Abstract
This chapter examines the cybersecurity landscape of the six Gulf Cooperation Council economies. Key elements of data protection regulations in these economies draw on a number of frameworks such as the Shari’ah principles, U.S. data privacy laws, EU data protection directive, UN Model Laws on e-commerce and electronic signatures and other sources. This chapter examines CS regulations in these economies, their principal triggers, drivers and facilitators as well as challenges facing these economies on the CS front. Also analyzed in the chapter are similarities and differences of these economies’ CS frameworks with those of the EU and the U.S. For the U.S. and other Western countries, the strategic significance of GCC economies’ CS initiatives is growing due to the fact that these economies are involved in intelligence gathering and sharing about key issues such as Iranian arms, and their rapidly growing CS market due primarily to some of the high profile cyber-attacks faced by some of the GCC economies has created opportunities for Western technology firms specializing in CS.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Allison, A. (2013). The hidden value of IT departments. MEED: Middle East Economic Digest, 57(18), 41.
Al-Saud, N. B. A. (2012). Cybersecurity strategies. JFQ: Joint Force Quarterly, 64, 75–81 (1st Quarter).
arabianindustry.com. (2013, August 1). Saudi Electricity Company’s IT transformation. http://arabianindustry.com/utilities/features/2013/aug/1/saudi-electricity-companys-it-transformation-4391218/#.VA8IPVcaTIY
arabnews.com. (2014). 400,000 porn sites blocked by CITC. http://www.arabnews.com/news/598441
Binham, C. (2013). The hacker hunters. http://www.ft.com/intl/cms/s/2/bccc8f3c-523c-11e3-8c42-00144feabdc0.html#axzz37vVS6Nvw
Brenner, J. F. (2013). Eyes wide shut: The growing threat of cyber attacks on industrial control systems. Bulletin of the Atomic Scientists, 69(5), 15–20.
Bronk, C. (2014). Hacks on gas: Energy, cybersecurity, and U.S. defense. The James A. Baker Iii Institute For Public Policy, Rice University.
Burgers, R., Baars, H., Adriaensen, M., & Raja, A. (2014). Middle East needs cyber security from within utilities face energy threat. DNV KEMA Energy & Sustainability.
businessweekme.com. (2014). Fallout from the Saudi Aramco breach continues. http://businessweekme.com/Bloomberg/newsmid/190/newsid/35
Carr, J. (2012). Why wasn’t Saudi Aramco’s oil production targeted? http://jeffreycarr.blogspot.de/2012/09/why-wasnt-saudi-aramcos-oil-production.html
Cornish, J. (2013). Data protection and privacy laws in the Middle East. Latham & Watkins LL. http://www.jdsupra.com/legalnews/data-protection-and-privacy-laws-in-the-24928/
Cornwell, A. (2014). Cyber attacks an increasing threat for Mideast oil and gas. http://gulfnews.com/business/oil-gas/cyber-attacks-an-increasing-threat-for-mideast-oil-and-gas-1.1399982
dnaindia.com. (2013). Saudi Arabia to ban WhatsApp soon. http://www.dnaindia.com/scitech/report-saudi-arabia-to-ban-whatsapp-soon-1850251
Eduard, K. (2014). Website of Kuwait’s Ministry of Interior Hacked and Defaced. http://news.softpedia.com/news/Website-of-Kuwait-s-Ministry-of-Interior-Hacked-and-Defaced-435068.shtml
El-Guindy, M. N. (2013). Middle East Cyber Security Threat Report 2014. http://netsafe.me/category/cybercrime/
Elliott, S. (2012). Privacy and data interception in Saudi Arabia. http://www.privacydatasecurityblog.com/2012/06/08/privacy-and-data-interception-in-saudi-arabia/
Fielding-Smith, A. (2013). Middle East cyber crimes force concerted response from banks. http://www.ft.com/intl/cms/s/0/28010fda-25f1-11e3-8ef6-00144feab7de.html#axzz2osZmvj8v
financierworldwide.com. (2013). Talking point: Cyber security and data protection in the Middle East. http://www.financierworldwide.com/article.php?id=11296&page=2
gartner.com. (2013). Gartner says The Middle East and Africa IT infrastructure spending to reach US$ 4 billion. http://www.gartner.com/newsroom/id/2347215
gitex.com. (2013). MENA outpacing most of world in cloud computing growth. http://www.gitex.com/Content/MENA-outpacing-most-of-world-in-cloud-computing-growth
globalvoicesonline.org. (2014). 7 Cases that prove online activism is under siege in Saudi Arabia. http://advocacy.globalvoicesonline.org/2014/07/15/7-cases-that-prove-online-activism-is-under-siege-in-saudi-arabia/
gulfnews.com. (2012). Oman forum calls for tough laws against cybercrime. http://gulfnews.com/news/gulf/oman/oman-forum-calls-for-tough-laws-against-cybercrime-1.1035332
Hermida, A. (2002). Saudis block 2,000 websites. http://news.bbc.co.uk/2/hi/technology/2153312.stm
Idlebi, N. (2008, February). Cyber legislation in the ESCWA region security issues. UN-Economic and Social Commission for Western Asia, Data Protection and Privacy (DP&P)
ITA. (2011). Electronic transactions law. Information Technology Authority (ITA). http://www.ita.gov.om/ITAPortal/MediaCenter/Document_detail.aspx?NID=56
jpost.com. (2013, June 9). US aids Gulf allies to counter Iran cyber-attacks. http://www.jpost.com/Iranian-Threat/News/US-aids-allies-defend-against-Iran-cyber-attacks-315903
Karasik, T. (2013). Saudi Arabia’s defense posture is robust. http://english.alarabiya.net/en/views/news/middle-east/2013/09/23/Saudi-Arabia-s-defense-posture-is-robust.html
Khaleej Times (United Arab Emirates). (2014, August). GCC cloud market to post seven-fold growth by 2020. http://www.khaleejtimes.com/article/20140821/ARTICLE/308219895/1037
Knickmeyer, E. (2013). After cyberattacks, Saudi steps up online security. http://blogs.wsj.com/middleeast/2013/08/26/after-cyberattacks-saudi-steps-up-online-security/
KPMG. (2012). International executive services: Thinking beyond borders Kuwait. KPMG International.
Kshetri, N., & Murugesan, S. (2013). EU and US cybersecurity strategies: Impacts on businesses and consumers. IEEE Computer, 46(10), 84–88.
menafn.com. (2011). Rate of cyber crimes in Qatar negligible: Official, MENAFN, The Peninsula. http://www.menafn.com/menafn/qn_news_story_s.aspx?storyid=1093423127
Mustafa, A. (2014). UAE to double security budget, focus on cyber. http://mobile.defensenews.com/article/302240015
Nakashima, E. (2013). Pentagon to boost cybersecurity force. http://www.washingtonpost.com/world/national-security/pentagon-to-boost-cybersecurity-force/2013/01/19/d87d9dc2-5fec-11e2-b05a-605528f6b712_story.html?hpid=z4
Nusca, A. (2014). It’s time for corporate boards to tackle cybersecurity. Here’s why. Fortune.com. 1-1.
O’Connell, N. (2012). Data protection and privacy issues in the Middle East. http://www.legal500.com/c/united-arab-emirates/developments/17454
Rains, T. (2011). The curious case of Qatar. http://blogs.technet.com/b/security/archive/2011/11/22/the-curious-case-of-qatar.aspx
Ratnam, G. (2014). Pentagon aiding allies on cybersecurity in Gulf to Asia. http://www.bloomberg.com/news/2014-03-31/pentagon-aiding-allies-on-cybersecurity-in-gulf-to-asia.html
Saudi Gazette. (2014). 38 percent Saudi companies unsure about cyber security. https://en-maktoob.news.yahoo.com/38-percent-saudi-companies-unsure-cyber-security-084219081.html
saudigazette.com.sa. (2014). Haia asks ministry to arrest blasphemers. http://www.saudigazette.com.sa/index.cfm?method=home.regcon&contentid=20140819215183
Schwentker, R. B. (2013). Cyber warfare – The new reality. Infrastructure, 52(3), 1–5 (cover story).
scidev.net. (2013). Gulf countries ‘need early-warning on cyber attacks’. http://www.scidev.net/global/technology/news/gulf-countries-need-early-warning-on-cyber-attacks.html
Smythe, C. (2013). Eight charged with debit card cyber-crime targeting banks. http://www.bloomberg.com/news/2013-05-09/eight-charged-with-debit-card-cyber-crime-targeting-banks.html
The peninsulaqatar. (2014). Cyber attacks: Qatar third most targeted. http://thepeninsulaqatar.com/news/qatar/303181/cyber-attacks-qatar-third-most-targeted
thepeninsulaqatar.com. (2013). Energy, water and cyber security top goals. http://thepeninsulaqatar.com/news/qatar/262025/energy-water-and-cyber-security-top-goals
United Nations. (2007, August). National profile of the information society in Kuwait. Economic and Social Commission for Western Asia (Escwa), United Nations.
ustr.gov. (2004). U.S.-Bahrain FTA: Fact sheet on access to medicines. http://www.ustr.gov/about-us/press-office/fact-sheets/archives/2004/september/us-bahrain-fta-fact-sheet-access-medicines
washingtonpost.com. (2014). Saudi Arabia continues its outrageous repression of human rights activists. http://www.washingtonpost.com/opinions/saudi-arabia-continues-its-outrageous-repression-of-human-rights-activists/2014/08/26/dc6404fa-2258-11e4-958c-268a320a60ce_story.html
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Kshetri, N. (2016). Cybersecurity in Gulf Cooperation Council Economies. In: The Quest to Cyber Superiority. Springer, Cham. https://doi.org/10.1007/978-3-319-40554-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-40554-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-40553-7
Online ISBN: 978-3-319-40554-4
eBook Packages: Economics and FinanceEconomics and Finance (R0)