Advertisement

Cybersecurity

  • Jeffrey Roy
Chapter
Part of the Public Administration and Information Technology book series (PAIT, volume 2)

Abstract

The Internet facilitates a level of interoperability among individuals, organizations, sectors, and countries that generates widening opportunities for collaboration and innovation. Digital infrastructure is rapidly becoming the lifeblood of a more virtual and interdependent globalizing economy, as every major industrial sector widens its reliance on electronic systems and online connectivity. At the same time, online and virtual threats to organizations in all sectors have become a way of virtual life. Facing increasingly frequent threats externally, governments carry the dual responsibilities of safeguarding their own infrastructures and information holdings as well as overseeing the digital resilience of their jurisdictions as a whole.

Keywords

Cloud System Cloud Computing System Collective Security Auditor General Digital Infrastructure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Andoh-Baidoo, F. K., Amoako-Gyampah, K., & Osei-Bryson, K.-M. (2010). How internet security breaches harm market value. IEEE Security & Privacy, 8(1), 36–42.CrossRefGoogle Scholar
  2. Clemens, J., & Crowley, B. L. (2012). Solutions to critical infrastructure problems: Essays on protecting Canada’s infrastructure. Ottawa, ON: The MacDonald—Laurier Institute.Google Scholar
  3. Cornish, P. (2009). Cyber security and politically, socially and religiously motivated cyber attacks. Brussels: Directorate-General for External Policies of the Union Directorate Policy Department. European Parliament.Google Scholar
  4. Eggers, W. (2005). Government 2.0: Using technology to improve education, cut red tape, reduce gridlock and enhance democracy. New York: Rowman and Littlefield Publishers.Google Scholar
  5. Goldsmith, J., & Hathaway, M. (2010). The cyber security changes we need. The Washington Post.Google Scholar
  6. Goodyear, M., Goerdel, H. T., Portillo, S., & Williams, L. (2010). Cybersecurity management in the states: The emerging role of chief information security officers. Washington, DC: IBM Center for The Business of Government.Google Scholar
  7. Gupta, U. (2010). Wanted: 10,000 New Cybersecurity Pros.Google Scholar
  8. INSA. (2009). Addressing cyber security through public-private partnership: An analysis of existing models. Washinton, DC: Intelligence and National Security Alliance (INSA).Google Scholar
  9. Irvine, C. E., & Palmer, C. C. (2010). Call in the cyber national guard! IEEE Security & Privacy, 8(1), 56–59.CrossRefGoogle Scholar
  10. Kwon, K. (2012). South Korea’s ‘Best of the Best’ tackle cyber crime. Retrieved from CNN: http://edition.cnn.com/2013/01/14/world/asia/south-korea-hackers/index.html
  11. Langford, J., & Roy, J. (2009). Service transformation, public-private partnerships & shared accountability? Emerging ideas and new practices in B.C., Canada. International Journal of Public Policy, 4(3), 232–250.CrossRefGoogle Scholar
  12. Mayeda, A., & Miller, H. (2012). Secret memo warns of Canadian cyber threat after Nortel attack. Retrieved from Financial Post: http://business.financialpost.com/2012/06/06/secret-memo-warns-of-canadian-cyber-threat-after-nortel-attack/
  13. Ponemon. (2011, May). Seven Tips for Securing Mobile Workers. Ponemon Institute LLC.Google Scholar
  14. Ponemon. (2011). Global survey on social media risks: Survey of IT & IT security practitioners in Canada. The Ponemon Institute.Google Scholar
  15. Press, J. (2013). Legal threats over lost student loan SIN numbers may finally push government to better secure data. Retrieved from National Post: http://news.nationalpost.com/2013/01/18/legal-threats-over-lost-student-loan-sin-numbers-may-finally-push-government-to-better-secure-data/
  16. Quigley, K., & Roy, J. (2011). Cyber-security and risk management in an interoperable world: An examination of governmental action in North America. Social Sciences Computer Review, 30(1), 83–94.CrossRefGoogle Scholar
  17. Roy, J. (2008). Beyond Westminster governance: Bringing politics and public service into the network era. Canadian Public Administration, 5(4), 541–568.CrossRefGoogle Scholar
  18. Roy, J. (2010). The rise of networked governance everywhere but in Westminster democracy. Policy options, September, 2010. Montreal, QC: Institute for Research on Public Policy.Google Scholar
  19. Shirky, C. (2008). Here comes everybody: The power of organizing without organizations. New York: Penguin Group.Google Scholar
  20. Stoker, G. (2005). Public value management—A new narrative for networked governance? American Review of Public Administration, 36(1), 41–57.Google Scholar
  21. Williams, A. (2008). Government 2.0: Wikinomics and the challenge to government. Canadian Government Executive.Google Scholar
  22. Wyld, D. (2007). The blogging revolution: Government in the age of Web 2.0. Washington, DC: IBM Endowment for The Business of Government.Google Scholar
  23. Wyld, D. C. (2010a). Moving to the cloud: An introduction to cloud computing in government. Washington, DC: IBM Center for The Business of Government.Google Scholar
  24. Wyld, D. C. (2010b). THE cloudy future of government IT: Cloud computing and the public sector around the world. International Journal of Web & Semantic Technology, 1(1).Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Jeffrey Roy
    • 1
  1. 1.Dalhousie UniversityHalifaxCanada

Personalised recommendations