Abstract
The Internet facilitates a level of interoperability among individuals, organizations, sectors, and countries that generates widening opportunities for collaboration and innovation. Digital infrastructure is rapidly becoming the lifeblood of a more virtual and interdependent globalizing economy, as every major industrial sector widens its reliance on electronic systems and online connectivity. At the same time, online and virtual threats to organizations in all sectors have become a way of virtual life. Facing increasingly frequent threats externally, governments carry the dual responsibilities of safeguarding their own infrastructures and information holdings as well as overseeing the digital resilience of their jurisdictions as a whole.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The data breach involved the loss of an external memory stick within the federal department responsible for student loan processing (Human Resources and Skills Development Canada): financial and personal data on an estimated 500,000 citizens, holders of student loans, was said to be misplaced. One irony of this episode is reporting that the spectre of legal action against the government may prompt it toward wider usage of cloud systems—for which the federal government has proved trepid in exploring due to concerns about data privacy (Press 2013). Such themes in terms of personal privacy and the Government of Canada’s cautious temperament toward digital renewal and cloud systems specifically are returned to later in this chapter as well as Chap. 8, respectively.
- 2.
Source, Wikipedia: http://en.wikipedia.org/wiki/2010_Polish_Air_Force_Tu-154_crash
- 3.
Obama, B. (2009). Obama announces complete overhaul of cyber security (Part 1), May 29th (http://www.youtube.com/watch?v=dgDsXAykAm0).
- 4.
The United States also reportedly launched its first major cyber-attack on another country in 2011, a coordinated effort with Israel aimed at destabilizing Iran’s nuclear development program. The action, reported in the New York Times and in a subsequent book, also sparked heightened debate and concern among lawmakers about leaks and the need for secrecy pertaining to national security measures (yet another example of widening tensions between openness—imposed or invited—and the traditional public sector culture of secrecy).
- 5.
Source, US White House. (2012). Digital government: Building a 21st century platform to better serve the American people (http://www.whitehoiuse.gov/sites/default/files/omb/egov/digital-government/digital-government.html). The report provides a thoughtful and useful examination of the implications of mobility and security for public sector governance both internally and in terms of external outreach.
References
Andoh-Baidoo, F. K., Amoako-Gyampah, K., & Osei-Bryson, K.-M. (2010). How internet security breaches harm market value. IEEE Security & Privacy, 8(1), 36–42.
Clemens, J., & Crowley, B. L. (2012). Solutions to critical infrastructure problems: Essays on protecting Canada’s infrastructure. Ottawa, ON: The MacDonald—Laurier Institute.
Cornish, P. (2009). Cyber security and politically, socially and religiously motivated cyber attacks. Brussels: Directorate-General for External Policies of the Union Directorate Policy Department. European Parliament.
Eggers, W. (2005). Government 2.0: Using technology to improve education, cut red tape, reduce gridlock and enhance democracy. New York: Rowman and Littlefield Publishers.
Goldsmith, J., & Hathaway, M. (2010). The cyber security changes we need. The Washington Post.
Goodyear, M., Goerdel, H. T., Portillo, S., & Williams, L. (2010). Cybersecurity management in the states: The emerging role of chief information security officers. Washington, DC: IBM Center for The Business of Government.
Gupta, U. (2010). Wanted: 10,000 New Cybersecurity Pros.
INSA. (2009). Addressing cyber security through public-private partnership: An analysis of existing models. Washinton, DC: Intelligence and National Security Alliance (INSA).
Irvine, C. E., & Palmer, C. C. (2010). Call in the cyber national guard! IEEE Security & Privacy, 8(1), 56–59.
Kwon, K. (2012). South Korea’s ‘Best of the Best’ tackle cyber crime. Retrieved from CNN: http://edition.cnn.com/2013/01/14/world/asia/south-korea-hackers/index.html
Langford, J., & Roy, J. (2009). Service transformation, public-private partnerships & shared accountability? Emerging ideas and new practices in B.C., Canada. International Journal of Public Policy, 4(3), 232–250.
Mayeda, A., & Miller, H. (2012). Secret memo warns of Canadian cyber threat after Nortel attack. Retrieved from Financial Post: http://business.financialpost.com/2012/06/06/secret-memo-warns-of-canadian-cyber-threat-after-nortel-attack/
Ponemon. (2011, May). Seven Tips for Securing Mobile Workers. Ponemon Institute LLC.
Ponemon. (2011). Global survey on social media risks: Survey of IT & IT security practitioners in Canada. The Ponemon Institute.
Press, J. (2013). Legal threats over lost student loan SIN numbers may finally push government to better secure data. Retrieved from National Post: http://news.nationalpost.com/2013/01/18/legal-threats-over-lost-student-loan-sin-numbers-may-finally-push-government-to-better-secure-data/
Quigley, K., & Roy, J. (2011). Cyber-security and risk management in an interoperable world: An examination of governmental action in North America. Social Sciences Computer Review, 30(1), 83–94.
Roy, J. (2008). Beyond Westminster governance: Bringing politics and public service into the network era. Canadian Public Administration, 5(4), 541–568.
Roy, J. (2010). The rise of networked governance everywhere but in Westminster democracy. Policy options, September, 2010. Montreal, QC: Institute for Research on Public Policy.
Shirky, C. (2008). Here comes everybody: The power of organizing without organizations. New York: Penguin Group.
Stoker, G. (2005). Public value management—A new narrative for networked governance? American Review of Public Administration, 36(1), 41–57.
Williams, A. (2008). Government 2.0: Wikinomics and the challenge to government. Canadian Government Executive.
Wyld, D. (2007). The blogging revolution: Government in the age of Web 2.0. Washington, DC: IBM Endowment for The Business of Government.
Wyld, D. C. (2010a). Moving to the cloud: An introduction to cloud computing in government. Washington, DC: IBM Center for The Business of Government.
Wyld, D. C. (2010b). THE cloudy future of government IT: Cloud computing and the public sector around the world. International Journal of Web & Semantic Technology, 1(1).
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Roy, J. (2013). Cybersecurity. In: From Machinery to Mobility. Public Administration and Information Technology, vol 2. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7221-6_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7221-6_5
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7220-9
Online ISBN: 978-1-4614-7221-6
eBook Packages: Business and EconomicsEconomics and Finance (R0)