0%

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia.

The volume offers an introduction to each nation’s cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contains the following sections:

  • overview of national cyber-security strategy;
  • concepts and definitions;
  • exploration of cyber-security issues as they relate to international law and governance;
  • critical examinations of cyber partners at home and abroad;
  • legislative developments and processes;
  • dimensions of cybercrime and cyberterrorism;
  • implications of cyber-security policies and strategies.

This book will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy, and international relations.

Table of Contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. List of figures
  7. List of tables
  8. List of contributors
  9. Foreword: Global cybersecurity in the 21st century
  10. Introduction: cybersecurity strategy and policy in a comparative context
  11. Part I: Europe
    1. 1 Securing the kingdom’s cyberspace: cybersecurity and cyber intelligence in Spain
    2. 2 Albania’s cybersecurity pivot: between Western architectures and great power competition
    3. 3 Armenian national policy in cyber space: toward a global cyber security architecture
    4. 4 Czech Republic: a new cyber security leader in Central Europe
    5. 5 Cyber security in the French Republic
    6. 6 Germany’s cybersecurity strategy: confronting future challenges
    7. 7 Cybersecurity of Poland: legal and organizational framework
    8. 8 Hungary’s evolving cyber security strategy
    9. 9 Romanian cybersecurity efforts: a work in progress
    10. 10 Italy’s cyber security architecture and critical infrastructure
    11. 11 Dutch cyber security strategy
    12. 12 Norwegian cyber security: a small-state approach to building international cyber cooperation
    13. 13 Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty
    14. 14 Slovakia: the Tatra Tiger without teeth
    15. 15 Slovenia: a fragmented cyber security
    16. 16 In the line of Russian aggression: Ukraine, hybrid warfare, and cybersecurity defense
    17. 17 United Kingdom: pragmatism and adaptability in the cyber realm
    18. 18 European Union: policy, cohesion, and supranational experiences with cybersecurity
    19. 19 Estonia: from the “Bronze Night” to cybersecurity pioneers
    20. 20 NATO’s evolving cyber security policy and strategy
  12. Part II: Asia and Australia
    1. 21 Japan’s challenges, capabilities, and preparedness in cyberspace
    2. 22 An effective shield? Analyzing South Korea’s cybersecurity strategy
    3. 23 In the line of fire: Taiwan’s legal, political, and technological cybersecurity posture
    4. 24 Serving the people: China’s cybersecurity policy and its implications
    5. 25 Cybersecurity in a one-party state: policies and implications for Vietnam’s economy and online freedom
    6. 26 The Philippines’ cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability
    7. 27 Malaysia: balancing national development, national security, and cybersecurity policy
    8. 28 Cyber governance and data protection in India: a critical legal analysis
    9. 29 Cybersecurity: a national priority for Bangladesh
    10. 30 Managing a digital revolution: cyber security capacity building in Myanmar
    11. 31 Australia’s cyber security: a unique opportunity
    12. 32 Singapore: a leading actor in ASEAN cybersecurity
  13. Part III: The Middle East
    1. 33. Between multi-stakeholderism and cyber sovereignty: understanding Turkey’s cybersecurity strategy
    2. 34 Israel: cyber defense and security as national trademarks of international legitimacy
    3. 35 Palestine: whose cyber security without cyber sovereignty?
    4. 36 The “Silicon Valley of the Middle East”: cybersecurity, Saudi Arabia, and the path to Vision 2030
    5. 37 The Islamic Republic of Iran’s cyber security strategy: challenges in an era of cyber uncertainty
  14. Part IV: The Americas
    1. 38 Canada’s cyber security in a globalized environment: challenges and opportunities
    2. 39 The United States: a declining hegemon in cyberspace?
    3. 40 Jamaica’s cybercrime and cyber-security: policies, laws, and strategies
    4. 41 Mexico and cybersecurity: policies, challenges, and concerns
    5. 42 Colombia’s cybersecurity predicament: state making, strategic challenges, and cyberspace
    6. 43 Cyber security governance in Brazil: keeping silos or building bridges?
  15. Part V: Africa
    1. 44 Securitizing CyberSpace in Egypt: the dilemma of cybersecurity and democracy
    2. 45 Security through the Arab Winter: cyber strategies in post-revolutionary Tunisia
    3. 46 Cyber security in Kenya: balancing economic security and internet freedom
    4. 47 Cybersecurity policy in Nigeria: a tool for national security and economic prosperity
    5. 48 Cybersecurity in Ghana: past, present, and future
    6. 49 Building a Cyber Fortress in Africa: Uganda’s cyber security capacities and challenges
    7. 50 Cybersecurity in South Africa: status, governance, and prospects
    8. 51 Algorithms of oppression? AU’s cybersecurity policy and its enforcement in Africa
  16. Index
52.14.150.55