Show Less
You do not have access to this content

Enforcing Cybersecurity in Developing and Emerging Economies

Institutions, Laws and Policies

Zeinab Karake, Rana A. Shalhoub and Huda Ayas

This unique, innovative examination of cyberspace policies and strategies and their relation to cyber laws and regulations in developing and emerging economies uses economic, political, and social perspectives as a vehicle for analysis. With cyber risk at the top of the global agenda as high-profile breaches increase worries that cybersecurity attacks might compromise the world economy, this analysis becomes relevant across disciplines.
Show Summary Details
You do not have access to this content

Chapter 5: Chapter 5

Zeinab Karake, Rana A. Shalhoub and Huda Ayas

Extract

The main thrust of Chapter 5 deals with identifying appropriate variables to measure the level of maturity of cybersecurity policy identified in the formulated hypotheses, create the cybersecurity index, develop a predictive statistical model and present the results of the regression analysis, isolating the statically significant variables. The chapter also discusses the classification of the countries in our sample into five different categories based on the level of maturity of their cybersecurity policy: These are the Cheetahs, the Gazelles, the Bears, the Koalas and the Tortoises.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.


Further information

or login to access all content.