{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:40:55Z","timestamp":1654116055457},"reference-count":5,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>Cyber Warfare holds a grave hazard of striking national infrastructure while circumventing traditional defense systems. This article examines the evolution of Critical Infrastructure Protection (CIP) policy in Israel and analyses its performance. Israel has developed a unique legal and regulatory model for critical infrastructure protection, which was implemented in late 2002. Recently, a comprehensive review of cyber security posture has been conducted, and significant policy changes are in progress. The Israeli approach to CIP and beyond, fostering cooperation between public, security, academic and private sectors, appears to be successful. This study of the evolution of Israeli Critical Infrastructure Protection policy may assist policy-making in other countries.<\/p>","DOI":"10.4018\/ijcwt.2013070106","type":"journal-article","created":{"date-parts":[[2014,3,31]],"date-time":"2014-03-31T18:09:19Z","timestamp":1396289359000},"page":"80-87","source":"Crossref","is-referenced-by-count":2,"title":["Critical Infrastructure Protection"],"prefix":"10.4018","volume":"3","author":[{"given":"L.","family":"Tabansky","sequence":"first","affiliation":[{"name":"Yuval Ne'eman Workshop for Science, Technology and Security, Tel Aviv University, Tel Aviv, Israel"}]}],"member":"2432","reference":[{"key":"ijcwt.2013070106-0","doi-asserted-by":"crossref","unstructured":"Assaf, D. (2008). Critical information infrastructure protection policy in Israel. The CIP Report, 6(12).","DOI":"10.1016\/j.ijcip.2008.08.004"},{"key":"ijcwt.2013070106-1","author":"M.Boot","year":"2006","journal-title":"War made new: Technology, warfare, and the course of history, 1500 to today"},{"key":"ijcwt.2013070106-2","author":"A.Gat","year":"2006","journal-title":"War in human civilization"},{"key":"ijcwt.2013070106-3","unstructured":"Grauman, B. (2012). Cyber-security: The vexed question of global rules: An independent report on cyber-preparedness around the world. Brussels: Security & Defence Agenda (SDA)."},{"key":"ijcwt.2013070106-4","unstructured":"NCR&D. (2011). The national cyber initiative \u2013 a special report for the Prime Minister. Tel Aviv."}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=104525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:02:09Z","timestamp":1654113729000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013070106"}},"subtitle":["Evolution of Israeli Policy"],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":5,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013070106","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}