Cyber security in Developing World towards Excellency by 2026 – Opportunities, Policies
Keywords:
Cyberspace, ICT, Stakeholders, Cyber security Model 2026Abstract
Information and communication technology (ICT) is playing a major role in the development of socio economic related issues. Some countries in the globe have taken advantage with the effectiveness of ICT, Cyberspace and are in the process of transforming their economies into knowledge and information based economies. These benefits are being challenged by the increasing cyber threats where there is no global conscious on how to regulate cyberspace even through several countries having their own cyber security policies but without proper measures. The current setup of the internet enables developing countries to work together as a global village. The goal of this paper are to help policy makers, businesses, and societal organizations to better prepare for the technological changes ahead and enable all stakeholders to consider how present day policy choices might influence future outcome. In our paper we propose cyber security 2026 model along with methodology which concentrate on the several components to form a framework for trust and online security.
References
. James Manyika, Michael Chui, Jacques Bughin, “Disruptive Technologies: Advances that will transform life, Business and Global Economy, McKinsey”, Global Institute, May 2013.
. R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville, “Future directions for behavioral information security research,” Computers & Security, vol. 32, pp. 90–101, Feb. 2013.
. Greenwald G, MacAskill E., “Boundless Informant: the NSA’s secret tool to track global surveillance data”, The Guardian. 2013 Jun 11;11.
. Cavely, M.D.(2014) Breaking the Cyber Security Dilemma: Aligning Security needs nad Removing Vulnerabilities( Springer Science)
. Laukka, M(2010). "Criteria for privacy support system". Proceedings of the 5th Nordic Workshop on secure IT systems, Raykjavik, Iceland, Oct 12-13.
. DeGusta, Michael. "Are smart phones spreading faster than any technology in human history." Massachusetts Institute of Technology Review (2012). APA
. Manyika J, Bughin J, Lund S, Nottebohm O, Poulter D, Jauch S, Ramaswamy S., “Global flows in a digital age: How trade, finance, people, and data connect the world economy”. McKinsey Global Institute; 2014.
. S.Jayasri, D.Karthika, "Microcontroller Based Traffic and Road Condition Monitoring Alert System Using Internet of Things", International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.272-279, 2016.
. United States. “White House Office, and Barack Obama. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked Worldr”. White House, 2011. APA
. Gwartney, James, Robert Lawson, and Seth Norton. “Economic freedom of the world 2008 annual report”. The Fraser Institute, 2008. APA
. Organisation for Economic Co-operation and Development (OECD). Better skills, better jobs, better lives: a strategic approach to skills policies. OECD, 2012. APA
. The UK Cyber Security Strategy, 2011, https://www.gov.uk/government/uploads/system/uploads/ attachment_data/file/60961/uk-cyber-security-agency-prism-outline-lyrics#lyric
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
