Cart
Free Shipping in the UK
Proud to be B-Corp

Routledge Companion to Global Cyber-Security Strategy Scott N. Romaniuk (University of South Wales, UK)

Routledge Companion to Global Cyber-Security Strategy By Scott N. Romaniuk (University of South Wales, UK)

Routledge Companion to Global Cyber-Security Strategy by Scott N. Romaniuk (University of South Wales, UK)


£52.99
Condition - New
Only 2 left

Summary

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa and Asia.

Routledge Companion to Global Cyber-Security Strategy Summary

Routledge Companion to Global Cyber-Security Strategy by Scott N. Romaniuk (University of South Wales, UK)

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia.

The volume offers an introduction to each nations cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contains the following sections:

  • overview of national cyber-security strategy;
  • concepts and definitions;
  • exploration of cyber-security issues as they relate to international law and governance;
  • critical examinations of cyber partners at home and abroad;
  • legislative developments and processes;
  • dimensions of cybercrime and cyberterrorism;
  • implications of cyber-security policies and strategies.

This book will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy, and international relations.

Routledge Companion to Global Cyber-Security Strategy Reviews

'To create this omnibus collection, Romaniuk (Univ. of Alberta) and Manjikian (Regent Univ.) gathered the most comprehensive possible set of essays on national cybersecurity policies. Each of the 51 chapters provides an up-to-date summary and analysis of a single country's cybersecurity situation and strategies. Hostile-state actors, online terrorists, organized criminal groups, black hat hackers, and other bad actors all must be countered through sophisticated advance planning. Defenders are generally at a significant disadvantage against their nimbler attackers. Policies vary according to how each nation defines and prioritizes the potential threats. An authoritarian government, for example, will be far more concerned with controlling politically sensitive information that might undermine the power of the ruling regime than a more democratic nation. A maritime country is likely to prioritize different defenses than one that is landlocked. Countries that were once parts of the former Soviet Union fear hybrid warfare attacks that might be launched from Russia. Although the individual essays provide fine summaries of the unique laws, political forces, and social dynamics obtaining in each nation discussed, the book as a whole would have been greatly enhanced by expanding the editors' nine-page introduction to further integrate the themes drawn from these diverse contributions.

Summing Up: Recommended. Upper-division undergraduates. Graduate students, faculty, and professionals.'

--T. H. Koenig, Northeastern University, Choice, December 2022

About Scott N. Romaniuk (University of South Wales, UK)

Scott N. Romaniuk is a Postdoctoral Research Fellow in Security Studies at the China Institute, University of Alberta, Canada, and a Visiting Fellow at the International Centre for Policing and Security, University of South Wales, UK.

Mary Manjikian is Associate Dean of the Robertson School of Government at Regent University, USA.

Table of Contents

Foreword: Global cybersecurity in the 21st century; Introduction: cybersecurity strategy and policy in a comparative context (Mary Manjikian and Scott N. Romaniuk); Part I: Europe; 1 Securing the kingdoms cyberspace: cybersecurity and cyber intelligence in Spain (Ruben Arcos); 2 Albanias cybersecurity pivot: between western architectures and great power competition (Alexander Fotescu and Mihai Chihaia); 3 Armenian national policy in cyber space: toward a global cyber security architecture (Ruben Elamiryan); 4 Czech Republic: a new cyber security leader in Central Europe (Lucie Kadlecova and Michaela Semecka); 5 Cybersecurity in the French Republic (Amber Darwish and Scott N. Romaniuk); 6 Germanys cybersecurity strategy: confronting future challenges (Scott N. Romaniuk and Michael Claus); 7 Cybersecurity of Poland: legal and organizational framework (Dominika Dziwisz); 8 Hungary: from the groundworks to an evolving cyber security landscape (Annamaria Belaz and Daniel Berzsenyi); 9 Romanian cybersecurity efforts: a work in progress (Oana-Elena Branda); 10 Italys cybersecurity architecture and critical infrastructure (Tommaso De Zan, Giampiero Giacomello, and Luigi Martino); 11 Dutch cyber security strategy (Joost Bunk and Max Smeets); 12 Norwegian cybersecurity: a small-state approach to building international cyber cooperation (Lars Gjesvik); 13 Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty (Ilona Stadnik); 14 Slovakia: the Tatra Tiger without teeth (Aaron T. Walter); 15 Slovenia: a fragmented cyber security (Laris Gaiser); 16 In the line of Russian aggression: Ukraine, hybrid warfare, and cyber security defense (Olya Zaporozhets and Oleksiy Syvak); 17 United Kingdom: pragmatism and adaptability in the cyber realm (Tim Stevens); 18 European Union: policy, cohesion, and supranational experiences with cybersecurity (Christopher Whyte); 19 Estonia: from the "Bronze Night" to cybersecurity pioneers (Nick Robinson and Alex Hardy); 20 NATOs evolving cyber security policy and strategy (Scott N. Romaniuk, Alexander Fotescu, and Mihai Chihaia); Part II: Asia and Australia; 21 Japans challenges, capabilities, and preparedness in cyberspace (Tobias Burgers, Scott N. Romaniuk, and Cherry H. Y. Wong); 22 An effective shield? Analyzing South Koreas cybersecurity strategy (Yangmo Ku); 23 In the line of fire: Taiwans legal, political, and technological cybersecurity posture (Tobias Burgers, Moritz Hellmann and Scott N. Romaniuk); 24 Serving the people: Chinas cybersecurity policy and its implications (Yu-Cheng Chen, Tony Tai-Ting Liu, and Scott N. Romaniuk); 25 Cybersecurity in a one-party state: policies and implications for Vietnams economy and online freedom (Phan Le); 26 The Philippines cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability (Amparo Pamela, H. Fabe, and Ella Zarcilla-Genecela); 27 Malaysia: balancing national development, national security, and cybersecurity policy (Ahmad El-Muhammady); 28 Cyber governance and data protection in India: a critical legal analysis (Debarati Halder and K. Jaishankar); 29 Cyber security: a national priority for Bangladesh (Md. Shariful Islam); 30 Managing a digital revolution: cyber security capacity building in Myanmar (Niels Nagelhus Schia and Lars Gjesvik); 31 Australias cyber security: a unique opportunity (Ana Stuparu); 32 Singapore: a leading actor in ASEAN cybersecurity (Benjamin Ang); Part III: The Middle East; 33 Between multi-stakeholderism and cyber sovereignty: uunderstanding Turkeys cybersecurity strategy (Tuba Eldem); 34 Israel: cyber defence and security as national trademarks of international legitimacy (Fabio Cristiano); 35 Palestine: Whose cybersecurity without cyber sovereignty? (Fabio Cristiano); 36 The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to vision 2030 (Anwar Ouassini and Kimeu W. Boynton); 37 The Islamic Republic of Irans cybersecurity strategy: challenges in an era of cyber uncertainty (Filiz Katman); Part IV: The Americas; 38 Canadas cyber security in a globalized environment: challenges and opportunities (Kawser Ahmed); 39 The United States: a declining hegemon in Cyberspace? (Mary Manjikian); 40 Jamaicas cybercrime and cyber-security: policies, laws, and strategies (Suzette A. Haughton); 41 Mexico and cybersecurity: policies, challenges, and concerns (Saul Mauricio Rodriguez-Hernandez and Nicolas Velasquez); 42 Colombias cybersecurity predicament: state making, strategic challenges and the cyberspace (Florent Frasson-Quenoz and Cesar Augusto Nino Gonzalez); 43 Cybersecurity Governance in Brazil: Keeping Silos or Building Bridges? (Louise Marie Hurel and Luisa Cruz Lobato) Part V: Africa; 44 Securitizing Cyber Space in Egypt: the Dilemma of Cybersecurity and Democracy (Bassant Hassib and Nardine Alnemr); 45 Security through the Arab Winter: cyber strategies in postrevolutionary Tunisia (Nabil Ouassini); 46 Cyber security in Kenya: balancing economic security and internet freedom (James D. Fielder); 47 Cybersecurity policy in Nigeria: a tool for national security and economic prosperity (Adewunmi J. Falode); 48 Cybersecurity in Ghana: past, present, and future (Anwar Ouassini and Mostafa Amini); 49 Building a Cyber Fortress in Africa: ugandas cyber security capacities and challenges (Scott N. Romaniuk and David Andrew Omona); 50 Cybersecurity in South Africa: status, governance, and prospects (Raymond Steenkamp Fonseca and Jo-Ansie van Wyk); 51 Algorithms of oppression? AUs cybersecurity policy and its enforcement in Africa (Joshua Oreoluwa Akintayo); Index

Additional information

NPB9780367620660
9780367620660
0367620669
Routledge Companion to Global Cyber-Security Strategy by Scott N. Romaniuk (University of South Wales, UK)
New
Paperback
Taylor & Francis Ltd
2023-01-09
24
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a new book - be the first to read this copy. With untouched pages and a perfect binding, your brand new copy is ready to be opened for the first time

Customer Reviews - Routledge Companion to Global Cyber-Security Strategy