Access the full text.
Sign up today, get DeepDyve free for 14 days.
Ronald Deibert, Rafal Rohozinski (2010)
Risking Security: Policies and Paradoxes of Cyberspace SecurityInternational Political Sociology, 4
R. Ahmad, M. Hashim (2011)
The Organisation of Islamic Conference — Computer Emergency Response Team(OIC-CERT): Answering cross border cooperation2011 Second Worldwide Cybersecurity Summit (WCS)
G. Ericsson (2010)
Cyber Security and Power System Communication—Essential Parts of a Smart Grid InfrastructureIEEE Transactions on Power Delivery, 25
C. Kessides (1993)
The Contributions of Infrastructure to Economic Development, A review of Experience and Policy Implications
G. Stoker (1998)
Governance as theory: five propositionsInternational Social Science Journal, 50
Economic indicators. Karachi: Author
Herbert Lin, A. Spector, P. Neumann, S. Goodman (2007)
Toward a safer and more secure cyberspaceCommun. ACM, 50
(2011)
NTRO on board , cyber security database coming
(1995)
Modes of governance and development
Christine Sund (2007)
Towards an international road-map for cybersecurityOnline Inf. Rev., 31
Kenneth Knapp, W. Boulton (2006)
Cyber-Warfare Threatens Corporations: Expansion into Commercial EnvironmentsInformation Systems Management, 23
Cyber security: Global response to the global issue. SP's Land Forces
Ronald Deibert, Rafal Rohozinski (2010)
Liberation vs. Control: The Future of CyberspaceJournal of Democracy, 21
Zahri Yunos, Syahrul Suid, R. Ahmad, Z. Ismail (2010)
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework2010 Sixth International Conference on Information Assurance and Security
(2010)
Past, present, and future of cybersecurity
Удк, Игорь Яковив (2015)
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Danielle Kriz (2011)
Cybersecurity principles for industry and government: A useful framework for efforts globally to improve cybersecurity2011 Second Worldwide Cybersecurity Summit (WCS)
(2012)
FDI statistics, year-wise equity inflows
Ajay Chhibber (1997)
The state in a changing world
(2011)
Propaganda & warfare in cyber world
Ian Ellefsen, S. Solms (2010)
Critical Information Infrastructure Protection in the Developing World
B. Peters, J. Pierre (1998)
Governance without government? Rethinking public administrationJournal of Public Administration Research and Theory, 8
S. Worden, J. Johnson‐Freese (2003)
Globalizing Space Security
E. Akuta, I. Ong, C. Jones (2011)
Combating Cyber Crime in Sub-Sahara Africa; A Discourse on Law, Policy and Practice
(2001)
Coordinated direct investment survey
Soong Lee (2010)
World development indicators 2010
(2007)
Cyber security: The human factor
J. Michael, Steven Roberts, J. Voas, T. Wingfield (2005)
The role of policy in balancing outsourcing and homeland securityIT Professional, 7
M. Warren, J. McIntyre (2002)
Protection of New Zealand in the age of information warfare
Paul Laudicina (2006)
The Globalization Index
(1998)
Cyberspace war
K. Peffers, T. Tuunanen, M. Rothenberger, S. Chatterjee (2007)
A Design Science Research Methodology for Information Systems ResearchJournal of Management Information Systems, 24
W. Easterly, Ross Levine (1997)
Africa's Growth Tragedy: Policies and Ethnic DivisionsQuarterly Journal of Economics, 112
Second Worldwide Cybersecurity Summit (WCS)
(2010)
Foundational questions regarding the federal role in cybersecurity
(2000)
Percentage of individuals using the Internet
(2004)
Managing as designing: Creating a vocabulary for management education and research, Frontiers of Management Workshop
(2006)
The geopolitics of Asian cyberspace
Suleyman Ozeren (2005)
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.
Mark Fabro, T. Roxey, M. Assante (2010)
No Grid Left BehindIEEE Security & Privacy, 8
A. Ingram (2001)
Broadening Russia's borders?: The nationalist challenge of the Congress of Russian CommunitiesPolitical Geography, 20
Forrest Hare (2009)
Private Sector Contributions to National Cyber Security: A Preliminary AnalysisJournal of Homeland Security and Emergency Management, 6
C. Ten, Chen-Ching Liu, G. Manimaran (2008)
Vulnerability Assessment of Cybersecurity for SCADA SystemsIEEE Transactions on Power Systems, 23
C. Demchak (1999)
‘New Security’ in Cyberspace: Emerging Intersection between Military and Civilian ContingenciesJournal of Contingencies and Crisis Management, 7
(2011)
Cyber combat: Act of war – Pentagon sets stage for U.S. to respond to computer sabotage with military force
T. Lewis (2006)
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
(2011)
Cybersecurity, foreign policy, and business
Paul Oh (2009)
FUTURE STRATEGIC ENVIRONMENT in an Era of Persistent ConflictMilitary review, 89
Peter Meso, P. Musa, D. Straub, V. Mbarika (2009)
Information infrastructure, governance, and socio-economic development in developing countriesEuropean Journal of Information Systems, 18
(1993)
Laval: Academic Conferences International
(2012)
India‘s cyber security challenge
Ajay Chhibber, S. Commander, A. Evans, Harald Fuhr, Cheikh Kane, Chad Leechor, Brian Levy, S. Pradhan, Beatrice Weder (1997)
The State in a Changing World. World Development Report, 1997.
S. Chenayah (2013)
World Investment Report 2010: Investing In A Low- Carbon Economy
Peter Meso, N. Duncan (2000)
Can National Information Infrastructures Enhance Social Development in the Least Developed Countries? An Empirical InvestigationJ. Glob. Inf. Manag., 8
A. Shiu, Pun-Lee Lam (2008)
Causal Relationship between Telecommunications and Economic Growth in China and its RegionsRegional Studies, 42
S. Dewan, K. Kraemer (2000)
Information Technology and Productivity: Evidence from Country-Level DataManagement Science, 46
Yahel Ben-David, Shaddi Hasan, J. Pal, Matthias Vallentin, S. Panjwani, Philipp Gutheim, Jay Chen, E. Brewer (2011)
Computing security in the developing world: a case for multidisciplinary research
(2004)
Tele - democracy in developing countries : A focus on sub - Saharan Africa
Y. Wolde‐Rufael (2007)
Another look at the Relationship between Telecommunications Investment and Economic Activity in the United StatesInternational Economic Journal, 21
Hans Brechbühl, R. Bruce, S. Dynes, M. Johnson (2010)
Protecting Critical Information Infrastructure: Developing Cybersecurity PolicyInformation Technology for Development, 16
H. Klein, M. Myers (1999)
A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information SystemsMIS Q., 23
(2010)
Waiting for the president, and the baby
(2011)
Inside the Indo - Pak cyber wars
K. Low, Chee Lim, An, A. Samudhram (2011)
Sustainable economic development: A perspective from ICT loops in developing nationsAfrican Journal of Business Management, 5
M. Manjikian (2010)
From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of RealpolitikInternational Studies Quarterly, 54
(2009)
World governance index – why should world governance be evaluated, and for what purpose? Paris: Forum for a New World Governance
J. Nye (2011)
Nuclear Lessons for Cyber Security
(2010)
Journal of National Security Law & Policy, 4, 233. Council on Foreign Relations
C. Sorrentino (2005)
OECD Factbook 2005: Economic, Environmental and Social StatisticsMonthly Labor Review, 128
(2012)
The world factbook 2012
M. Warren, S. Leitch (2011)
Australian national critical infrastructure protection : a case study
(2010)
India: Kashmiri youngsters wage online struggle
(2012)
India to greenlight state - sponsored cyber attacks
A. Hevner, S. March, Jinsoo Park, S. Ram (2004)
Design Science in Information Systems ResearchMIS Q., 28
Richard Harknett, James Stever (2009)
The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity CitizenJournal of Homeland Security and Emergency Management, 6
(2012)
Explaining politico - strategic cyber security : The feasibility of applying arms race theory
(2011)
U . S . commemorates 10 th anniversary of 9 / 11 attacks
(2010)
Cybersecurity challenges in developing nations (Doctoral dissertation)
The possibilities and risks inherent in the dissemination of ICT necessitate implementation of cybersecurity initiatives. Yet, we know very little about the specific relationships between national information infrastructure (NII), cybersecurity capability, and economic development in emerging economies. This paper proposes a model based on national nuclear threat security through which a developing nation could develop an effective cybersecurity infrastructure while simultaneously positively impacting economic development. Our model extends the cybersecurity triad of internal governance, private sector partners and an active cybercitizenry to add a fourth influence – foreign government relations – that significantly impacts socioeconomic development. The model will be elaborated through the lens of two case study nation-states: India and Pakistan.
Information Technology for Development – Taylor & Francis
Published: Apr 3, 2014
Keywords: cybersecurity infrastructure; emerging economies; national information infrastructure
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.