Cyber Security Responsibilization: An Evaluation of the Intervention Approaches Adopted by the Five Eyes Countries and China

被引:13
作者
Renaud, Karen [1 ,2 ]
Orgeron, Craig [3 ]
Warkentin, Merrill [4 ]
French, P. Edward [5 ]
机构
[1] Abertay Univ, Dundee, Scotland
[2] Rhodes Univ, Grahamstown, South Africa
[3] Mississippi Dept Informat Technol Serv, Jackson, MS USA
[4] Mississippi State Univ, Coll Business, Informat Syst, Mississippi State, MS 39762 USA
[5] Mississippi State Univ, Dept Polit Sci & Publ Adm, Mississippi State, MS 39762 USA
关键词
GEOGRAPHIC INFORMATION-SYSTEMS; PUBLIC-PRIVATE PARTNERSHIPS; E-GOVERNMENT; INTERNET GOVERNANCE; HOMELAND SECURITY; RISK; MANAGEMENT; KNOWLEDGE; POLICY; WORLD;
D O I
10.1111/puar.13210
中图分类号
C93 [管理学]; D035 [国家行政管理]; D523 [行政管理]; D63 [国家行政管理];
学科分类号
12 ; 1201 ; 1202 ; 120202 ; 1204 ; 120401 ;
摘要
Governments can intervene to a greater or lesser extent in managing the risks that citizens face. They can adopt a maximal intervention approach (e.g., COVID-19) or a hands-off approach (e.g., unemployment), effectively "responsibilizing" their citizens. To manage the cyber risk, governments publish cyber-related policies. This article examines the intervention stances the governments adopt in supporting individual citizens managing their personal cyber risk. The authors pinpoint the cyber-related responsibilities that several governments espouse, applying a "responsibilization" analysis. Those applying to citizens are identified, thereby revealing the governments' cyber-related intervention stances. The analysis reveals that most governments adopt a minimal cyber-related intervention stance in supporting their citizens. Given the increasing number of successful cyber attacks on individuals, it seems time for the consequences of this stance to be acknowledged and reconsidered. The authors argue that governments should support individual citizens more effectively in dealing with cyber threats.
引用
收藏
页码:577 / 589
页数:13
相关论文
共 160 条
[1]  
ABC7 Chicago, 2017, WIR AW COUPL LOS LIF
[2]   Responsabilisation and de-responsabilisation in the treatment of sexual offenders in Belgium [J].
Adam, Christophe .
DEVIANCE ET SOCIETE, 2012, 36 (03) :263-276
[3]  
Ahrens J., 2006, J CONTING CRISIS MAN, V14, P207, DOI [DOI 10.1111/J.1468-5973.2006.00497, 10.1111/j.1468-5973.2006.00497.x, DOI 10.1111/J.1468-5973.2006.00497.X]
[4]   Cyber Security Attacks on Smart Cities and Associated Mobile Technologies [J].
AlDairi, Anwaar ;
Tawalbeh, Lo'ai .
8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017), 2017, 109 :1086-1091
[5]  
Andreasson K.J., 2011, Cybersecurity: Public sector threats and responses
[6]  
[Anonymous], 2016, 2016 Biennial National Strategy for Transportation Security
[7]  
[Anonymous], COREGULATING INTERNE
[8]  
[Anonymous], 2018, National Cyber Strategy of the United States of America
[9]  
[Anonymous], 2009, Financial Literacy and Consumer Protection: Overlooked Aspects of the Crisis
[10]   Models of critical information infrastructure protection [J].
Assaf, Dan .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 :6-14