internet penetration, along with an expansion …
‘Leapfrogging’ or ‘lagging’?: highlighting critical information infrastructure protection challenges and opportunities in Egypt and Nigeria
Emerging economies are experiencing dramatic rises in internet penetration, along with an expansion of cyber-dependent critical infrastructure. Nevertheless, in many countries and regions, critical information infrastructure protection (CIIP) efforts remain at a relatively nascent stage. Early and widespread approaches to critical information infrastructure protection are informed by higher income, early […]
Publication
Ghana : A Case Study in Strengthening Cyber Resilience
Authors
Year
- 2023
Description
- The case study of Ghana demonstrates that forward-looking investments and policy initiatives based o…
Ghana : A Case Study in Strengthening Cyber Resilience
The case study of Ghana demonstrates that forward-looking investments and policy initiatives based on international best-practices can go a long way in boosting cybersecurity capacity in developing countries. Ghana has significantly enhanced its cyber resilience, with an increased capacity to detect, respond to and recover from cybersecurity incidents. The country […]
Tool
CyberPeace Academy
Authors
Year
- 2024
Description
- CyberPeace Academy offers either complete beginners or those already on their way of becoming an exp…
CyberPeace Academy
CyberPeace Academy offers either complete beginners or those already on their way of becoming an expert a variety of trainings from more general to more specific ones, provided by experts at the CyberPeace Institute. Basic Trainings (1h30min): General Cyber Awareness Training (for NGOs) 90 Minutes to Avoid 90% of Cyber […]
Tool
Methodology to Classify Unsolicited Email Threats
Authors
Year
- 2024
Description
- Email, a fundamental form of communication, faces increasing threats from unsolicited messages. Diff…
Methodology to Classify Unsolicited Email Threats
Email, a fundamental form of communication, faces increasing threats from unsolicited messages. Differentiating these types of threats is essential to take appropriate mitigation measures and deploy effective security controls. This research delves into the complexities of this issue, examining the diverse categories, inherent threats, and the role of language in […]