Within this Book Full site



Filter my results

ISBN of the Book

Material or Process Book or Chapter Title Author or Editor Publication dates

Routledge Companion to Global Cyber-Security Strategy

Edited by: Scott N. Romaniuk , Mary Manjikian

Print publication date:  January  2021
Online publication date:  January  2021

Print ISBN: 9780367024239
eBook ISBN: 9780429399718
Adobe ISBN:

 Cite  Marc Record

Book description

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia.

The volume offers an introduction to each nation?s cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contains the following sections:

  • overview of national cyber-security strategy;
  • concepts and definitions;
  • exploration of cyber-security issues as they relate to international law and governance;
  • critical examinations of cyber partners at home and abroad;
  • legislative developments and processes;
  • dimensions of cybercrime and cyberterrorism;
  • implications of cyber-security policies and strategies.

This book will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy, and international relations.

Table of contents

Prelims Download PDF
Introduction Download PDF
Chapter  1:  Securing the kingdom’s cyberspace Download PDF
Chapter  2:  Albania’s cybersecurity pivot Download PDF
Chapter  3:  Armenian national policy in cyber space Download PDF
Chapter  4:  Czech Republic Download PDF
Chapter  5:  Cyber security in the French Republic Download PDF
Chapter  6:  Germany’s cybersecurity strategy Download PDF
Chapter  7:  Cybersecurity of Poland Download PDF
Chapter  8:  Hungary's evolving cyber security strategy  Download PDF
Chapter  9:  Romanian cybersecurity efforts Download PDF
Chapter  10:  Italy’s cyber security architecture and critical infrastructure Download PDF
Chapter  11:  Dutch cyber security strategy Download PDF
Chapter  12:  Norwegian cyber security Download PDF
Chapter  13:  Seeking a new order for global cybersecurity Download PDF
Chapter  14:  Slovakia Download PDF
Chapter  15:  Slovenia Download PDF
Chapter  16:  In the line of Russian Ukraine, hybrid warfare, and cybersecurity defense aggression Download PDF
Chapter  17:  United Kingdom Download PDF
Chapter  18:  European Union Download PDF
Chapter  19:  Estonia Download PDF
Chapter  20:  NATO’s evolving cyber security policy and strategy Download PDF
Chapter  21:  Japan’s challenges, capabilities, and preparedness in cyberspace Download PDF
Chapter  22:  An effective shield? Download PDF
Chapter  23:  In the line of fire Download PDF
Chapter  24:  Serving the people Download PDF
Chapter  25:  Cybersecurity in a one-party state Download PDF
Chapter  26:  The Philippines’ cybersecurity strategy Download PDF
Chapter  27:  Malaysia Download PDF
Chapter  28:  Cyber governance and data protection in India Download PDF
Chapter  29:  Cybersecurity Download PDF
Chapter  30:  Managing a digital revolution Download PDF
Chapter  31:  Australia’s cyber security Download PDF
Chapter  32:  Singapore Download PDF
Chapter  33:  Between multi-stakeholderism and cyber sovereignty Download PDF
Chapter  34:  Israel Download PDF
Chapter  35:  Palestine  Download PDF
Chapter  36:  The “Silicon Valley of the Middle East” Download PDF
Chapter  37:  The Islamic Republic of Iran’s cyber security strategy Download PDF
Chapter  38:  Canada’s cyber security in a globalized environment Download PDF
Chapter  39:  The United States Download PDF
Chapter  40:  Jamaica’s cybercrime and cyber-security Download PDF
Chapter  41:  Mexico and cybersecurity Download PDF
Chapter  42:  Colombia’s cybersecurity predicament Download PDF
Chapter  43:  Cyber security governance in Brazil Download PDF
Chapter  44:  Securitizing CyberSpace in Egypt Download PDF
Chapter  45:  Security through the Arab Winter Download PDF
Chapter  46:  Cyber security in Kenya Download PDF
Chapter  47:  Cybersecurity policy in Nigeria Download PDF
Chapter  48:  Cybersecurity in Ghana Download PDF
Chapter  49:  Building a Cyber Fortress in Africa Download PDF
Chapter  50:  Cybersecurity in South Africa Download PDF
Chapter  51:  Algorithms of oppression? Download PDF
Index Download PDF
Search for more...

Back to top

Use of cookies on this website

We are using cookies to provide statistics that help us give you the best experience of our site. You can find out more in our Privacy Policy. By continuing to use the site you are agreeing to our use of cookies.