Show Less
You do not have access to this content

Enforcing Cybersecurity in Developing and Emerging Economies

Institutions, Laws and Policies

Zeinab Karake, Rana A. Shalhoub and Huda Ayas

This unique, innovative examination of cyberspace policies and strategies and their relation to cyber laws and regulations in developing and emerging economies uses economic, political, and social perspectives as a vehicle for analysis. With cyber risk at the top of the global agenda as high-profile breaches increase worries that cybersecurity attacks might compromise the world economy, this analysis becomes relevant across disciplines.
Show Summary Details
You do not have access to this content

Chapter 4: Chapter 4

Zeinab Karake, Rana A. Shalhoub and Huda Ayas

Extract

This chapter provides an overview of the economics of security covering models that helped define economic-based models for the Internet economy from the 1990s, and trying to identify gaps in models’ structures and implementation. The chapter also covers the development of cybersecurity policies and strategies in the various economic blocs in developing and emerging economies. Content analysis of cybersecurity policies of the 63 countries in our sample is performed based on five constructs identified by the authors: economic, political, social, technical and political. Countries are assessed based on those constructs and the results are published in five tables. The discussion then moves to formulate the hypotheses dealing with possible determinants believed to determine the levels of quality, maturity and compliance of a country’s cybersecurity policies with international standards.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.


Further information

or login to access all content.