Routledge companion to global cyber-security strategy

"This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, and Asia. The volume offers an introduction to each nation's cybersecurity strategy and...

Full description

Bibliographic Details
Other Authors: Romaniuk, Scott N., 1979- editor (editor), Manjikian, Mary, editor
Format: eBook
Language:Inglés
Published: London ; New York, New York : Routledge [2021]
Edition:1st ed
Series:Routledge companions.
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009635722806719
Table of Contents:
  • Part I: Europe
  • Securing the kingdom's cyberspace: cybersecurity and cyber intelligence in Spain
  • Albania's cybersecurity pivot: between Western architectures and great power competition
  • Armenian national policy in cyber space: toward a global cyber security architecture
  • Czech Republic: a new cyber security leader in Central Europe
  • Cyber security in the French Republic
  • Germany's cybersecurity strategy: confronting future challeges
  • Cybersecurity of Poland: legal and organizational framework
  • Hungary's evolving cyber security strategyy
  • Romanian cybersecurity efforts: a work in progress
  • Italy's cyber security architecture and critical infrastructure
  • Dutch cyber security strategy
  • Norwegian cyber security: a small-state approach to building international cyber cooperation
  • Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty
  • Slovakia: the Tatra Tiger without teeth
  • Slovenia: a fragmented cyber security
  • In the line of Russian Ukraine. hybrid warfare, and cybersecurity defense aggression: Ukraine, hybrid warfare, and cybersecurity defense
  • United Kingdom: pragmatism and adaptability in the cyber realm
  • European Union: policy, cohesion, and supranational experiences with cybersecurity
  • Estonia: from the "Bronze Night" to cybersecurity pioneers
  • NATO's evolving cyber security policy and strategy
  • Part II: Asia and Australia
  • Japan's challenges, capabilities, and preparedness in cyberspace
  • An effective shield? Analyzing South Korea's cybersecurity strategy
  • In the line of fire: Taiwan's legal, political, and technological cybersecurity posture
  • Serving the people: China's cybersecurity policy and its implications
  • Cybersecurity in a one-party state: policies and implications for Vietnam's economy and online freedom
  • The Philippines' cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability
  • Malaysia: balancing national development, national security, and cybersecurity policy
  • Cyber governance and data protection in India: a critical legal analysis
  • Cybersecurity: a national priority in Bangledesh
  • Managing a digital revolution: cyber security capacity building in Myanmar
  • Australia's cyber security: a unique opportunity
  • Singapore: a leading actor in ASEAN cybersecurity
  • Part III: The Middle East
  • Between multi-stakeholderism and cyber sovereignty: understanding Turkey's cybersecurity strategy
  • Israel: cyber securitization as national trademark
  • Palestinian territory occupied: cybersecurity at reduced sovereignty
  • The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to Vision 2030
  • The Islamic Republic of Iran's cyber security strategy: challenges in an era of cyber uncertainty
  • Part IV: The Americas
  • Canada's cyber security in a globalized environment: challenges and opportunities
  • The United States: a declining hegemon in cyberspace?
  • Jamaica's cybercrime and cyber-security: policies, laws, and strategies
  • Mexico and cybersecurity: policies, challenges, and concerns
  • Colombia's cybersecurity predicament: state making, strategic challenges, and cyberspace
  • Cyber security governance in Brazil: keeping silos or building bridges?
  • Part V: Africa
  • Securitizing cyberspace in Egypt: the dilemma of cybersecurity and democracy
  • Security through the Arab Winter: cyber strategies in postrevolutionary Tunisia
  • Cyber security policy in Nigeria: a tool for national security and economic prosperity
  • Cybersecurity in Ghana: past, present, and future
  • Building a cyber fortress in Africa: Uganda's cyber security capacities and challenges
  • Cybersecurity in South Africa: status, governance, and prospects
  • Algorithms of oppression? AU's cybersecurity policy and its enforcement in Africa.