Data associated with: Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States

Por Innovation in Citizen Services Division (VPS/IFD/ICS)

Metadados e uso

Identificador https://doi.org/10.60966/gmbqi6gu
Licença Creative Commons Atribuição–NãoComercial–SemDerivações 3.0 IGO
Produto de Conhecimento Relacionado
Citação

Lewis, James Andrew, 2016, Data associated with: Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States, IDB Open Data, https://doi.org/10.60966/gmbqi6gu

Data de publicação 2016-01-08
Data de modificação 2025-12-24
Tags/Palavras-Chave Caribe · Defesa cibernética · Estratégia cibernética · Cibercrime · Cibersegurança · Redundância digital · Governo eletrônico · Resposta a incidentes · Israel · América Latina · Marcos legais · Infraestrutura crítica nacional · Confiança online · Privacidade · República da Coreia · Resiliência · Coreia do Sul · Estados Unidos
Idioma Spanish
Cobertura Temporal 2015-2015
País
Estonia
Israel
South Korea
United States
Região América Latina e Caribe
Publicador
Inter-American Development Bank
Autor
Lewis, James Andrew
Inter-American Development Bank
Tipo de Coleta de Dados Dados Observacionais
Tipo Estatístico Cross-sectional Data
Estrutura dos Dados Structured Data
Notas dos Dados

The data was analyzed using the 49 CMM indicators which are divided into five dimensions: i) National Cybersecurity Policy and Strategy (Policy and Strategy); ii) Cyber Culture and Society (Culture and Society); iii) Cybersecurity Education, Training and Skills (Education); iv)Legal and Regulatory Frameworks (Legal Frameworks); and v) Standards, Organizations and Technologies (Technologies). Each dimension has multiple factors which contribute towards a more mature state of cybersecurity capacity. Each factor then has several levels of indicators that describe a state of maturity (Startup, Formative, Established, Strategic and Dynamic). The different levels of maturity listed prompt the researchers to select the level that is most applicable to the experience of cybersecurity in the country based on a thorough policy analysis. For more details please review the “Introduction” section included in the Discussion Paper.

Arquivos do conjunto de dados

Carregar mais