Dados Associados à: Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States
Metadata & use
Identificador | https://doi.org/10.60966/gmbqi6gu |
---|---|
Licença | Creative Commons Attribution–NonCommercial–NoDerivs 3.0 IGO |
Relação | |
Citação |
Lewis, James Andrew, 2016, Data associated with: Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States, IDB Open Data, https://doi.org/10.60966/gmbqi6gu |
Issued date | 2016-01-08 |
Modified date | 2025-04-11 |
Tags/Palavras-Chave | Caribbean · Cyber Defense · Cyber Strategy · Cybercrime · Cybersecurity · Digital Redundancy · E-Government · Incident Response · Israel · Latin America · Legal Frameworks · National Critical Infrastructure · Online Trust · Privacy · Republic Of Korea · Resilience · South Korea · United States |
Idioma | Spanish |
Cobertura Temporal | 2015-2015 |
Cobertura Geográfica |
Estonia
Israel
South Korea
United States
|
Cobertura Regional | América Latina e Caribe |
Publicador |
Inter-American Development Bank
|
Autor |
Lewis, James Andrew
Inter-American Development Bank
|
Tipo de Coleta de Dados | Dados Observacionais |
Tipo Estatístico | Cross-sectional Data |
Estrutura dos Dados | Structured Data |
Notas dos Dados |
The data was analyzed using the 49 CMM indicators which are divided into five dimensions: i) National Cybersecurity Policy and Strategy (Policy and Strategy); ii) Cyber Culture and Society (Culture and Society); iii) Cybersecurity Education, Training and Skills (Education); iv)Legal and Regulatory Frameworks (Legal Frameworks); and v) Standards, Organizations and Technologies (Technologies). Each dimension has multiple factors which contribute towards a more mature state of cybersecurity capacity. Each factor then has several levels of indicators that describe a state of maturity (Startup, Formative, Established, Strategic and Dynamic). The different levels of maturity listed prompt the researchers to select the level that is most applicable to the experience of cybersecurity in the country based on a thorough policy analysis. For more details please review the “Introduction” section included in the Discussion Paper. |