Show Less
You do not have access to this content

Enforcing Cybersecurity in Developing and Emerging Economies

Institutions, Laws and Policies

Zeinab Karake, Rana A. Shalhoub and Huda Ayas

This unique, innovative examination of cyberspace policies and strategies and their relation to cyber laws and regulations in developing and emerging economies uses economic, political, and social perspectives as a vehicle for analysis. With cyber risk at the top of the global agenda as high-profile breaches increase worries that cybersecurity attacks might compromise the world economy, this analysis becomes relevant across disciplines.
Show Summary Details
You do not have access to this content

Chapter 3: Chapter 3

Zeinab Karake, Rana A. Shalhoub and Huda Ayas


This chapter covers the various theoretical foundations of cybersecurity in general and cybersecurity polices and strategies in particular. In addition to the resource based view (RBV) theory, a number of other theories are covered, which were recently advanced in the literature to assess cybersecurity. Three theories are highlighted: the economic, the public goods, and deterrence theories. The chapter covers deterrence theory and the four approaches associated with it. Specifically, we emphasize the role cyber deterrence plays in drafting cybersecurity policies, through declaration, credibility and the use of denial measures. We also indicate that in order for cybersecurity policies to be effective: (1) they must include reference to the ability to attribute; (2) they need to possess the ability to communicate deterrence capabilities; and (3) they need to have a certain level of credibility to act on the stated intentions. Achieving those three conditions is not as easy as it might sound. The chapter concludes by noting some important conceptual and methodological issues that need to be addressed by future research adopting the various theoretical perspectives of cybersecurity.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.