Skip to main content

Cybersecurity

  • Chapter
  • First Online:
From Machinery to Mobility

Part of the book series: Public Administration and Information Technology ((PAIT,volume 2))

Abstract

The Internet facilitates a level of interoperability among individuals, organizations, sectors, and countries that generates widening opportunities for collaboration and innovation. Digital infrastructure is rapidly becoming the lifeblood of a more virtual and interdependent globalizing economy, as every major industrial sector widens its reliance on electronic systems and online connectivity. At the same time, online and virtual threats to organizations in all sectors have become a way of virtual life. Facing increasingly frequent threats externally, governments carry the dual responsibilities of safeguarding their own infrastructures and information holdings as well as overseeing the digital resilience of their jurisdictions as a whole.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The data breach involved the loss of an external memory stick within the federal department responsible for student loan processing (Human Resources and Skills Development Canada): financial and personal data on an estimated 500,000 citizens, holders of student loans, was said to be misplaced. One irony of this episode is reporting that the spectre of legal action against the government may prompt it toward wider usage of cloud systems—for which the federal government has proved trepid in exploring due to concerns about data privacy (Press 2013). Such themes in terms of personal privacy and the Government of Canada’s cautious temperament toward digital renewal and cloud systems specifically are returned to later in this chapter as well as Chap. 8, respectively.

  2. 2.

    Source, Wikipedia: http://en.wikipedia.org/wiki/2010_Polish_Air_Force_Tu-154_crash

  3. 3.

    Obama, B. (2009). Obama announces complete overhaul of cyber security (Part 1), May 29th (http://www.youtube.com/watch?v=dgDsXAykAm0).

  4. 4.

    The United States also reportedly launched its first major cyber-attack on another country in 2011, a coordinated effort with Israel aimed at destabilizing Iran’s nuclear development program. The action, reported in the New York Times and in a subsequent book, also sparked heightened debate and concern among lawmakers about leaks and the need for secrecy pertaining to national security measures (yet another example of widening tensions between openness—imposed or invited—and the traditional public sector culture of secrecy).

  5. 5.

    Source, US White House. (2012). Digital government: Building a 21st century platform to better serve the American people (http://www.whitehoiuse.gov/sites/default/files/omb/egov/digital-government/digital-government.html). The report provides a thoughtful and useful examination of the implications of mobility and security for public sector governance both internally and in terms of external outreach.

References

  • Andoh-Baidoo, F. K., Amoako-Gyampah, K., & Osei-Bryson, K.-M. (2010). How internet security breaches harm market value. IEEE Security & Privacy, 8(1), 36–42.

    Article  Google Scholar 

  • Clemens, J., & Crowley, B. L. (2012). Solutions to critical infrastructure problems: Essays on protecting Canada’s infrastructure. Ottawa, ON: The MacDonald—Laurier Institute.

    Google Scholar 

  • Cornish, P. (2009). Cyber security and politically, socially and religiously motivated cyber attacks. Brussels: Directorate-General for External Policies of the Union Directorate Policy Department. European Parliament.

    Google Scholar 

  • Eggers, W. (2005). Government 2.0: Using technology to improve education, cut red tape, reduce gridlock and enhance democracy. New York: Rowman and Littlefield Publishers.

    Google Scholar 

  • Goldsmith, J., & Hathaway, M. (2010). The cyber security changes we need. The Washington Post.

    Google Scholar 

  • Goodyear, M., Goerdel, H. T., Portillo, S., & Williams, L. (2010). Cybersecurity management in the states: The emerging role of chief information security officers. Washington, DC: IBM Center for The Business of Government.

    Google Scholar 

  • Gupta, U. (2010). Wanted: 10,000 New Cybersecurity Pros.

    Google Scholar 

  • INSA. (2009). Addressing cyber security through public-private partnership: An analysis of existing models. Washinton, DC: Intelligence and National Security Alliance (INSA).

    Google Scholar 

  • Irvine, C. E., & Palmer, C. C. (2010). Call in the cyber national guard! IEEE Security & Privacy, 8(1), 56–59.

    Article  Google Scholar 

  • Kwon, K. (2012). South Korea’s ‘Best of the Best’ tackle cyber crime. Retrieved from CNN: http://edition.cnn.com/2013/01/14/world/asia/south-korea-hackers/index.html

  • Langford, J., & Roy, J. (2009). Service transformation, public-private partnerships & shared accountability? Emerging ideas and new practices in B.C., Canada. International Journal of Public Policy, 4(3), 232–250.

    Article  Google Scholar 

  • Mayeda, A., & Miller, H. (2012). Secret memo warns of Canadian cyber threat after Nortel attack. Retrieved from Financial Post: http://business.financialpost.com/2012/06/06/secret-memo-warns-of-canadian-cyber-threat-after-nortel-attack/

  • Ponemon. (2011, May). Seven Tips for Securing Mobile Workers. Ponemon Institute LLC.

    Google Scholar 

  • Ponemon. (2011). Global survey on social media risks: Survey of IT & IT security practitioners in Canada. The Ponemon Institute.

    Google Scholar 

  • Press, J. (2013). Legal threats over lost student loan SIN numbers may finally push government to better secure data. Retrieved from National Post: http://news.nationalpost.com/2013/01/18/legal-threats-over-lost-student-loan-sin-numbers-may-finally-push-government-to-better-secure-data/

  • Quigley, K., & Roy, J. (2011). Cyber-security and risk management in an interoperable world: An examination of governmental action in North America. Social Sciences Computer Review, 30(1), 83–94.

    Article  Google Scholar 

  • Roy, J. (2008). Beyond Westminster governance: Bringing politics and public service into the network era. Canadian Public Administration, 5(4), 541–568.

    Article  Google Scholar 

  • Roy, J. (2010). The rise of networked governance everywhere but in Westminster democracy. Policy options, September, 2010. Montreal, QC: Institute for Research on Public Policy.

    Google Scholar 

  • Shirky, C. (2008). Here comes everybody: The power of organizing without organizations. New York: Penguin Group.

    Google Scholar 

  • Stoker, G. (2005). Public value management—A new narrative for networked governance? American Review of Public Administration, 36(1), 41–57.

    Google Scholar 

  • Williams, A. (2008). Government 2.0: Wikinomics and the challenge to government. Canadian Government Executive.

    Google Scholar 

  • Wyld, D. (2007). The blogging revolution: Government in the age of Web 2.0. Washington, DC: IBM Endowment for The Business of Government.

    Google Scholar 

  • Wyld, D. C. (2010a). Moving to the cloud: An introduction to cloud computing in government. Washington, DC: IBM Center for The Business of Government.

    Google Scholar 

  • Wyld, D. C. (2010b). THE cloudy future of government IT: Cloud computing and the public sector around the world. International Journal of Web & Semantic Technology, 1(1).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Roy, J. (2013). Cybersecurity. In: From Machinery to Mobility. Public Administration and Information Technology, vol 2. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7221-6_5

Download citation

Publish with us

Policies and ethics