Definition
Cybersecurity policy refers to a course of action adopted by a state, an organization, or a set of actors with the aim of ensuring cybersecurity and/or digital competitiveness as well as defining the individual and collective responsibilities in pursuit of that goal.
Introduction: What Is Cybersecurity Policy and Why Does It Matter?
Cybersecurity policy refers to a course of action adopted by a state, an organization, or a set of actors with the aim of ensuring cybersecurity and/or digital competitiveness as well as defining the individual and collective responsibilities in pursuit of that goal. Broadly conceived, this area of public policy concerns complex, multifaceted, and dynamic security and business innovation related to information and communications technology (ICT). Cybersecurity policymaking includes legal, regulatory, technical, organizational, behavioral, international, and other capacity-building areas. Policy dimensions attached to these include information...
References
Ansley, R. (2017, February 15). Tallinn manual 2.0: Defending Cyberspace. Atlantic Council Blog.
Bartholomew, B., & Gurrero-Saade, J. A. (2016). Wave your false flags! Deception tactics muddying attribution in targeted attacks. In Virus bulletin conference, October.
BIICL. (2014, October 9). State responsibility for Cyber operations: International law issues: Event report. British Institute of International and Comparative Law.
Carr, M. (2016a). Public-private partnerships in national cyber security strategies. International Affairs, 92(1), 43–62.
Carr, M. (2016b). Crossed wires: International cooperation on Cyber security. Journal of International Affairs, 2015/2016(2), 1–2.
Clemente, D. (2013). Adaptive internet governance: Persuading the Swing States. Internet Governance Papers, No. 5, October.
Haasnoot, M., Kwakkel, J. H., Walker, W. E., & ter Maat, J. (2013). Dynamic adaptive policy pathways: A method for crafting robust decisions for a deeply uncertain world. Global Environmental Change, 23(2), 485–498.
Hussain, A., Shaikh, S. A., Chung, A., Dawda, S., & Carr, M. (2018). An evidence quality assessment model for cybersecurity policymaking. In Technical proceedings: International Federation for Information Processing (IFIP) Conference, 13 March, Arlington.
Mussington, D. (2018). Governing Cyber Security in Canada, Australia and the United States. In C. Leuprect & S. MacLellan (Eds.), Centre for International Governance Innovation: Special Report, April.
Osborne, G. (2015). Chancellor’s speech to GCHQ on Cyber Security. UK HM Treasury online.
Ostrom, V., Tiebour, C. M., & Warren, R. (1961). The organization of government in metropolitan areas: A theoretical inquiry. American Political Science Review, 55(4), 831–842.
Parcell, J., & Holden, S. H. (2013). Agile policy development for digital government: An exploratory case study. In Conference: Proceedings of the 14th annual international conference on digital government research.
Rid, T., & Buchanan, T. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1/2), 4–37.
Tanczer, L., Brass, I., Elsden, M., Carr, M., & Blackstock, J. (2018). The United Kingdom’s emerging internet of things (IoT) policy landscape. In R. Ellis & V. Mohan (Ed.), Rewired: Cybersecurity governance. Hoboken: Wiley.
techUK. (2015). UK’s digital economy is world leading in terms of proportion of GDP. 1 May.
Further Reading
Her Majesty’s Government. (2016). National Cyber security strategy 2016–2021 (cited as NCSS).
NCS. (2018). National Cyber strategy of the United States of America ‘National Cyber Strategy of the United States of America.’ The White House, Washington, DC, September.
NSS. (2017). National Security strategy of the United States of America. The White House, Washington, DC, December.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this entry
Cite this entry
Chung, A., Dawda, S., Hussain, A., Shaikh, S.A., Carr, M. (2019). Cybersecurity: Policy. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_20-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-69891-5_20-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69891-5
Online ISBN: 978-3-319-69891-5
eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences