Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010240054 | TK5105.59 C927 2012 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks.
An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world.nbsp;Offering practical guidance for addressing contemporary risks, the book is organized into three sections:
Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective.
Author Notes
Mr. Kim Andreasson has advised the United Nations on e-government since 2003, most recently in preparation for the global 2012 e-government survey, and is a managing director of DAKA advisory AB, a consultancy. He was previously an associate director and a senior editor at The Economist Group's Business Research division where he co-edited the annual report on the Digital Economy Rankings. Andreasson is an elected member of the International Institute of Strategic Studies and the Pacific Council of International Policy and is a John C. Whitehead Fellow at the Foreign Policy Association. He serves on the editorial board of the Journal of Information Technology and Politics.
Table of Contents
Preface | p. ix |
Introduction | p. xiii |
The Editor | p. xxvii |
Contributor Biographies (in Order of Appearance) | p. xxix |
Chapter 1 The Global Rise of E-Government and Its Security Implications | p. 1 |
Chapter 2 Understanding Cyber Threats | p. 27 |
Chapter 3 Cybersecurity in East Asia: Japan and the 2009 Attacks on South Korea and the United States | p. 55 |
Chapter 4 Toward a Global Approach to Cybersecurity | p. 77 |
Chapter 5 The Cybersecurity Policy Challenge: The Tyranny of GeographyElaine C. Kamarck | |
Chapter 6 U.S. Federal Cybersecurity Policy | p. 127 |
Chapter 7 European Cybersecurity Policy | p. 159 |
Chapter 8 A Local Cybersecurity Approach: The Case of Catalonia | p. 193 |
Chapter 9 Securing Government Transparency: Cybersecurity Policy Issues in a Gov 2.0 Environment and Beyond | p. 223 |
Chapter 10 The Civilian Cyber Incident Response Policies of the U.S. Federal Government | p. 255 |
Chapter 11 Cybersecurity Health Check: A Framework to Enhance Organizational Security | p. 275 |
Chapter 12 Beyond Public-Private Partnerships: Leadership Strategies for Securing Cyberspace | p. 293 |
Chapter 13 Is There a Conclusion to Cybersecurity? | p. 327 |
Index | p. 339 |