Datos asociados a: Experiencias avanzadas en políticas y prácticas de ciberseguridad: Panorama general de Estonia, Israel, República de Corea y Estados Unidos
Metadata & use
Identificador | https://doi.org/10.60966/gmbqi6gu |
---|---|
Licencia | Creative Commons Attribution–NonCommercial–NoDerivs 3.0 IGO |
Relación | |
Citación |
Lewis, James Andrew, 2016, Data associated with: Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States, IDB Open Data, https://doi.org/10.60966/gmbqi6gu |
Issued date | 2016-01-08 |
Modified date | 2025-04-11 |
Etiquetas/Palabras Clave | Caribbean · Cyber Defense · Cyber Strategy · Cybercrime · Cybersecurity · Digital Redundancy · E-Government · Incident Response · Israel · Latin America · Legal Frameworks · National Critical Infrastructure · Online Trust · Privacy · Republic Of Korea · Resilience · South Korea · United States |
Idioma | Spanish |
Cobertura Temporal | 2015-2015 |
Cobertura Geográfica |
Estonia
Israel
South Korea
United States
|
Cobertura Regional | América Latina y el Caribe |
Publicador |
Inter-American Development Bank
|
Autor |
Lewis, James Andrew
Inter-American Development Bank
|
Tipo de Recolección de Datos | Datos Observacionales |
Tipo Estadístico | Datos de Corte Transversal |
Estructura de los Datos | Datos Estructurados |
Notas de datos |
The data was analyzed using the 49 CMM indicators which are divided into five dimensions: i) National Cybersecurity Policy and Strategy (Policy and Strategy); ii) Cyber Culture and Society (Culture and Society); iii) Cybersecurity Education, Training and Skills (Education); iv)Legal and Regulatory Frameworks (Legal Frameworks); and v) Standards, Organizations and Technologies (Technologies). Each dimension has multiple factors which contribute towards a more mature state of cybersecurity capacity. Each factor then has several levels of indicators that describe a state of maturity (Startup, Formative, Established, Strategic and Dynamic). The different levels of maturity listed prompt the researchers to select the level that is most applicable to the experience of cybersecurity in the country based on a thorough policy analysis. For more details please review the “Introduction” section included in the Discussion Paper. |