Muutke küpsiste eelistusi

E-raamat: Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies

  • Formaat: PDF+DRM
  • Ilmumisaeg: 29-Jul-2016
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319405544
  • Formaat - PDF+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 29-Jul-2016
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319405544

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards, rules and guidelines in order to address cyber-threats and catch up with global trends and technological developments. A key focus is on specific countries" engagement in cyberattacks and the development of cyber-warfare capabilities.Further, the book demonstrates how a nation"s technological advancement may not necessarily lead to cyber-superiority. It covers cybersecurity issues with regard to conflicts that shape relationships between major economies, and explains how attempts to secure the cyber domain have been hampered by the lack of an international consensus on key issues and concepts. The book also reveals how some economies are now facing a tricky trade-off between economically productive uses of emerging technologies

and an enhanced cybersecurity profile. In the context of current paradigms related to the linkages between security and trade/investment, it also delves into new perspectives that are being brought to light by emerging cybersecurity issues.

Global Cybersecurity: Key Issues and Concepts.- The Evolution of Rules and Institutions in Cybersecurity: Cloud Computing and Big Data.- Cybersecurity in National Security and International Relations.- Cybersecurity"s Effects on International Trade and Investment.- Cybersecurity in the USA.- Cybersecurity in European Union Economies.- Cybersecurity in China.- Cybersecurity in India.- Cybersecurity in Japan.- Cybersecurity in South Korea.- Cybersecurity in Gulf Cooperation Council Economies.- Cybersecurity in Brazil.- Cybersecurity in Russia.- Lessons Learned, Implications and the Way Forward.
1 Global Cybersecurity: Key Issues and Concepts 1(24)
1.1 Introduction
1(1)
1.2 Gulf Between Hype and Reality
2(1)
1.3 Definitions of Major Terms
3(2)
1.3.1 Cybersecurity
3(1)
1.3.2 Cybersecurity Strategy
3(1)
1.3.3 Cybercrime
3(1)
1.3.4 Cyber Power
3(1)
1.3.5 Institutionalization
4(1)
1.3.6 Cloud Computing
4(1)
1.3.7 Strategic Asymmetry
4(1)
1.3.8 Trade and Investment Barriers
5(1)
1.3.9 Big Data
5(1)
1.3.10 Opportunistic and Targeted Cyber-Attacks
5(1)
1.4 The Nature of Cyber-Threats and Some Key Challenges
5(5)
1.4.1 Difficulty of Dominance in the Cyberspace
5(2)
1.4.2 Difficulty of Attribution
7(2)
1.4.3 Vulnerability of Critical and Sensitive Sectors
9(1)
1.5 Elements of National CS Strategies
10(6)
1.5.1 Strengths
10(1)
1.5.2 Weaknesses
11(1)
1.5.3 Opportunities
12(1)
1.5.4 Cyber-Threats: Sources, Nature and Characteristics
13(2)
1.5.5 National Cultural Value
15(1)
1.5.6 National Political System and Context
15(1)
1.5.7 International Responsibilities and Obligations
16(1)
1.5.8 Implementation of Strategy
16(1)
1.6 The Roles of the Private Sector
16(2)
1.7 Discussion and Concluding Remarks
18(2)
References
20(5)
2 The Evolution of Rules and Institutions in Cybersecurity: Cloud Computing and Big Data 25(28)
2.1 Introduction
25(1)
2.2 CS Issues in Cloud Computing, and Big Data
26(7)
2.2.1 The Cloud
26(1)
2.2.2 Big Data
27(6)
2.3 The Theoretical Framework: Rules and Institutions
33(9)
2.3.1 Regulative Institutions
34(3)
2.3.2 Normative Institutions
37(2)
2.3.3 Cultural-Cognitive Institutions
39(3)
2.4 Forces and Nature of Institutional Changes
42(5)
2.4.1 Institutional Field Around BD and the Cloud
42(2)
2.4.2 The Driving Forces and Mechanisms of Institutional Changes
44(1)
2.4.3 Development of Dense Networks and Relationships
44(1)
2.4.4 The Power Dynamics
45(1)
2.4.5 Contradictions Associated with BD and the Cloud
46(1)
2.5 Discussion and Concluding Remarks
47(1)
References
48(5)
3 Cybersecurity in National Security and International Relations 53(22)
3.1 Introduction
53(1)
3.2 Cyber-Warfare Concerns
54(2)
3.3 International Legal Regimes and Institutional Frameworks Related to CS
56(1)
3.4 Critical Issues and Current Sources of Disagreement Among Nations
57(6)
3.4.1 Outdated Legislative Framework and the Lack of Law Enforcement System Capacity
58(1)
3.4.2 Concerns Regarding the Fairness of the Procedures and Outcomes of Formal Frameworks
59(1)
3.4.3 Disagreement Regarding the Nature and Dimensions of Cyber-Threats
60(2)
3.4.4 Isolation from Most of the Economies of the World
62(1)
3.5 A Framework for Nations' Strategic Policy Choices for Cyber-Conflicts Associated with Various Sources
63(6)
3.5.1 Local Capacity Building in Law Enforcement and Institutional Development
64(1)
3.5.2 Creation of Informal Networks and Agreements
65(1)
3.5.3 Providing Opportunities for Developing Economies' Voice and Participation
66(1)
3.5.4 Establishment of a High Level Working Group Made Up of Policy Makers
66(1)
3.5.5 A 'Bricolage' Approach to CS
67(1)
3.5.6 Identifying and Achieving Cooperation on Common Areas of Interest
67(1)
3.5.7 Helping, Encouraging and Providing Incentives to Integrate with the West
68(1)
3.5.8 Harnessing the Power of Successful Regional Organizations that Are Internally Cohesive and Have Security as a Key Focus
68(1)
3.5.9 Offensive and Defensive Capabilities Tailored to Specific Threats
69(1)
3.6 Discussion and Concluding Remarks
69(2)
References
71(4)
4 Cybersecurity's Effects on International Trade and Investment 75(14)
4.1 Introduction
75(2)
4.2 CS-Related Barriers to Trade and Investments: Historical Perspectives, Contemporary Developments and Fundamental Concepts
77(1)
4.2.1 CS-Related Concerns: Some Examples, Observations and Policy Responses
77(1)
4.3 A Typology of Barriers to Trade and Investment Associated with CS
78(2)
4.4 Causes, Mechanisms and Consequences Associated with CS-Related Barriers to Trade and Investments
80(5)
4.4.1 Perceived Closeness to the State in the Home Country
81(1)
4.4.2 The Degree of Alliance/Animosity Between the Home and the Host Countries
81(1)
4.4.3 Environment to Protect IPR and Innovation in the Home Country
82(1)
4.4.4 Difference in the Strictness of Data Privacy Regulations in the Home and the Host Countries
83(2)
4.5 Discussion and Concluding Remarks
85(1)
References
86(3)
5 Cybersecurity in the U.S. 89(18)
5.1 Introduction
89(2)
5.2 Cyber-Threats Facing the U.S.
91(3)
5.2.1 Critical Sectors and Important Industries as Attractive Targets
92(2)
5.3 Policy Frameworks and Strategy
94(4)
5.3.1 The CS EO
95(1)
5.3.2 Priority in Enforcement
96(1)
5.3.3 CS Regulations to Address Threats Facing Critical Sectors and Important Industries
96(2)
5.4 Initiatives of the Private Sector and Special Interest Groups
98(2)
5.5 Impacts on Businesses and Consumers
100(2)
5.6 Discussion and Concluding Remarks
102(1)
References
103(4)
6 Cybersecurity in European Union Economies 107(16)
6.1 Introduction
107(1)
6.2 EU CS Strategy
108(6)
6.2.1 The EU Cloud Strategy
111(3)
6.3 Effects on the Private Sector and Consumers: A Comparison with the U.S.
114(4)
6.4 PPP and the Private Sector's Roles
118(1)
6.5 Discussion and Concluding Remarks
119(1)
References
120(3)
7 Cybersecurity in China 123(22)
7.1 Introduction
123(1)
7.2 Cyber-Threats Facing China
124(1)
7.3 Informal Institutions and Non-state Actors
125(2)
7.4 China's CS Legislation and Strategy to Fight Cyber-Threats
127(6)
7.4.1 Tackling External Threats
127(3)
7.4.2 Defensive and Offensive Motives
130(1)
7.4.3 Cyber-Control as a Key Element
131(1)
7.4.4 Enforcement of CS Regulations
132(1)
7.5 Effects on Foreign IT Services Providers
133(1)
7.6 Effects on Chinese Internet Users and IT Services Providers
134(1)
7.7 Comparing China's and Other Major Economies' CS Approaches
135(3)
7.8 Cyber Cold-War with the U.S.
138(1)
7.9 Discussion and Concluding Remarks
139(1)
References
140(5)
8 Cybersecurity in India 145(14)
8.1 Introduction
145(1)
8.2 External and Internal Cyber-Threats Facing India
146(1)
8.2.1 External Threats
146(1)
8.2.2 Internal Threats
147(1)
8.3 The Constraints Facing India in Dealing with Cyber-Threats
147(2)
8.4 The Private Sector's Role and the Conditions for PPP: The Case of IT&BPM Sector
149(4)
8.4.1 The Establishment of the NASSCOM and the Data Security Council of India (DSCI)
149(1)
8.4.2 The Context for PPP in the IT&BPM Sector
150(1)
8.4.3 The State's Weak Regulatory and Enforcement Mechanisms
151(1)
8.4.4 The Role of a Participatory State
152(1)
8.5 Responses to External Threats
153(1)
8.6 Discussion and Concluding Remarks
154(1)
References
155(4)
9 Cybersecurity in Japan 159(12)
9.1 Introduction
159(1)
9.2 Cyber-Threats Facing Japan
160(1)
9.3 Challenges and Barriers Facing Japan in Strengthening CS
161(1)
9.4 Jolts and Shocks Encountered by Japan
162(1)
9.5 Political and Regulatory Developments
163(3)
9.5.1 Anti-cybercrime Initiatives
165(1)
9.5.2 Industrial Policies and Other Protection Measures
165(1)
9.5.3 National Security
165(1)
9.6 The Japanese Culture from the CS Perspective
166(1)
9.7 Similarities and Differences with Major World Economies
166(2)
9.8 Discussion and Concluding Remarks
168(1)
References
169(2)
10 Cybersecurity in South Korea 171(12)
10.1 Introduction
171(2)
10.2 Cyber-Threats Facing South Korea
173(1)
10.3 South Korea's Asymmetric Strengths and Weaknesses
174(2)
10.3.1 Positive Asymmetries
174(1)
10.3.2 Negative Asymmetries
175(1)
10.4 Policy Framework and Strategic Plan for Preparedness and Response to Cyber-Threats
176(2)
10.5 Discussion and Concluding Remarks
178(2)
References
180(3)
11 Cybersecurity in Gulf Cooperation Council Economies 183(12)
11.1 Introduction
183(1)
11.2 Threats, Vulnerabilities, Risks and Challenges Facing GCC Economies
184(2)
11.3 CS Regulations and Strategies
186(2)
11.4 Organizational Initiatives
188(1)
11.5 Similarities and Differences with Major World Economies
189(2)
11.5.1 A Comparison with the EU
189(1)
11.5.2 A Comparison with the U.S.
190(1)
11.6 Discussion and Concluding Remarks
191(1)
References
192(3)
12 Cybersecurity in Brazil 195(16)
12.1 Introduction
195(1)
12.2 Cyber-Threats Facing Brazil
195(3)
12.3 The Brazilian Approach to CS
198(3)
12.4 Similarities and Differences with Major World Economies
201(1)
12.5 Local Capacity Building
202(1)
12.6 Key Constraints Facing Brazil
203(1)
12.7 Organizations' CS Orientation
204(1)
12.8 Discussion and Concluding Remarks
205(1)
References
206(5)
13 Cybersecurity in Russia 211(12)
13.1 Introduction
211(1)
13.2 Cyber-Threats Facing Russia
212(2)
13.2.1 External Threats
212(1)
13.2.2 Internal Threats
213(1)
13.3 Russia's CS Strategies and Regulatory Frameworks
214(3)
13.3.1 Dealing with the External Threats
214(1)
13.3.2 Handling the Internal Threats
215(2)
13.4 International Engagements
217(1)
13.5 Discussion and Concluding Remarks
218(1)
References
219(4)
14 Lessons Learned, Implications and the Way Forward 223
14.1 What Do We Know About Global CS?
223(2)
14.2 Action Agenda for Cyberspace Participants
225(10)
14.2.1 Implications for National Governments
225(2)
14.2.2 Implications for Board of Directors and Top Management Teams
227(7)
14.2.3 Implications for Consumers
234(1)
14.3 Directions for Future Research
235(1)
14.4 Final Thought and Conclusion
236(1)
References
237
Nir Kshetri is Professor at Bryan School of Business and Economics, the University of North Carolina-Greensboro and a research fellow at Research Institute for Economics & Business Administration - Kobe University, Japan. He is the author of seven books and about 100 journal articles.