|
|
x | |
|
|
xi | |
|
|
xii | |
Foreword: Global cybersecurity in the 21st century by Brig. Gen. Steven J. Spano |
|
xxii | |
Introduction: cybersecurity strategy and policy in a comparative context |
|
1 | (8) |
|
|
|
|
9 | (240) |
|
1 Securing the kingdom's cyberspace: cybersecurity and cyber intelligence in Spain |
|
|
11 | (15) |
|
|
2 Albania's cybersecurity pivot: between Western architectures and great power competition |
|
|
26 | (10) |
|
|
|
3 Armenian national policy in cyber space: toward a global cyber security architecture |
|
|
36 | (15) |
|
|
4 Czech Republic: a new cyber security leader in Central Europe |
|
|
51 | (11) |
|
|
|
5 Cyber security in the French Republic |
|
|
62 | (11) |
|
|
|
6 Germany's cybersecurity strategy: confronting future challenges |
|
|
73 | (16) |
|
|
|
7 Cybersecurity of Poland: legal and organizational framework |
|
|
89 | (10) |
|
|
8 Hungary's evolving cyber security strategy |
|
|
99 | (12) |
|
|
|
9 Romanian cybersecurity efforts: a work in progress |
|
|
111 | (10) |
|
|
10 Italy's cyber security architecture and critical infrastructure |
|
|
121 | (11) |
|
|
|
|
11 Dutch cyber security strategy |
|
|
132 | (11) |
|
|
|
12 Norwegian cyber security: a small-state approach to building international cyber cooperation |
|
|
143 | (10) |
|
|
13 Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty |
|
|
153 | (12) |
|
|
14 Slovakia: the Tatra Tiger without teeth |
|
|
165 | (11) |
|
|
15 Slovenia: a fragmented cyber security |
|
|
176 | (9) |
|
|
16 In the line of Russian Ukraine, hybrid warfare, and cybersecurity defense aggression: Ukraine, hybrid warfare, and cybersecurity defense |
|
|
185 | (6) |
|
|
|
17 United Kingdom: pragmatism and adaptability in the cyber realm |
|
|
191 | (10) |
|
|
18 European Union: policy, cohesion, and supranational experiences with cybersecurity |
|
|
201 | (10) |
|
|
19 Estonia: from the "Bronze Night" to cybersecurity pioneers |
|
|
211 | (15) |
|
|
|
20 NATO's evolving cyber security policy and strategy |
|
|
226 | (23) |
|
|
|
|
PART II Asia and Australia |
|
|
249 | (144) |
|
21 Japan's challenges, capabilities, and preparedness in cyberspace |
|
|
251 | (16) |
|
|
|
|
22 An effective shield? Analyzing South Korea's cybersecurity strategy |
|
|
267 | (9) |
|
|
23 In the line of fire: Taiwan's legal, political, and technological cybersecurity posture |
|
|
276 | (8) |
|
|
|
|
24 Serving the people: China's cybersecurity policy and its implications |
|
|
284 | (13) |
|
|
|
|
25 Cybersecurity in a one-party state: policies and implications for Vietnam's economy and online freedom |
|
|
297 | (18) |
|
|
26 The Philippines' cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability |
|
|
315 | (10) |
|
|
|
27 Malaysia: balancing national development, national security, and cybersecurity policy |
|
|
325 | (12) |
|
|
28 Cyber governance and data protection in India: a critical legal analysis |
|
|
337 | (12) |
|
|
|
29 Cybersecurity: a national priority for Bangladesh |
|
|
349 | (7) |
|
|
30 Managing a digital revolution: cyber security capacity building in Myanmar |
|
|
356 | (11) |
|
|
|
31 Australia's cyber security: a unique opportunity |
|
|
367 | (14) |
|
|
32 Singapore: a leading actor in ASEAN cybersecurity |
|
|
381 | (12) |
|
|
|
393 | (56) |
|
33 Between multi-stakeholderism and cyber sovereignty: understanding Turkey's cybersecurity strategy |
|
|
395 | (14) |
|
|
34 Israel: cyber defense and security as national trademarks of international legitimacy |
|
|
409 | (9) |
|
|
35 Palestine: whose cyber security without cyber sovereignty? |
|
|
418 | (9) |
|
|
36 The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to Vision 2030 |
|
|
427 | (8) |
|
|
|
37 The Islamic Republic of Iran's cyber security strategy: challenges in an era of cyber uncertainty |
|
|
435 | (14) |
|
|
|
449 | (70) |
|
38 Canada's cyber security in a globalized environment: challenges and opportunities |
|
|
451 | (12) |
|
|
39 The United States: a declining hegemon in cyberspace? |
|
|
463 | (10) |
|
|
40 Jamaica's cybercrime and cyber-security: policies, laws, and strategies |
|
|
473 | (11) |
|
|
41 Mexico and cybersecurity: policies, challenges, and concerns |
|
|
484 | (10) |
|
Saul Mauricio Rodriguez-Hernandez |
|
|
|
42 Colombia's cybersecurity predicament: state making, strategic challenges, and cyberspace |
|
|
494 | (10) |
|
|
Char Augusto Nino Gonzalez |
|
|
43 Cyber security governance in Brazil: keeping silos or building bridges? |
|
|
504 | (15) |
|
|
|
|
519 | (104) |
|
44 Securitizing cyberspace in Egypt: the dilemma of cybersecurity and democracy |
|
|
521 | (13) |
|
|
|
45 Security through the Arab Winter: cyber strategies in post-revolutionary Tunisia |
|
|
534 | (9) |
|
|
46 Cyber security in Kenya: balancing economic security and internet freedom |
|
|
543 | (10) |
|
|
47 Cybersecurity policy in Nigeria: a tool for national security and economic prosperity |
|
|
553 | (11) |
|
|
48 Cybersecurity in Ghana: past, present, and future |
|
|
564 | (9) |
|
|
|
49 Building a cyber fortress in Africa: Uganda's cyber security capacities and challenges |
|
|
573 | (18) |
|
|
|
50 Cybersecurity in South Africa: status, governance, and prospects |
|
|
591 | (17) |
|
Raymond Steenkamp Fonseca |
|
|
|
51 Algorithms of oppression? AU's cybersecurity policy and its enforcement in Africa |
|
|
608 | (15) |
|
Index |
|
623 | |