Atjaunināt sīkdatņu piekrišanu

Routledge Companion to Global Cyber-Security Strategy [Hardback]

Edited by (Regent University, USA), Edited by (University of South Wales, UK)
  • Formāts: Hardback, 24 pages, height x width: 246x174 mm, weight: 1370 g, 18 Tables, black and white; 16 Line drawings, black and white; 2 Halftones, black and white; 18 Illustrations, black and white
  • Izdošanas datums: 29-Jan-2021
  • Izdevniecība: Routledge
  • ISBN-10: 0367024233
  • ISBN-13: 9780367024239
  • Hardback
  • Cena: 288,80 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Bibliotēkām
  • Formāts: Hardback, 24 pages, height x width: 246x174 mm, weight: 1370 g, 18 Tables, black and white; 16 Line drawings, black and white; 2 Halftones, black and white; 18 Illustrations, black and white
  • Izdošanas datums: 29-Jan-2021
  • Izdevniecība: Routledge
  • ISBN-10: 0367024233
  • ISBN-13: 9780367024239
"This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, and Asia. The volume offers an introduction to eachnation's cybersecurity strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contain the following sections: overview of national cybersecurity strategy; concepts and definitions; exploration of cybersecurity issues as they relate to international law and governance; critical examinations of cyber partners at home and abroad; legislative developments and processes; dimensions of cybercrime and cyberterrorism; implications of cybersecurity policies and strategies. This handbook will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy and International Relations"--

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa and Asia.

The volume offers an introduction to each nation’s cybersecurity strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contain the following sections:

  • overview of national cybersecurity strategy;
  • concepts and definitions;
  • exploration of cybersecurity issues as they relate to international law and governance;
  • critical examinations of cyber partners at home and abroad;
  • legislative developments and processes;
  • dimensions of cybercrime and cyberterrorism;
  • implications of cybersecurity policies and strategies.

This handbook will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy and International Relations.

Recenzijas

'To create this omnibus collection, Romaniuk (Univ. of Alberta) and Manjikian (Regent Univ.) gathered the most comprehensive possible set of essays on national cybersecurity policies. Each of the 51 chapters provides an up-to-date summary and analysis of a single country's cybersecurity situation and strategies. Hostile-state actors, online terrorists, organized criminal groups, black hat hackers, and other bad actors all must be countered through sophisticated advance planning. Defenders are generally at a significant disadvantage against their nimbler attackers. Policies vary according to how each nation defines and prioritizes the potential threats. An authoritarian government, for example, will be far more concerned with controlling politically sensitive information that might undermine the power of the ruling regime than a more democratic nation. A maritime country is likely to prioritize different defenses than one that is landlocked. Countries that were once parts of the former Soviet Union fear hybrid warfare attacks that might be launched from Russia. Although the individual essays provide fine summaries of the unique laws, political forces, and social dynamics obtaining in each nation discussed, the book as a whole would have been greatly enhanced by expanding the editors' nine-page introduction to further integrate the themes drawn from these diverse contributions.

Summing Up: Recommended. Upper-division undergraduates. Graduate students, faculty, and professionals.'

--T. H. Koenig, Northeastern University, Choice, December 2022

List of figures
x
List of tables
xi
List of contributors
xii
Foreword: Global cybersecurity in the 21st century by Brig. Gen. Steven J. Spano xxii
Introduction: cybersecurity strategy and policy in a comparative context 1(8)
Mary Manjikian
Scott N. Romaniuk
PART I Europe
9(240)
1 Securing the kingdom's cyberspace: cybersecurity and cyber intelligence in Spain
11(15)
Ruben Arcos
2 Albania's cybersecurity pivot: between Western architectures and great power competition
26(10)
Alexander Fotescu
Mihai Chihaia
3 Armenian national policy in cyber space: toward a global cyber security architecture
36(15)
Ruben Elamiryan
4 Czech Republic: a new cyber security leader in Central Europe
51(11)
Lucie Kadlecovd
Michaela Semeckd
5 Cyber security in the French Republic
62(11)
Amber DaruHsh
Scott N. Romaniuk
6 Germany's cybersecurity strategy: confronting future challenges
73(16)
Scott N. Romaniuk
Michael Claus
7 Cybersecurity of Poland: legal and organizational framework
89(10)
Dominika Dziwisz
8 Hungary's evolving cyber security strategy
99(12)
Annamdria Beldz
Daniel Berzsenyi
9 Romanian cybersecurity efforts: a work in progress
111(10)
Oana-Elena Brdnda
10 Italy's cyber security architecture and critical infrastructure
121(11)
Tommaso De Zan
Giampiero Giacomello
Luigi Martino
11 Dutch cyber security strategy
132(11)
Joost Bunk
Max Smeets
12 Norwegian cyber security: a small-state approach to building international cyber cooperation
143(10)
Lars Gjesvik
13 Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty
153(12)
Ilona Stadnik
14 Slovakia: the Tatra Tiger without teeth
165(11)
Aaron T. Walter
15 Slovenia: a fragmented cyber security
176(9)
Laris Gaiser
16 In the line of Russian Ukraine, hybrid warfare, and cybersecurity defense aggression: Ukraine, hybrid warfare, and cybersecurity defense
185(6)
Olya Zaporozhets
Oleksiy Syvak
17 United Kingdom: pragmatism and adaptability in the cyber realm
191(10)
Tim Stevens
18 European Union: policy, cohesion, and supranational experiences with cybersecurity
201(10)
Christopher Whyte
19 Estonia: from the "Bronze Night" to cybersecurity pioneers
211(15)
Nick Robinson
Alex Hardy
20 NATO's evolving cyber security policy and strategy
226(23)
Scoff N. Romaniuk
Alexander Fotescu
Mihai Chihaia
PART II Asia and Australia
249(144)
21 Japan's challenges, capabilities, and preparedness in cyberspace
251(16)
Tobias Burgers
Scott N. Romaniuk
Cherry H. Y. Wong
22 An effective shield? Analyzing South Korea's cybersecurity strategy
267(9)
Yangmo Ku
23 In the line of fire: Taiwan's legal, political, and technological cybersecurity posture
276(8)
Tobias Burgers
Moritz Hellmann
Scott N. Romaniuk
24 Serving the people: China's cybersecurity policy and its implications
284(13)
Yu Cheng Chen
Tony Tai-Ting Liu
Scott N. Romaniuk
25 Cybersecurity in a one-party state: policies and implications for Vietnam's economy and online freedom
297(18)
Phan Le
26 The Philippines' cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability
315(10)
Amparo Pamela H. Fabe
Ella Zarcilla-Genecela
27 Malaysia: balancing national development, national security, and cybersecurity policy
325(12)
Ahmad El-Muhammady
28 Cyber governance and data protection in India: a critical legal analysis
337(12)
Debarati Haider
K. Jaishankar
29 Cybersecurity: a national priority for Bangladesh
349(7)
Md. Shariful Islam
30 Managing a digital revolution: cyber security capacity building in Myanmar
356(11)
Niels Nagelhus Schia
Lars Gjesvik
31 Australia's cyber security: a unique opportunity
367(14)
Ana Stuparu
32 Singapore: a leading actor in ASEAN cybersecurity
381(12)
Benjamin Ang
PART III The Middle East
393(56)
33 Between multi-stakeholderism and cyber sovereignty: understanding Turkey's cybersecurity strategy
395(14)
Tuba Eldem
34 Israel: cyber defense and security as national trademarks of international legitimacy
409(9)
Fabio Cristiano
35 Palestine: whose cyber security without cyber sovereignty?
418(9)
Fabio Cristiano
36 The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to Vision 2030
427(8)
Anwar Ouassini
Kimeu W. Boynton
37 The Islamic Republic of Iran's cyber security strategy: challenges in an era of cyber uncertainty
435(14)
Mix Katman
PART IV The Americas
449(70)
38 Canada's cyber security in a globalized environment: challenges and opportunities
451(12)
Kawser Ahmed
39 The United States: a declining hegemon in cyberspace?
463(10)
Mary Manjikian
40 Jamaica's cybercrime and cyber-security: policies, laws, and strategies
473(11)
Suzette A. Haughton
41 Mexico and cybersecurity: policies, challenges, and concerns
484(10)
Saul Mauricio Rodriguez-Hernandez
Nicolas Velasquez
42 Colombia's cybersecurity predicament: state making, strategic challenges, and cyberspace
494(10)
Florent Frasson-Quenoz
Char Augusto Nino Gonzalez
43 Cyber security governance in Brazil: keeping silos or building bridges?
504(15)
Louise Marie Hurel
Luisa Cruz Lobato
PART V Africa
519(104)
44 Securitizing cyberspace in Egypt: the dilemma of cybersecurity and democracy
521(13)
Bassant Hassib
Nardine Alnemr
45 Security through the Arab Winter: cyber strategies in post-revolutionary Tunisia
534(9)
Nabil Ouassini
46 Cyber security in Kenya: balancing economic security and internet freedom
543(10)
James D. Fielder
47 Cybersecurity policy in Nigeria: a tool for national security and economic prosperity
553(11)
Adewunmi J. Falode
48 Cybersecurity in Ghana: past, present, and future
564(9)
Anwar Ouassini
Mostafa Amini
49 Building a cyber fortress in Africa: Uganda's cyber security capacities and challenges
573(18)
Scott N. Romaniuk
David Andrew Omona
50 Cybersecurity in South Africa: status, governance, and prospects
591(17)
Raymond Steenkamp Fonseca
Jo-Ansie van Wyk
51 Algorithms of oppression? AU's cybersecurity policy and its enforcement in Africa
608(15)
Joshua Oreoluwa Akintayo
Index 623
Scott N. Romaniuk is a Postdoctoral Research Fellow in Security Studies at the China Institute, University of Alberta, Canada, and a Visiting Fellow at the International Centre for Policing and Security, University of South Wales, UK.

Mary Manjikian is Associate Dean of the Robertson School of Government at Regent University, USA.