Abstract
To best create an effective cybersecurity strategy, it is imperative to understand the policy discussions and trends on a federal and state level. Effective cybersecurity legislation is vital to maintaining our country’s infrastructure and protecting our citizenry. Since cybersecurity is often decided on the state level, states need to be aware of the trends in cybersecurity legislation. The purpose of this research was to conduct an analysis of cybersecurity policy from across the United States in an effort to assist the State-level understanding on their cybersecurity risk profile. This analysis included an examination of common trends in cybersecurity legislation. It involved researching cybersecurity policies from all 50 states and the federal government. After creating this baseline, the next phase of the research was to find and record relevant metadata for each policy. This data contained additional data, such as did it pass, who were the supporters, was it revised and other information that is useful to cybersecurity policy creators. The final goal of the research was to provide a searchable tool that could be utilized to fashion a successful cybersecurity bill and a summary of cybersecurity trends from 2011 to Spring 2018.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
National Governors Association: Meet the threat: a compact to improve State Cybersecurity (2017). https://www.in.gov/cybersecurity/files/NGA%20Cyber%20Compact.pdf
Holcomb, E.J.: Exec. Order No. 17-11. Continuing the Indiana Executive Council on cybersecurity. State of Indiana Executive Department, 9 January 2017. https://www.in.gov/cybersecurity/3812.htm
Lowry, C.: What’s in your mobile wallet? An analysis of trends in mobile payments and regulation. Fed. Commun. Law J. 68(2), 353–384 (2016). http://www.fclj.org/wp-content/uploads/2016/09/68.2.4-Carolyn-Lowry.pdf
Sales, N.A.: Regulating cyber-security. Northwest. Univ. Law Rev. 107(4), 1503–1568 (2013)
Clarke, R.: War from cyberspace. Natl. Interest 104, 31–36 (2009). https://nationalinterest.org/article/war-from-cyberspace-3278
Glennon, M.J.: State-level cybersecurity. Policy Rev. 171, 85–102 (2012)
Bosch, C.: Securing the smart grid: protecting national security and privacy through mandatory, enforceable interoperability standards. Fordham Urban Law J. 41(4), 1349–1406 (2014)
Schneider, F.: Impediments with policy interventions to foster cybersecurity. Commun. ACM 61(3), 36–38 (2018)
Godara, S.: Role of ‘intermediaries’ in the cyber world: a comparative study of the legislative policies & recent judicial trends. VIDHIGYA J. Legal Aware. 8(1), 69–80 (2013)
Bulger, M., Burton, P., O’Neill, B., Staksrud, E.: Where policy and practice collide: comparing United States, South African and European Union approaches to protecting children online. New Media Soc. 19(5), 750–764 (2017)
State of Cybersecurity, Airtable: https://airtable.com/shrCcYzKJGH1jyvrx
Brown Jr., E.G.: Exec. Order No. B-34-15. Establishing the California Cybersecurity Integration Center, CA.Gov (2015). https://www.calhospitalprepare.org/sites/main/files/file-attachments/b-34-15_cal-csic.pdf
Brown Jr., E.G.: Governor’s Veto Message, California Legislative Information, 11 October 2017. https://leginfo.legislature.ca.gov/faces/billStatusClient.xhtml?bill_id=201720180AB1306
Brown Jr., E.G.: Governor’s Veto Message, California Legislative Information, 14 October 2017. http://leginfo.legislature.ca.gov/faces/billStatusClient.xhtml?billid=201720180AB531
Martinez, S.: House Executive Message No. 57, New Mexico Secretary of State, 7 April 2017. https://static.votesmart.org/static/vetotext/61925.pdf
Ducey, D.A.: Re:Senate Bill 1434, Office of the Governor, May 18, 2016. https://azgovernor.gov/sites/default/files/sb_1434_veto_letter.pdf
Ducey, D.A.: RE: House Bill 2566, Arizona State Legislature, 9 April 2015. https://www.azleg.gov/govlettr/52leg/1R/HB2566.pdf
Acknowledgement
We would like to thank the State of Indiana and INSuRE Program for their support and valuable inputs.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Alexander, A., Graham, P., Jackson, E., Johnson, B., Williams, T., Park, J. (2020). An Analysis of Cybersecurity Legislation and Policy Creation on the State Level. In: Choo, KK., Morris, T., Peterson, G. (eds) National Cyber Summit (NCS) Research Track. NCS 2019. Advances in Intelligent Systems and Computing, vol 1055. Springer, Cham. https://doi.org/10.1007/978-3-030-31239-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-31239-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31238-1
Online ISBN: 978-3-030-31239-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)