Show simple item record

dc.contributor.authorAdams, S.A.
dc.contributor.authorBrokx, M.
dc.contributor.authorDalla Corte, L.
dc.contributor.authorGalic, M.
dc.contributor.authorKoops, B.-J.
dc.contributor.authorLeenes, R.
dc.contributor.authorSchellekens, M.
dc.contributor.authorSilva, K. e
dc.contributor.authorSkorvánek, I.
dc.coverage.spatialNederland
dc.date.accessioned2021-01-22T13:13:16Z
dc.date.available2021-01-22T13:13:16Z
dc.date.issued2015
dc.identifier.urihttp://hdl.handle.net/20.500.12832/2137
dc.description.abstractCybersecurity is a particularly complex field, where multiple public and private actors must work together, often across state borders, not only to address current weaknesses, but also to anticipate and prevent or pre-empt a number of different kinds of threats. This report examines how public policy and regulatory measures are used to organise such processes in five countries: Canada, Estonia, Germany, the Netherlands and the UK. For each country an analysis was made of cybersecurity governance in three areas: botnet mitigation, protection of vital infrastructures and protection of identity infrastructures. The cases were selected to be diverse, and to cover the main aspects of cybersecurity (confidentiality, availability and integrity), different domains of government (law enforcement, national security, and service delivery), and different levels of private-actor involvement. CONTENT: 1. Introduction 2. The concept of cybersecurity governance 3. Case 1: botnet migration 4. Case 2: protection of vital infrastructures 5. Case 3: protection of identity infrastructures 6. Discussion and conclusion
dc.publisherTilburg Institute for Law, Technology, and Society (TILT)
dc.relation.ispartofseriesWODC Rapport 2484
dc.subjectEstland
dc.subjectCybersecurity
dc.subjectTechnologische ontwikkeling
dc.subjectHacking
dc.subjectCyberspace
dc.subjectPreventie
dc.subjectVergelijkend onderzoek
dc.subjectGegevensbeveiliging
dc.subjectPreventiebeleid
dc.subjectInfrastructuur
dc.subjectDuitsland
dc.subjectComputervirus
dc.subjectPersoonsregistratie
dc.subjectComputercriminaliteit
dc.subjectCanada
dc.subjectInternet
dc.subjectGroot-Brittannie
dc.subjectEdi
dc.subjectBeveiliging
dc.titleThe governance of cybersecurity
dc.title.alternativeA comparative quick scan of approaches in Canada, Estonia, Germany, the Netherlands and the UK
dc.typerapport
dc.identifier.project2484
refterms.dateFOA2021-01-22T13:13:16Z
html.description.abstractCybersecurity is a particularly complex field, where multiple public and private actors must work together, often across state borders, not only to address current weaknesses, but also to anticipate and prevent or pre-empt a number of different kinds of threats. This report examines how public policy and regulatory measures are used to organise such processes in five countries: Canada, Estonia, Germany, the Netherlands and the UK. For each country an analysis was made of cybersecurity governance in three areas: botnet mitigation, protection of vital infrastructures and protection of identity infrastructures. The cases were selected to be diverse, and to cover the main aspects of cybersecurity (confidentiality, availability and integrity), different domains of government (law enforcement, national security, and service delivery), and different levels of private-actor involvement. <P></P><b>CONTENT:</b> 1. Introduction 2. The concept of cybersecurity governance 3. Case 1: botnet migration 4. Case 2: protection of vital infrastructures 5. Case 3: protection of identity infrastructures 6. Discussion and conclusionnl_NL
dc.identifier.tuduuid:8aba426f-6933-4a12-8e23-3ce807674c76
dc.contributor.institutionTilburg University - Tilburg Institute for Law, Technology, and Society (TILT)
dc.contributor.institutionWODC
dc.source.cityTilburg


Files in this item

Thumbnail
Name:
2484-volledige-tekst_tcm28-736 ...
Size:
1.771Mb
Format:
PDF
Thumbnail
Name:
2484-summary_tcm28-73671.pdf
Size:
83.15Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record