𝔖 Scriptorium
✦   LIBER   ✦

📁

Routledge Companion to Global Cyber-Security Strategy

✍ Scribed by Scott N. Romaniuk (editor), Mary Manjikian (editor)


Publisher
Routledge
Year
2021
Tongue
English
Leaves
657
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an introduction to each nation’s cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth.

✦ Table of Contents


Contents
List of figures
List of tables
List of contributors
Foreword: Global cybersecurity in the 21st century • Brig. Gen. Steven J. Spano
Introduction: cybersecurity strategy and policy in a comparative context • Mary Manjikian and Scott N. Romaniuk
Part I: Europe
1 Securing the kingdom’s cyberspace: cybersecurity and cyberintelligence in Spain • Rubén Arcos
2 Albania’s cybersecurity pivot: between Western architectures and great power competition • Alexander Fotescu and Mihai Chihaia
3 Armenian national policy in cyber space: toward a global cybersecurity architecture • Ruben Elamiryan
4 Czech Republic: a new cyber security leader in Central Europe • Lucie Kadlecová and Michaela Semecká
5 Cyber security in the French Republic • Amber Darwish and Scott N. Romaniuk
6 Germany’s cybersecurity strategy: confronting future challenges • Scott N. Romaniuk and Michael Claus
7 Cybersecurity of Poland: legal and organizational framework • Dominika Dziwisz
8 Hungary’s evolving cyber security strategy • Annamária Beláz and Dániel Berzsenyi
9 Romanian cybersecurity efforts: a work in progress • Oana-Elena Brânda
10 Italy’s cyber security architecture and critical infrastructure • Tommaso De Zan, Giampiero Giacomello, and Luigi Martino
11 Dutch cyber security strategy • Joost Bunk and Max Smeets
12 Norwegian cyber security: a small-state approach to building international cyber cooperation 143Lars Gjesvik
13 Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty • Ilona Stadnik
14 Slovakia: the Tatra Tiger without teeth • Aaron T. Walter
15 Slovenia: a fragmented cyber security • Laris Gaiser
16 In the line of Russian Ukraine, hybrid warfare, and cybersecurity defense aggression: Ukraine, hybrid warfare, and cybersecurity defense • Olya Zaporozhets and Oleksiy Syvak
17 United Kingdom: pragmatism and adaptability in the cyber realm • Tim Stevens
18 European Union: policy, cohesion, and supranational experiences with cybersecurity • Christopher Whyte
19 Estonia: from the “Bronze Night” to cybersecurity pioneers • Nick Robinson and Alex Hardy
20 NATO’s evolving cyber security policy and strategy • Scott N. Romaniuk, Alexander Fotescu, and Mihai Chihaia
Part II: Asia and Australia
21 Japan’s challenges, capabilities, and preparedness in cyberspace • Tobias Burgers, Scott N. Romaniuk, and Cherry H. Y. Wong
22 An effective shield? Analyzing South Korea’s cybersecurity strategy • Yangmo Ku
23 In the line of fire: Taiwan’s legal, political, and technological cybersecurity posture • Tobias Burgers, Moritz Hellmann, and Scott N. Romaniuk
24 Serving the people: China’s cybersecurity policy and its implications • Yu Cheng Chen, Tony Tai-Ting Liu, and Scott N. Romaniuk
25 Cybersecurity in a one-party state: policies and implications for Vietnam’s economy and online freedom • Phan Le
26 The Philippines’ cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability • Amparo Pamela H. Fabe and Ella Zarcilla-Genecela
27 Malaysia: balancing national development, national security, and cybersecurity policy • Ahmad El-Muhammady
28 Cyber governance and data protection in India: a critical legal analysis • Debarati Halder and K. Jaishankar
29 Cybersecurity: a national priority for Bangladesh • Md. Shariful Islam
30 Managing a digital revolution: cyber security capacity building in Myanmar • Niels Nagelhus Schia and Lars Gjesvik
31 Australia’s cyber security: a unique opportunity • Ana Stuparu
32 Singapore: a leading actor in ASEAN cybersecurity • Benjamin Ang
Part III: The Middle East
33 Between multi-stakeholderism and cyber sovereignty: understanding Turkey’s cybersecurity strategy • Tuba Eldem
34 Israel: cyber defense and security as national trademarks of international legitimacy • Fabio Cristiano
35 Palestine: whose cyber security without cyber sovereignty? • Fabio Cristiano
36 The “Silicon Valley of the Middle East”: cybersecurity, Saudi Arabia, and the path to Vision 2030 • Anwar Ouassini and Kimeu W. Boynton
37 The Islamic Republic of Iran’s cyber security strategy: challenges in anera of cyber uncertainty • Filiz Katman
Part IV: The Americas
38 Canada’s cyber security in a globalized environment: challenges and opportunities • Kawser Ahmed
39 The United States: a declining hegemon in cyberspace? • Mary Manjikian
40 Jamaica’s cybercrime and cyber-security: policies, laws, and strategies • Suzette A. Haughton
41 Mexico and cybersecurity: policies, challenges, and concerns • Saúl Mauricio Rodriguez-Hernandez and Nicolás Velásquez
42 Colombia’s cybersecurity predicament: state making, strategic challenges, and cyberspace • Florent Frasson-Quenoz and César Augusto Niño González
43 Cyber security governance in Brazil: keeping silos or building bridges? • Louise Marie Hurel and Luisa Cruz Lobato
Part V: Africa
44 Securitizing cyberspace in Egypt: the dilemma of cybersecurity and democracy • Bassant Hassib and Nardine Alnemr
45 Security through the Arab Winter: cyber strategies in postrevolutionary Tunisia • Nabil Ouassini
46 Cyber security in Kenya: balancing economic security and internet freedom • James D. Fielder
47 Cybersecurity policy in Nigeria: a tool for national security and economic prosperity • Adewunmi J. Falode
48 Cybersecurity in Ghana: past, present, and future • Anwar Ouassini and Mostafa Amini
49 Building a cyber fortress in Africa: Uganda’s cyber security capacities and challenges • Scott N. Romaniuk and David Andrew Omona
50 Cybersecurity in South Africa: status, governance, and prospects • Raymond Steenkamp Fonseca and Jo-Ansie van Wyk
51 Algorithms of oppression? AU’s cybersecurity policy and its enforcement in Africa • Joshua Oreoluwa Akintayo
Index


📜 SIMILAR VOLUMES


Routledge Companion to Global Heritage C
✍ Vinayak Bharne (editor), Trudi Sandmeier (editor) 📂 Library 📅 2019 🏛 Routledge 🌐 English

<p><span>The act of identifying, protecting, restoring, and reusing buildings, districts, and built landscapes of historic and cultural significance is, at its best, a reflective and consequential process of urban and socio-economic reform. It has the potential to reconcile conflicting memories, mea

The Routledge Companion to Global Photog
✍ Lucy Soutter, Duncan Wooldridge 📂 Library 📅 2024 🏛 Routledge 🌐 English

<p><span>In response to widespread demand for more knowledge and insight about contemporary photographies beyond Western centers of production and dissemination, this volume provides a transnational discussion, grounded in dialogue between authors and editors from diverse locations and contexts.</sp

The Routledge Companion to Literature an
✍ Alfred J. López (editor), Ricardo Quintana-Vallejo (editor) 📂 Library 📅 2023 🏛 Routledge 🌐 English

The Routledge Companion Literature and the Global South offers a comprehensive overview of the field at a key moment in its development-a snapshot of where Global South literary studies stands in its second decade. As the aftermath of a string of global cataclysms since the rise of neoliberal global