LEADER 04544nam 22007335 450 001 9910298983003321 005 20200704000618.0 010 $a3-319-10620-1 024 7 $a10.1007/978-3-319-10620-5 035 $a(CKB)3710000000261961 035 $a(EBL)1967229 035 $a(SSID)ssj0001372351 035 $a(PQKBManifestationID)11785440 035 $a(PQKBTitleCode)TC0001372351 035 $a(PQKBWorkID)11303605 035 $a(PQKB)10915622 035 $a(MiAaPQ)EBC1967229 035 $a(DE-He213)978-3-319-10620-5 035 $a(PPN)182096289 035 $a(EXLCZ)993710000000261961 100 $a20141011d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCybersecurity in Switzerland /$fby Myriam Dunn Cavelty 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (81 p.) 225 1 $aSpringerBriefs in Cybersecurity,$x2193-973X 300 $aDescription based upon print version of record. 311 $a3-319-10619-8 320 $aIncludes bibliographical references at the end of each chapters. 327 $aForeword -- List of Abbreviations -- Introduction -- Global Cyber-security Policy Evolution -- Phase 1: The Four Pillar Model for Information Assurance (1997-2004) -- Phase 2: Reporting and Analysis Center for Information Assurance (MELANI) (2004-2010) -- Phase 3: Consolidation and Cyber-Risk Strategy (2011-2014) -- Conclusion. 330 $aGives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leading up to these strategy documents. The peculiarities of the Swiss political system, which influence the way cyber-security can be designed and practiced in Switzerland are considered, as well as the bigger, global influences and driving factors that shaped the Swiss approach to cyber-security. It shows that throughout the years, the most important influence on the Swiss policy-approach was the international level, or rather the developments of a cyber-security policy in other states. Even though many of the basic ideas about information-sharing and public-private partnerships were influenced by (amongst others) the US approach to critical infrastructure protection, the peculiarities of the Swiss political system has led to a particular ?Swiss solution?, which is based on the federalist structures and subsidiary principles, characterized by stability and resilience to external shocks in the form of cyber-incidents. Cybersecurity in Switzerland will be a stimulating read for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers. It contains not only specific material on an interesting case,  but also a wealth of background information on different variations of cyber-security, as well as on information-sharing and public-private partnerships. 410 0$aSpringerBriefs in Cybersecurity,$x2193-973X 606 $aComputers 606 $aLaw and legislation 606 $aInternational law 606 $aCriminology 606 $aComputer security 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aPublic International Law $3https://scigraph.springernature.com/ontologies/product-market-codes/R19000 606 $aCriminology and Criminal Justice, general$3https://scigraph.springernature.com/ontologies/product-market-codes/1B0000 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aInternational law. 615 0$aCriminology. 615 0$aComputer security. 615 14$aLegal Aspects of Computing. 615 24$aPublic International Law . 615 24$aCriminology and Criminal Justice, general. 615 24$aSystems and Data Security. 676 $a005.82 700 $aDunn Cavelty$b Myriam$4aut$4http://id.loc.gov/vocabulary/relators/aut$0892361 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298983003321 996 $aCybersecurity in Switzerland$92149591 997 $aUNINA