Cargando…

Routledge companion to global cyber-security strategy /

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an introduction to each nation's cyber-security strategy...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Romaniuk, Scott N. (Editor ), Manjikian, Mary (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Routledge, 2021
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Part I: Europe
  • Securing the kingdom's cyberspace: cybersecurity and cyber intelligence in Spain
  • Albania's cybersecurity pivot: between Western architectures and great power competition
  • Armenian national policy in cyber space: toward a global cyber security architecture
  • Czech Republic: a new cyber security leader in Central Europe
  • Cyber security in the French Republic
  • Germany's cybersecurity strategy: confronting future challeges
  • Cybersecurity of Poland: legal and organizational framework
  • Hungary's evolving cyber security strategyy
  • Romanian cybersecurity efforts: a work in progress
  • Italy's cyber security architecture and critical infrastructure
  • Dutch cyber security strategy
  • Norwegian cyber security: a small-state approach to building international cyber cooperation
  • Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty
  • Slovakia: the Tatra Tiger without teeth
  • Slovenia: a fragmented cyber security
  • In the line of Russian Ukraine. hybrid warfare, and cybersecurity defense aggression: Ukraine, hybrid warfare, and cybersecurity defense
  • United Kingdom: pragmatism and adaptability in the cyber realm
  • European Union: policy, cohesion, and supranational experiences with cybersecurity
  • Estonia: from the "Bronze Night" to cybersecurity pioneers
  • NATO's evolving cyber security policy and strategy
  • Part II: Asia and Australia
  • Japan's challenges, capabilities, and preparedness in cyberspace
  • An effective shield? Analyzing South Korea's cybersecurity strategy
  • In the line of fire: Taiwan's legal, political, and technological cybersecurity posture
  • Serving the people: China's cybersecurity policy and its implications
  • Cybersecurity in a one-party state: policies and implications for Vietnam's economy and online freedom
  • The Philippines' cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability
  • Malaysia: balancing national development, national security, and cybersecurity policy
  • Cyber governance and data protection in India: a critical legal analysis
  • Cybersecurity: a national priority in Bangledesh
  • Managing a digital revolution: cyber security capacity building in Myanmar
  • Australia's cyber security: a unique opportunity
  • Singapore: a leading actor in ASEAN cybersecurity
  • Part III: The Middle East
  • Between multi-stakeholderism and cyber sovereignty: understanding Turkey's cybersecurity strategy
  • Israel: cyber securitization as national trademark
  • Palestinian territory occupied: cybersecurity at reduced sovereignty
  • The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to Vision 2030
  • The Islamic Republic of Iran's cyber security strategy: challenges in an era of cyber uncertainty
  • Part IV: The Americas
  • Canada's cyber security in a globalized environment: challenges and opportunities
  • The United States: a declining hegemon in cyberspace?
  • Jamaica's cybercrime and cyber-security: policies, laws, and strategies
  • Mexico and cybersecurity: policies, challenges, and concerns
  • Colombia's cybersecurity predicament: state making, strategic challenges, and cyberspace
  • Cyber security governance in Brazil: keeping silos or building bridges?
  • Part V: Africa
  • Securitizing cyberspace in Egypt: the dilemma of cybersecurity and democracy
  • Security through the Arab Winter: cyber strategies in postrevolutionary Tunisia
  • Cyber security policy in Nigeria: a tool for national security and economic prosperity
  • Cybersecurity in Ghana: past, present, and future
  • Building a cyber fortress in Africa: Uganda's cyber security capacities and challenges
  • Cybersecurity in South Africa: status, governance, and prospects
  • Algorithms of oppression? AU's cybersecurity policy and its enforcement in Africa.