Chapter 6 Chapter 6
Restricted access

This chapter summarizes the research done and presented in the book; it also identifies a set of recommendations for future research, specifically longitudinal country analysis to provide more depth in the impact of cybersecurity policy on the protection of cyber space.

You are not authenticated to view the full text of this chapter or article.

Access options

Get access to the full article by using one of the access options below.

Other access options

Redeem Token

Institutional Login

Log in with Open Athens, Shibboleth, or your institutional credentials

Login via Institutional Access

Personal login

Log in with your Elgar Online account

Login with you Elgar account
Monograph Book