Cyber Law and Cyber Security in Developing and Emerging Economies
Show Less

Cyber Law and Cyber Security in Developing and Emerging Economies

Zeinab Karake Shalhoub and Sheikha Lubna Al Qasimi

This timely and important book illuminates the impact of cyber law on the growth and development of emerging and developing economies. Using a strong theoretical framework firmly grounded in resource-based and technology diffusion literature, the authors convey a subtle understanding of the ways public and private sector entities in developing and emerging countries adopt cyber space processes.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 6: Conclusion, Recommendations, and Future Research

Zeinab Karake Shalhoub and Sheikha Lubna Al Qasimi


INTRODUCTION In this book, we have provided a guiding framework for understanding the determinants of cyber law maturity in a number of developing and emerging economies from a resource-based theory perspective. The work performed here and the conclusions reached are unique in nature and have several characteristics, none of which has received attention in the legal, information technology (IT), or economics literature. The analysis of cyber law contents and guidelines in a cross-section of developing and emerging countries conducted in this study proved that not only physical infrastructure measures are important in explaining variations in cyber space activities and Internet use, but also intangible institutional measures are critical to the success of a country in utilizing cyber space. The book examined the degree of dependence of cyber law maturity on the strengths of a number of institutional, knowledge base, and physical resources. The adaptation of the Internet for commerce has widely stretched its reach globally, making access available to previously restricted markets. Specifically, developing and emerging countries’ access to the Internet has been a source of economic value-added. The resulting shift to affordable networked computers and devices has made the Internet available to the masses. Given the growth of cyber activities, the absence of a coordinated, comprehensive control framework has added to the spread of cyber crime in all shapes and forms. Information is being changed into a digital format at an exponential rate; an estimated 61 billion gigabytes of digital information was created in 2006 alone; this is equivalent...

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.