1 Global Cybersecurity: Key Issues and Concepts |
|
1 | (24) |
|
|
1 | (1) |
|
1.2 Gulf Between Hype and Reality |
|
|
2 | (1) |
|
1.3 Definitions of Major Terms |
|
|
3 | (2) |
|
|
3 | (1) |
|
1.3.2 Cybersecurity Strategy |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
1.3.5 Institutionalization |
|
|
4 | (1) |
|
|
4 | (1) |
|
1.3.7 Strategic Asymmetry |
|
|
4 | (1) |
|
1.3.8 Trade and Investment Barriers |
|
|
5 | (1) |
|
|
5 | (1) |
|
1.3.10 Opportunistic and Targeted Cyber-Attacks |
|
|
5 | (1) |
|
1.4 The Nature of Cyber-Threats and Some Key Challenges |
|
|
5 | (5) |
|
1.4.1 Difficulty of Dominance in the Cyberspace |
|
|
5 | (2) |
|
1.4.2 Difficulty of Attribution |
|
|
7 | (2) |
|
1.4.3 Vulnerability of Critical and Sensitive Sectors |
|
|
9 | (1) |
|
1.5 Elements of National CS Strategies |
|
|
10 | (6) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
1.5.4 Cyber-Threats: Sources, Nature and Characteristics |
|
|
13 | (2) |
|
1.5.5 National Cultural Value |
|
|
15 | (1) |
|
1.5.6 National Political System and Context |
|
|
15 | (1) |
|
1.5.7 International Responsibilities and Obligations |
|
|
16 | (1) |
|
1.5.8 Implementation of Strategy |
|
|
16 | (1) |
|
1.6 The Roles of the Private Sector |
|
|
16 | (2) |
|
1.7 Discussion and Concluding Remarks |
|
|
18 | (2) |
|
|
20 | (5) |
2 The Evolution of Rules and Institutions in Cybersecurity: Cloud Computing and Big Data |
|
25 | (28) |
|
|
25 | (1) |
|
2.2 CS Issues in Cloud Computing, and Big Data |
|
|
26 | (7) |
|
|
26 | (1) |
|
|
27 | (6) |
|
2.3 The Theoretical Framework: Rules and Institutions |
|
|
33 | (9) |
|
2.3.1 Regulative Institutions |
|
|
34 | (3) |
|
2.3.2 Normative Institutions |
|
|
37 | (2) |
|
2.3.3 Cultural-Cognitive Institutions |
|
|
39 | (3) |
|
2.4 Forces and Nature of Institutional Changes |
|
|
42 | (5) |
|
2.4.1 Institutional Field Around BD and the Cloud |
|
|
42 | (2) |
|
2.4.2 The Driving Forces and Mechanisms of Institutional Changes |
|
|
44 | (1) |
|
2.4.3 Development of Dense Networks and Relationships |
|
|
44 | (1) |
|
|
45 | (1) |
|
2.4.5 Contradictions Associated with BD and the Cloud |
|
|
46 | (1) |
|
2.5 Discussion and Concluding Remarks |
|
|
47 | (1) |
|
|
48 | (5) |
3 Cybersecurity in National Security and International Relations |
|
53 | (22) |
|
|
53 | (1) |
|
3.2 Cyber-Warfare Concerns |
|
|
54 | (2) |
|
3.3 International Legal Regimes and Institutional Frameworks Related to CS |
|
|
56 | (1) |
|
3.4 Critical Issues and Current Sources of Disagreement Among Nations |
|
|
57 | (6) |
|
3.4.1 Outdated Legislative Framework and the Lack of Law Enforcement System Capacity |
|
|
58 | (1) |
|
3.4.2 Concerns Regarding the Fairness of the Procedures and Outcomes of Formal Frameworks |
|
|
59 | (1) |
|
3.4.3 Disagreement Regarding the Nature and Dimensions of Cyber-Threats |
|
|
60 | (2) |
|
3.4.4 Isolation from Most of the Economies of the World |
|
|
62 | (1) |
|
3.5 A Framework for Nations' Strategic Policy Choices for Cyber-Conflicts Associated with Various Sources |
|
|
63 | (6) |
|
3.5.1 Local Capacity Building in Law Enforcement and Institutional Development |
|
|
64 | (1) |
|
3.5.2 Creation of Informal Networks and Agreements |
|
|
65 | (1) |
|
3.5.3 Providing Opportunities for Developing Economies' Voice and Participation |
|
|
66 | (1) |
|
3.5.4 Establishment of a High Level Working Group Made Up of Policy Makers |
|
|
66 | (1) |
|
3.5.5 A 'Bricolage' Approach to CS |
|
|
67 | (1) |
|
3.5.6 Identifying and Achieving Cooperation on Common Areas of Interest |
|
|
67 | (1) |
|
3.5.7 Helping, Encouraging and Providing Incentives to Integrate with the West |
|
|
68 | (1) |
|
3.5.8 Harnessing the Power of Successful Regional Organizations that Are Internally Cohesive and Have Security as a Key Focus |
|
|
68 | (1) |
|
3.5.9 Offensive and Defensive Capabilities Tailored to Specific Threats |
|
|
69 | (1) |
|
3.6 Discussion and Concluding Remarks |
|
|
69 | (2) |
|
|
71 | (4) |
4 Cybersecurity's Effects on International Trade and Investment |
|
75 | (14) |
|
|
75 | (2) |
|
4.2 CS-Related Barriers to Trade and Investments: Historical Perspectives, Contemporary Developments and Fundamental Concepts |
|
|
77 | (1) |
|
4.2.1 CS-Related Concerns: Some Examples, Observations and Policy Responses |
|
|
77 | (1) |
|
4.3 A Typology of Barriers to Trade and Investment Associated with CS |
|
|
78 | (2) |
|
4.4 Causes, Mechanisms and Consequences Associated with CS-Related Barriers to Trade and Investments |
|
|
80 | (5) |
|
4.4.1 Perceived Closeness to the State in the Home Country |
|
|
81 | (1) |
|
4.4.2 The Degree of Alliance/Animosity Between the Home and the Host Countries |
|
|
81 | (1) |
|
4.4.3 Environment to Protect IPR and Innovation in the Home Country |
|
|
82 | (1) |
|
4.4.4 Difference in the Strictness of Data Privacy Regulations in the Home and the Host Countries |
|
|
83 | (2) |
|
4.5 Discussion and Concluding Remarks |
|
|
85 | (1) |
|
|
86 | (3) |
5 Cybersecurity in the U.S. |
|
89 | (18) |
|
|
89 | (2) |
|
5.2 Cyber-Threats Facing the U.S. |
|
|
91 | (3) |
|
5.2.1 Critical Sectors and Important Industries as Attractive Targets |
|
|
92 | (2) |
|
5.3 Policy Frameworks and Strategy |
|
|
94 | (4) |
|
|
95 | (1) |
|
5.3.2 Priority in Enforcement |
|
|
96 | (1) |
|
5.3.3 CS Regulations to Address Threats Facing Critical Sectors and Important Industries |
|
|
96 | (2) |
|
5.4 Initiatives of the Private Sector and Special Interest Groups |
|
|
98 | (2) |
|
5.5 Impacts on Businesses and Consumers |
|
|
100 | (2) |
|
5.6 Discussion and Concluding Remarks |
|
|
102 | (1) |
|
|
103 | (4) |
6 Cybersecurity in European Union Economies |
|
107 | (16) |
|
|
107 | (1) |
|
|
108 | (6) |
|
6.2.1 The EU Cloud Strategy |
|
|
111 | (3) |
|
6.3 Effects on the Private Sector and Consumers: A Comparison with the U.S. |
|
|
114 | (4) |
|
6.4 PPP and the Private Sector's Roles |
|
|
118 | (1) |
|
6.5 Discussion and Concluding Remarks |
|
|
119 | (1) |
|
|
120 | (3) |
7 Cybersecurity in China |
|
123 | (22) |
|
|
123 | (1) |
|
7.2 Cyber-Threats Facing China |
|
|
124 | (1) |
|
7.3 Informal Institutions and Non-state Actors |
|
|
125 | (2) |
|
7.4 China's CS Legislation and Strategy to Fight Cyber-Threats |
|
|
127 | (6) |
|
7.4.1 Tackling External Threats |
|
|
127 | (3) |
|
7.4.2 Defensive and Offensive Motives |
|
|
130 | (1) |
|
7.4.3 Cyber-Control as a Key Element |
|
|
131 | (1) |
|
7.4.4 Enforcement of CS Regulations |
|
|
132 | (1) |
|
7.5 Effects on Foreign IT Services Providers |
|
|
133 | (1) |
|
7.6 Effects on Chinese Internet Users and IT Services Providers |
|
|
134 | (1) |
|
7.7 Comparing China's and Other Major Economies' CS Approaches |
|
|
135 | (3) |
|
7.8 Cyber Cold-War with the U.S. |
|
|
138 | (1) |
|
7.9 Discussion and Concluding Remarks |
|
|
139 | (1) |
|
|
140 | (5) |
8 Cybersecurity in India |
|
145 | (14) |
|
|
145 | (1) |
|
8.2 External and Internal Cyber-Threats Facing India |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
8.3 The Constraints Facing India in Dealing with Cyber-Threats |
|
|
147 | (2) |
|
8.4 The Private Sector's Role and the Conditions for PPP: The Case of IT&BPM Sector |
|
|
149 | (4) |
|
8.4.1 The Establishment of the NASSCOM and the Data Security Council of India (DSCI) |
|
|
149 | (1) |
|
8.4.2 The Context for PPP in the IT&BPM Sector |
|
|
150 | (1) |
|
8.4.3 The State's Weak Regulatory and Enforcement Mechanisms |
|
|
151 | (1) |
|
8.4.4 The Role of a Participatory State |
|
|
152 | (1) |
|
8.5 Responses to External Threats |
|
|
153 | (1) |
|
8.6 Discussion and Concluding Remarks |
|
|
154 | (1) |
|
|
155 | (4) |
9 Cybersecurity in Japan |
|
159 | (12) |
|
|
159 | (1) |
|
9.2 Cyber-Threats Facing Japan |
|
|
160 | (1) |
|
9.3 Challenges and Barriers Facing Japan in Strengthening CS |
|
|
161 | (1) |
|
9.4 Jolts and Shocks Encountered by Japan |
|
|
162 | (1) |
|
9.5 Political and Regulatory Developments |
|
|
163 | (3) |
|
9.5.1 Anti-cybercrime Initiatives |
|
|
165 | (1) |
|
9.5.2 Industrial Policies and Other Protection Measures |
|
|
165 | (1) |
|
|
165 | (1) |
|
9.6 The Japanese Culture from the CS Perspective |
|
|
166 | (1) |
|
9.7 Similarities and Differences with Major World Economies |
|
|
166 | (2) |
|
9.8 Discussion and Concluding Remarks |
|
|
168 | (1) |
|
|
169 | (2) |
10 Cybersecurity in South Korea |
|
171 | (12) |
|
|
171 | (2) |
|
10.2 Cyber-Threats Facing South Korea |
|
|
173 | (1) |
|
10.3 South Korea's Asymmetric Strengths and Weaknesses |
|
|
174 | (2) |
|
10.3.1 Positive Asymmetries |
|
|
174 | (1) |
|
10.3.2 Negative Asymmetries |
|
|
175 | (1) |
|
10.4 Policy Framework and Strategic Plan for Preparedness and Response to Cyber-Threats |
|
|
176 | (2) |
|
10.5 Discussion and Concluding Remarks |
|
|
178 | (2) |
|
|
180 | (3) |
11 Cybersecurity in Gulf Cooperation Council Economies |
|
183 | (12) |
|
|
183 | (1) |
|
11.2 Threats, Vulnerabilities, Risks and Challenges Facing GCC Economies |
|
|
184 | (2) |
|
11.3 CS Regulations and Strategies |
|
|
186 | (2) |
|
11.4 Organizational Initiatives |
|
|
188 | (1) |
|
11.5 Similarities and Differences with Major World Economies |
|
|
189 | (2) |
|
11.5.1 A Comparison with the EU |
|
|
189 | (1) |
|
11.5.2 A Comparison with the U.S. |
|
|
190 | (1) |
|
11.6 Discussion and Concluding Remarks |
|
|
191 | (1) |
|
|
192 | (3) |
12 Cybersecurity in Brazil |
|
195 | (16) |
|
|
195 | (1) |
|
12.2 Cyber-Threats Facing Brazil |
|
|
195 | (3) |
|
12.3 The Brazilian Approach to CS |
|
|
198 | (3) |
|
12.4 Similarities and Differences with Major World Economies |
|
|
201 | (1) |
|
12.5 Local Capacity Building |
|
|
202 | (1) |
|
12.6 Key Constraints Facing Brazil |
|
|
203 | (1) |
|
12.7 Organizations' CS Orientation |
|
|
204 | (1) |
|
12.8 Discussion and Concluding Remarks |
|
|
205 | (1) |
|
|
206 | (5) |
13 Cybersecurity in Russia |
|
211 | (12) |
|
|
211 | (1) |
|
13.2 Cyber-Threats Facing Russia |
|
|
212 | (2) |
|
|
212 | (1) |
|
|
213 | (1) |
|
13.3 Russia's CS Strategies and Regulatory Frameworks |
|
|
214 | (3) |
|
13.3.1 Dealing with the External Threats |
|
|
214 | (1) |
|
13.3.2 Handling the Internal Threats |
|
|
215 | (2) |
|
13.4 International Engagements |
|
|
217 | (1) |
|
13.5 Discussion and Concluding Remarks |
|
|
218 | (1) |
|
|
219 | (4) |
14 Lessons Learned, Implications and the Way Forward |
|
223 | |
|
14.1 What Do We Know About Global CS? |
|
|
223 | (2) |
|
14.2 Action Agenda for Cyberspace Participants |
|
|
225 | (10) |
|
14.2.1 Implications for National Governments |
|
|
225 | (2) |
|
14.2.2 Implications for Board of Directors and Top Management Teams |
|
|
227 | (7) |
|
14.2.3 Implications for Consumers |
|
|
234 | (1) |
|
14.3 Directions for Future Research |
|
|
235 | (1) |
|
14.4 Final Thought and Conclusion |
|
|
236 | (1) |
|
|
237 | |