The Porchlight Business Book Awards WINNERS have been announced!

Cybersecurity Public Policy: SWOT Analysis Conducted on 43 Countries

Cybersecurity Public Policy: SWOT Analysis Conducted on 43 Countries

By Bradley Fowler and Kennedy Maranga

PRINT ON DEMAND— Shipping will be delayed 1-6 weeks for printing
(Depends on publisher)

This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy.

READ FULL DESCRIPTION

Quantity Price Discount
List Price $150.00  

Quick Quote

Lorem ipsum dolor sit amet, consectetur adipisicing elit

Non-returnable discount pricing

$150.00


Book Information

Publisher: CRC Press
Publish Date: 08/01/2022
Pages: 188
ISBN-13: 9781032194332
ISBN-10: 1032194332
Language: English

Full Description

Since 2000, many governments, parliaments, and ministries have worked diligently to define effective guidelines that safeguard both public and private sector information systems, as well as information assets, from unwanted cyberattacks and unauthorized system intrusion. While some countries manage successful cybersecurity public policies that undergo modification and revision annually, other countries struggle to define such policies effectively, because cybersecurity is not a priority within their country. For countries that have begun to define cybersecurity public policy, there remains a need to stay current with trends in cyber defense and information system security, information not necessarily readily available for all countries. This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis; Afghanistan, Australia, Bermuda, Canada, Chili, Croatia, Cyprus, Czech Republic, Dubai, Egypt, Estonia, European Union, Finland, Gambia, Germany, Greece, Hungary, Iceland, Ireland, Italy, Japan, Kenya, Kosovo, Kuwait, Luxemburg, Malaysia, Nepal, Netherlands, New Zealand, Norway, Poland, Samoa, Singapore, Slovakia, South Africa, Sweden, Switzerland, Thailand, Trinidad, Uganda, United Arab Emirates, United Kingdom, and Vietnam; to transparently discuss the strengths, weaknesses, opportunities, and threats encompassing each of these 43 countries' cybersecurity public policies.

The primary vision for this title is to create an educational resource that benefits both the public and the private sectors. Without clarity on cybersecurity public policy, there remains a gap in understanding how to meet these needs worldwide. Furthermore, while more than 43 countries have already enacted cybersecurity public policy, many countries neglect translating their policy into English; this impacts the ability of all countries to communicate clearly and collaborate harmoniously on this subject matter. This book works to fill the "gap", stop the spread of misinformation, and become the gateway to understanding what approaches can best serve the needs of both public and private sectors. Its goals include educating the public, and, in partnership with governments, parliaments, ministries, and cybersecurity public policy analysts, helping mitigate vulnerabilities currently woven into public and private sector information systems, software, hardware, and web interface applications relied upon for daily business activities.

About the Authors

Bradley Fowler earned a Master of Public Policy in Cybersecurity Policy from American Public University System in 2020; a Master of Science in Cybersecurity in 2018 and Master of Science in Managing Information Systems in Information Security Management in 2021, both from Bellevue University.

Learn More


Dr. Kennedy Maranga is a Doctoral Dissertation Chair and Associate Professor in the School of Leadership, Education, and Communication at St. Thomas University. Dr. Maranga lives in St. Louis MO and holds a Bachelor of Laws degree, Master of Science in Higher Education Administration from Walden University, Masters of Laws from Washington University St.

Learn More

We have updated our privacy policy. Click here to read our full policy.