LEADER 03839oam 2200733I 450 001 9910411653103321 005 20250529143508.0 010 $a0-429-25115-7 010 $a1-4665-4186-5 010 $a1-280-12213-7 010 $a9786613525994 010 $a1-4398-4664-2 024 7 $a10.1201/b11363 035 $a(CKB)2550000000074796 035 $a(EBL)826942 035 $a(OCoLC)804664126 035 $a(SSID)ssj0000565991 035 $a(PQKBManifestationID)11404425 035 $a(PQKBTitleCode)TC0000565991 035 $a(PQKBWorkID)10535015 035 $a(PQKB)10801118 035 $a(MiAaPQ)EBC826942 035 $a(MiAaPQ)EBC4010064 035 $a(Au-PeEL)EBL826942 035 $a(CaPaEBR)ebr10518001 035 $a(CaONFJC)MIL352599 035 $a(OCoLC)773036079 035 $a(Au-PeEL)EBL4010064 035 $a(OCoLC)958540109 035 $a(EXLCZ)992550000000074796 100 $a20180331d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCybersecurity $epublic sector threats and responses /$f[edited by] Kim Andreasson 205 $a1st ed. 210 1$aBoca Raton, Fla. :$cCRC Press,$d2012. 215 $a1 online resource (598 p.) 225 1 $aPublic administration and public policy ;$v165 300 $a"K12093." 311 08$a1-4398-4663-4 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Copyright; Dedication; Contents; Preface; Introduction; The Editor; Contributor Biographies (In Order of Appearance); Chapter 1. The Global Rise of E-Government and Its Security Implications; Chapter 2. Understanding Cyber Threats; Chapter 3. Cybersecurity in East Asia: Japan and the 2009 Attacks on South Korea and the United States; Chapter 4. Toward a Global Approach To Cybersecurity; Chapter 5. The Cybersecurity Policy Challenge: The Tyranny of Geography; Chapter 6. U.S. Federal Cybersecurity Policy; Chapter 7. European Cybersecurity Policy 327 $aChapter 8. A Local Cybersecurity Approach: The Case of CataloniaChapter 9. Securing Government Transparency: Cybersecurity Policy Issues in a Gov 2.0 Environment and Beyond; Chapter 10. The Civilian Cyber Incident Response Policies of the U.S. Federal Government; Chapter 11. Cybersecurity Health Check: A Framework to Enhance Organizational Security; Chapter 12. Beyond Public-Private Partnerships: Leadership Strategies for Securing Cyberspace; Chapter 13. Is There a Conclusion to Cybersecurity?; Index 330 $aWritten as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. --$cProvided by publisher. 410 0$aPublic administration and public policy ;$v165. 606 $aComputer networks$xSecurity measures$xGovernment policy 606 $aGovernment information$xSecurity measures 606 $aComputer crimes$xPrevention 615 0$aComputer networks$xSecurity measures$xGovernment policy. 615 0$aGovernment information$xSecurity measures. 615 0$aComputer crimes$xPrevention. 676 $a352.3/79 686 $aCOM053000$aPOL002000$aPOL028000$2bisacsh 701 $aAndreasson$b Kim J$0897995 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910411653103321 996 $aCybersecurity$92006324 997 $aUNINA