Handbook of Governance and Security
Show Less

Handbook of Governance and Security

Edited by James Sperling

The Handbook of Governance and Security examines the conceptual evolution of security governance and the different manifestations of regional security governance. In particular, James Sperling brings together unique contributions from leading scholars to explore the role of institutions that have emerged as critical suppliers of security governance and the ever-widening set of security issues that can be viewed profitably through a governance lens.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 18: Cyberspace

Scott Jasper


All sectors of the economy rely on networks, systems and services that form an integrated and interconnected domain known as cyberspace. In addition, cyber assets are essential to national defense including military operations on land, at sea and in both the air and space (Manzo 2011: 1–8). Yet protecting this domain is challenging because it is boundless, open to change and accessible to all parties. These characteristics do not lend themselves to either sovereign control or legal regimes. Events in cyberspace often involve overlapping jurisdictions that pose complex issues. While nations control servers, switches and routers as well as intellectual property, they cannot regulate the movement of information across unseen borders. Recent events reveal that cyber attacks are relentless, pervasive and dangerous. As the head of US Cyber Command has warned, ‘we are collectively vulnerable to an array of threats … and actions that are advancing from exploitation to disruption to destruction’ (Alexander 2012: 5). Such actions include theft, deletion or alteration of data, interference with computer processing and damage to physical systems. Hewlett Packard found that the average cost of cybercrime for 2012 as incurred by a benchmark sample of 56 organizations in various sectors was $8.9 million and the most expensive were caused by malicious code, denial of service, hijacked devices and malevolent insiders (Hewlett Packard 2012). As well as personal or corporate property theft, the hackers can manipulate or destroy systems, even in the case of space assets with interference of Landsat 7 and Terra imaging satellites (Johnson 2011: 15).

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.