Muutke küpsiste eelistusi

Cybersecurity Public Policy: SWOT Analysis Conducted on 43 Countries [Kõva köide]

  • Formaat: Hardback, 188 pages, kõrgus x laius: 234x156 mm, kaal: 417 g
  • Ilmumisaeg: 01-Aug-2022
  • Kirjastus: CRC Press
  • ISBN-10: 1032194332
  • ISBN-13: 9781032194332
Teised raamatud teemal:
  • Formaat: Hardback, 188 pages, kõrgus x laius: 234x156 mm, kaal: 417 g
  • Ilmumisaeg: 01-Aug-2022
  • Kirjastus: CRC Press
  • ISBN-10: 1032194332
  • ISBN-13: 9781032194332
Teised raamatud teemal:
Since 2000, many governments, parliaments, and ministries have worked diligently to define effective guidelines that safeguard both public and private sector information systems, as well as information assets, from unwanted cyberattacks and unauthorized system intrusion. While some countries manage successful cybersecurity public policies that undergo modification and revision annually, other countries struggle to define such policies effectively, because cybersecurity is not a priority within their country. For countries that have begun to define cybersecurity public policy, there remains a need to stay current with trends in cyber defense and information system security, information not necessarily readily available for all countries. This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis; Afghanistan, Australia, Bermuda, Canada, Chili, Croatia, Cyprus, Czech Republic, Dubai, Egypt, Estonia, European Union, Finland, Gambia, Germany, Greece, Hungary, Iceland, Ireland, Italy, Japan, Kenya, Kosovo, Kuwait, Luxemburg, Malaysia, Nepal, Netherlands, New Zealand, Norway, Poland, Samoa, Singapore, Slovakia, South Africa, Sweden, Switzerland, Thailand, Trinidad, Uganda, United Arab Emirates, United Kingdom, and Vietnam; to transparently discuss the strengths, weaknesses, opportunities, and threats encompassing each of these 43 countries' cybersecurity public policies.

The primary vision for this title is to create an educational resource that benefits both the public and the private sectors. Without clarity on cybersecurity public policy, there remains a gap in understanding how to meet these needs worldwide. Furthermore, while more than 43 countries have already enacted cybersecurity public policy, many countries neglect translating their policy into English; this impacts the ability of all countries to communicate clearly and collaborate harmoniously on this subject matter. This book works to fill the gap, stop the spread of misinformation, and become the gateway to understanding what approaches can best serve the needs of both public and private sectors. Its goals include educating the public, and, in partnership with governments, parliaments, ministries, and cybersecurity public policy analysts, helping mitigate vulnerabilities currently woven into public and private sector information systems, software, hardware, and web interface applications relied upon for daily business activities.
Acknowledgements ix
List of Abbreviations
xiii
Epigraph xv
Author Biographies xvii
Introduction 1(2)
Chapter 1 Introduction to Cybersecurity
3(12)
Learning Objectives
3(9)
Summary
12(1)
Discussion Questions
13(1)
Case Study
13(1)
Notes
13(2)
Chapter 2 Global Cybercrime
15(20)
Learning Objectives
15(5)
Cultural and Social Ethics
20(9)
Summary
29(2)
Discussion Questions
31(1)
Case Study
31(1)
Notes
32(3)
Chapter 3 Diplomacy in Internet Policy
35(10)
Learning Objectives
35(7)
Summary
42(1)
Discussion Questions
43(1)
Case Study
43(1)
Notes
44(1)
Chapter 4 43 Countries Cybersecurity Public Policy SWOT Analysis
45(130)
Learning Objectives
45(2)
Afghanistan
47(2)
Australia
49(3)
Bermuda
52(4)
Canada
56(2)
Chili
58(2)
Croatia
60(3)
Cyprus
63(2)
Czech Republic
65(2)
Dubai
67(2)
Egypt
69(2)
Estonia
71(3)
European Commission
74(3)
Finland
77(2)
Gambia
79(3)
Germany
82(2)
Greece
84(2)
Hungary
86(3)
Iceland
89(2)
Ireland
91(3)
Italy
94(3)
Japan
97(4)
Kenya
101(3)
Republic of Kosovo
104(2)
Kuwait
106(3)
Luxembourg
109(2)
Malaysia
111(2)
Nepal
113(3)
Netherlands
116(3)
New Zealand
119(3)
Norway
122(3)
Poland
125(3)
Rwanda
128(3)
Samoa
131(3)
Singapore
134(3)
Slovakia
137(4)
South Africa
141(3)
Switzerland
144(3)
Thailand
147(4)
Trinidad & Tobago
151(4)
Uganda
155(3)
United Arab Emirates
158(3)
United Kingdom
161(5)
Vietnam
166(3)
Summary
169(1)
Discussion Questions
170(1)
Notes
171(4)
Glossary 175(6)
Index 181
Bradley Fowler earned a Master of Public Policy in Cybersecurity Policy from American Public University System in 2020; a Master of Science in Cybersecurity in 2018 and Master of Science in Managing Information Systems in Information Security Management in 2021, both from Bellevue University. He also earned a Master of Arts in Teaching and Learning with Technology in 2016 and a Bachelor of Arts in eMarketing in 2015, both from Ashford University, which is now University of Arizona Global Campus. Bradley is completing a Master of Science in Cloud Computing Architecture at University of Maryland Global Campus with a 2022 graduation expectancy and a Doctor of Education Administration from California Coast University, with a 2022 graduation expectancy.

Bradley is a member of Golden Key International Honour Society, National Cybersecurity Alliance, and the National Cybersecurity Student Association. He has been a contributing writer for the National Security Policy Analysis Organization since Jan. 2020 and owns Construction EMarketing. He is the author of several other fiction and non-fiction books.

Dr. Kennedy Maranga is a Doctoral Dissertation Chair and Associate Professor in the School of Leadership, Education, and Communication at St. Thomas University. Dr. Maranga lives in St. Louis MO and holds a Bachelor of Laws degree, Master of Science in Higher Education Administration from Walden University, Masters of Laws from Washington University St. Louis, and Ph.D in Public Policy and Administration from Walden University. Dr. Maranga enjoys teaching and mentoring learners. Professional experience over the last 25 years includes working as professor, an attorney, consultant, and president of a non-profit organization. Dr. Maranga has a strong background and interest in both qualitative and quantitative methods and designs. He has authored and co-authored several peer-reviewed articles and three books.