The impact of cybersecurity law in the middle east
DOI:
https://doi.org/10.5281/zenodo.14291287Palabras clave:
Middle East, cybersecurity, legislation, regulatory frameworks.Resumen
Due to the growing digitalization in the Middle East, there has been a significant increase in cyberattacks in the region. The escalating magnitude of cyber assaults underscores the urgent need for robust cybersecurity measures and regulatory frameworks to safeguard digital assets and infrastructures. The articles aim to assess the repercussions of cybersecurity legislation in the Middle East, with a focus on the challenges and accomplishments of the region in establishing effective cybersecurity defenses. A comprehensive analysis of scholarly articles, media reports, and government records was conducted to gather comprehensive data on the existing cybersecurity rules in the Middle East. This method facilitated a thorough analysis of the legal and regulatory structure in the given domain. Analysis reveals that while certain Middle Eastern countries have made significant progress in establishing comprehensive cybersecurity frameworks, there are still significant areas for improvement that hinder the practical application of these frameworks. A significant revelation is the need for cohesive efforts and cooperation among governments, business sector entities, and international agencies, which is vital for enhancing cybersecurity.
Descargas
Citas
Raytheon: ‘'Cyber threats to the Middle East’', Electronic resource, 2020
A. Alamri, Al-Nemrat, A., Saeed, F., and Baker, T.: ‘'The role of cyber threat intelligence in enhancing the security of critical infrastructures in the Middle East’', Journal of Cyber Security Technology, 5, (1), 2021, pp. 47-66
K. Zetter: ‘'Countdown to zero day: Stuxnet and the launch of the world's first digital weapon’', Crown Publishing Group LLC, 2014
E. M. Roche, PhD, JD.: ‘'This is How They Tell Me the World Ends: The Cyber-Weapons Arms Race’', Journal of Strategic Security, 14, (2), 2021
D. P. Biros, T. Havakhor, and T. Zhang: ‘'Does Cybersecurity Slow Down Digitization? A Natural Experiment of Security Breach Notification Laws’', Cybersecurity, 2019
N. Kshetri: ‘Cybersecurity in Gulf Cooperation Council Economies’, in Editor (Ed.)^(Eds.): ‘Book Cybersecurity in Gulf Cooperation Council Economies’ (2016, edn.), pp.
M. S. Altayar: ‘'A comparative study of anti-cybercrime laws in the Gulf Cooperation Council countries’', 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017, pp. 148-53
H. Nasser Alshabib, and J. Tiago Martins: ‘'Cybersecurity: Perceived Threats and Policy Responses in the Gulf Cooperation Council’', IEEE Transactions on Engineering Management, PP, 2021, pp. 1-12
N. H. Al-Kumaim, and S. K. Alshamsi: ‘Determinants of Cyberattack Prevention in UAE Financial Organizations: Assessing the Mediating Role of Cybersecurity Leadership’, in Editor (Ed.)^(Eds.): ‘Book Determinants of Cyberattack Prevention in UAE Financial Organizations: Assessing the Mediating Role of Cybersecurity Leadership’ (2023, edn.), pp.
I. Zografopoulos, J. Ospina, X. Liu, and C. Konstantinou: ‘'Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies’', IEEE Access, 9, 2021, pp. 29775-818
J. Shires: ‘The Politics of Cybersecurity in the Middle East’, in Editor (Ed.)^(Eds.): ‘Book The Politics of Cybersecurity in the Middle East’ (2022, edn.), pp.
S. R. Nistane, and R. R. Sharma: ‘'Cyber Security : Strategy to Security Challenges A Review’', International Journal of Scientific Research in Science and Technology, 2022
M. J. ALDhanhani: ‘'Review of Cyber Security on Oil and Gas Industry in United Arab Emirates: Analysis on the Effectiveness of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework’', Turkish Journal of Computer and Mathematics Education (TURCOMAT), 2021
A. M. Talib, F. O. Alomary, H. F. Alwadi, and R. Albusayli: ‘'Ontology-Based Cyber Security Policy Implementation in Saudi Arabia’', Journal of Information Security, 09, 2018, pp. 315-33
N. R. Al-Rodhan: ‘'Cybersecurity and geopolitics in the Middle East’', European View, 17, (1), 2018, pp. 57-67
M. Alsaleh, & Alomar, N.: ‘'A systematic review of the state of cybercrime legislation in the Middle East: Analysis and future challenges’', Computers & Security, 81, 2019, pp. 196-210
A. M. Al-Khouri: ‘' UAE National Cybersecurity Framework: A cultural perspective’', Information & Computer Security, 20, (4), 2012, pp. 364-77
N. Al-Rodhan: ‘'Cybersecurity in the Gulf Cooperation Council (GCC) countries: An overview of the cyber-threat landscape and state policies’', Belfer Center for Science and International Affairs, Harvard Kennedy School., 2018
F. A. Aloul: ‘'The need for effective information security awareness’', Journal of Advances in Information Technology, 2, (3), 2011, pp. 137-43
A. M. Al-Khouri: ‘'UAE eGovernment: An overview of the country's eTransformation journey’', Journal of e-Government Studies and Best Practices, 2012, pp. 1-12
M. Alsaleh, & Alomar, N.: ‘'A review of cybersecurity and cybercrime in the Middle East: Empirical evidence and literature review’', Computers & Security, 81, 2019, pp. 239-55
E. Alomari, Elrefaei, L., & Albawardi, A.: ‘'A study of the awareness of cybercrime amongst the general public in Saudi Arabia’', In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), IEEE Access, 2012, pp. 234-38
O. A. Hathaway, Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J.: ‘'The Law of Cyber-Attack’', California Law Review, 2014, pp. 817-85
S. Soudani, Aloul, F., & Al-Ali, A.: ‘'Cybersecurity awareness in the Arab region’', International Journal of Information and Computer Security, 9, (1-2), 2017, pp. 38-55
N. R. F. Al-Rodhan: ‘'Cybersecurity in the Gulf Cooperation Council countries: A regional perspective’', The GCSP Digital Series, Geneva Centre for Security Policy, 2018
N. Choucri, Madnick, S., & Ferwerda, J.: ‘'Institutions for cybersecurity: International responses and global needs’', Policy and Internet, 10, (1), 2018, pp. 96-114
S. J. Shackelford, Proia, A. N., Martell, B. R., & Craig, A.: ‘'Toward a global standard of cybersecurity care? Exploring the implications of the 2014 NIST Cybersecurity Framework on shaping reasonable national and international cybersecurity practices’', Texas International Law Journal, 50, (2), 2019, pp. 305-46
G. Abu-Tayeh, Weimann, G., & Clarke, R.: ‘'Cyberterrorism: Trends and Responses’', In Cyberterrorism, 2018, pp. 13-43
D. Lacey: ‘'Mind the Gap: The (ISC)² Cybersecurity Workforce Study’', Research & Politics, 2018
G. Evron: ‘'A Postmortem on the Iranian DDoS Attacks against the US Financial Sector: The Unintended Consequences of Iran's Cybersecurity Strategy’', Journal of Strategic Security, 10, (2), 2017, pp. 29-44
M. Dunn Cavelty: ‘The Routledge Handbook of Security Studies’ (2009. 2009)
M. D. Al-Khaldi: ‘'Research Fairness Initiative opens a new era for equitable and impactful research collaborations’', European journal of public health, 30, 2020
M. Alsaleh, & Alomar, N.: ‘'Cybersecurity in Saudi Arabia: An overview of threats, regulations, and the role of pub-lic-private partnerships’', Journal of Information Security and Applications, 47, 2019, pp. 352-60
Y. Chen: ‘'Information security management: compliance challenges and new directions’', Journal of Information Technology Case and Application Research, 24, 2022, pp. 243 - 49
El-gazzar, and Stendal: ‘'Examining How GDPR Challenges Emerging Technologies’', Journal of Information Policy, 2020
H. Wang, W. Xiong, G. Wu, and D. Zhu: ‘'Public–private partnership in Public Administration discipline: a literature review’', Public Management Review, 20, 2018, pp. 293 - 316
H. Younies, and T. N. e. Al-Tawil: ‘'Effect of cybercrime laws on protecting citizens and businesses in the United Arab Emirates (UAE)’', Journal of Financial Crime, 27, 2020, pp. 1089-105
L. Tabansky, and I. B. Israel: ‘The National Cyber-Strategy of Israel and the INCB’, in Editor (Ed.)^(Eds.): ‘Book The National Cyber-Strategy of Israel and the INCB’ (2015, edn.), pp.
R. A. Ahmad, and M. S. Hashim: ‘'The Organisation of Islamic Conference — Computer Emergency Response Team(OIC-CERT): Answering cross border cooperation’', 2011 Second Worldwide Cybersecurity Summit (WCS), 2011, pp. 1-5
T. Riebe, M.-A. Kaufhold, and C. Reuter: ‘'The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study’', Proceedings of the ACM on Human-Computer Interaction, 5, 2021, pp. 1 - 30
Descargas
Publicado
Cómo citar
Número
Sección
Licencia

Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.