Institutions, Laws and Policies
This chapter covers the various theoretical foundations of cybersecurity in general and cybersecurity polices and strategies in particular. In addition to the resource based view (RBV) theory, a number of other theories are covered, which were recently advanced in the literature to assess cybersecurity. Three theories are highlighted: the economic, the public goods, and deterrence theories. The chapter covers deterrence theory and the four approaches associated with it. Specifically, we emphasize the role cyber deterrence plays in drafting cybersecurity policies, through declaration, credibility and the use of denial measures. We also indicate that in order for cybersecurity policies to be effective: (1) they must include reference to the ability to attribute; (2) they need to possess the ability to communicate deterrence capabilities; and (3) they need to have a certain level of credibility to act on the stated intentions. Achieving those three conditions is not as easy as it might sound. The chapter concludes by noting some important conceptual and methodological issues that need to be addressed by future research adopting the various theoretical perspectives of cybersecurity.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.