Data associated with: Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States
Metadata & use
Identifier | https://doi.org/10.60966/gmbqi6gu |
---|---|
License | Creative Commons Attribution–NonCommercial–NoDerivs 3.0 IGO |
Relation | |
Citation |
Lewis, James Andrew, 2016, Data associated with: Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States, IDB Open Data, https://doi.org/10.60966/gmbqi6gu |
Issued date | 2016-01-08 |
Modified date | 2025-04-11 |
Tags/Keywords | Caribbean · Cyber Defense · Cyber Strategy · Cybercrime · Cybersecurity · Digital Redundancy · E-Government · Incident Response · Israel · Latin America · Legal Frameworks · National Critical Infrastructure · Online Trust · Privacy · Republic Of Korea · Resilience · South Korea · United States |
Language | Spanish |
Temporal coverage | 2015-2015 |
Geographic coverage |
Estonia
Israel
South Korea
United States
|
Regional coverage | Latin America and the Caribbean |
Publisher |
Inter-American Development Bank
|
Author |
Lewis, James Andrew
Inter-American Development Bank
|
Data collection type | Observational Data |
Statistical type | Cross-sectional Data |
Data structure | Structured Data |
Data notes |
The data was analyzed using the 49 CMM indicators which are divided into five dimensions: i) National Cybersecurity Policy and Strategy (Policy and Strategy); ii) Cyber Culture and Society (Culture and Society); iii) Cybersecurity Education, Training and Skills (Education); iv)Legal and Regulatory Frameworks (Legal Frameworks); and v) Standards, Organizations and Technologies (Technologies). Each dimension has multiple factors which contribute towards a more mature state of cybersecurity capacity. Each factor then has several levels of indicators that describe a state of maturity (Startup, Formative, Established, Strategic and Dynamic). The different levels of maturity listed prompt the researchers to select the level that is most applicable to the experience of cybersecurity in the country based on a thorough policy analysis. For more details please review the “Introduction” section included in the Discussion Paper. |