El impacto de la legislación sobre ciberseguridad en Oriente Medio
DOI:
https://doi.org/10.5281/zenodo.14291287Keywords:
Middle East, cybersecurity, legislation, regulatory frameworks.Abstract
Debido a la creciente digitalización en Oriente Medio, se ha producido un aumento significativo de los ciberataques en la región. La creciente magnitud de los ciberataques subraya la urgente necesidad de contar con medidas de ciberseguridad sólidas y marcos regulatorios para salvaguardar los activos e infraestructuras digitales. Los artículos tienen como objetivo evaluar las repercusiones de la legislación sobre ciberseguridad en Oriente Medio, centrándose en los desafíos y logros de la región en el establecimiento de defensas de ciberseguridad eficaces. Se realizó un análisis exhaustivo de artículos académicos, informes de los medios de comunicación y registros gubernamentales para recopilar datos completos sobre las normas de ciberseguridad existentes en Oriente Medio. Este método facilitó un análisis exhaustivo de la estructura legal y regulatoria en el dominio en cuestión. El análisis revela que, si bien algunos países de Oriente Medio han logrado avances significativos en el establecimiento de marcos integrales de ciberseguridad, aún existen áreas importantes de mejora que obstaculizan la aplicación práctica de estos marcos. Una revelación importante es la necesidad de esfuerzos cohesivos y cooperación entre los gobiernos, las entidades del sector empresarial y las agencias internacionales, lo cual es vital para mejorar la ciberseguridad.
Downloads
References
Raytheon: ‘'Cyber threats to the Middle East’', Electronic resource, 2020
A. Alamri, Al-Nemrat, A., Saeed, F., and Baker, T.: ‘'The role of cyber threat intelligence in enhancing the security of critical infrastructures in the Middle East’', Journal of Cyber Security Technology, 5, (1), 2021, pp. 47-66
K. Zetter: ‘'Countdown to zero day: Stuxnet and the launch of the world's first digital weapon’', Crown Publishing Group LLC, 2014
E. M. Roche, PhD, JD.: ‘'This is How They Tell Me the World Ends: The Cyber-Weapons Arms Race’', Journal of Strategic Security, 14, (2), 2021
D. P. Biros, T. Havakhor, and T. Zhang: ‘'Does Cybersecurity Slow Down Digitization? A Natural Experiment of Security Breach Notification Laws’', Cybersecurity, 2019
N. Kshetri: ‘Cybersecurity in Gulf Cooperation Council Economies’, in Editor (Ed.)^(Eds.): ‘Book Cybersecurity in Gulf Cooperation Council Economies’ (2016, edn.), pp.
M. S. Altayar: ‘'A comparative study of anti-cybercrime laws in the Gulf Cooperation Council countries’', 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017, pp. 148-53
H. Nasser Alshabib, and J. Tiago Martins: ‘'Cybersecurity: Perceived Threats and Policy Responses in the Gulf Cooperation Council’', IEEE Transactions on Engineering Management, PP, 2021, pp. 1-12
N. H. Al-Kumaim, and S. K. Alshamsi: ‘Determinants of Cyberattack Prevention in UAE Financial Organizations: Assessing the Mediating Role of Cybersecurity Leadership’, in Editor (Ed.)^(Eds.): ‘Book Determinants of Cyberattack Prevention in UAE Financial Organizations: Assessing the Mediating Role of Cybersecurity Leadership’ (2023, edn.), pp.
I. Zografopoulos, J. Ospina, X. Liu, and C. Konstantinou: ‘'Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies’', IEEE Access, 9, 2021, pp. 29775-818
J. Shires: ‘The Politics of Cybersecurity in the Middle East’, in Editor (Ed.)^(Eds.): ‘Book The Politics of Cybersecurity in the Middle East’ (2022, edn.), pp.
S. R. Nistane, and R. R. Sharma: ‘'Cyber Security : Strategy to Security Challenges A Review’', International Journal of Scientific Research in Science and Technology, 2022
M. J. ALDhanhani: ‘'Review of Cyber Security on Oil and Gas Industry in United Arab Emirates: Analysis on the Effectiveness of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework’', Turkish Journal of Computer and Mathematics Education (TURCOMAT), 2021
A. M. Talib, F. O. Alomary, H. F. Alwadi, and R. Albusayli: ‘'Ontology-Based Cyber Security Policy Implementation in Saudi Arabia’', Journal of Information Security, 09, 2018, pp. 315-33
N. R. Al-Rodhan: ‘'Cybersecurity and geopolitics in the Middle East’', European View, 17, (1), 2018, pp. 57-67
M. Alsaleh, & Alomar, N.: ‘'A systematic review of the state of cybercrime legislation in the Middle East: Analysis and future challenges’', Computers & Security, 81, 2019, pp. 196-210
A. M. Al-Khouri: ‘' UAE National Cybersecurity Framework: A cultural perspective’', Information & Computer Security, 20, (4), 2012, pp. 364-77
N. Al-Rodhan: ‘'Cybersecurity in the Gulf Cooperation Council (GCC) countries: An overview of the cyber-threat landscape and state policies’', Belfer Center for Science and International Affairs, Harvard Kennedy School., 2018
F. A. Aloul: ‘'The need for effective information security awareness’', Journal of Advances in Information Technology, 2, (3), 2011, pp. 137-43
A. M. Al-Khouri: ‘'UAE eGovernment: An overview of the country's eTransformation journey’', Journal of e-Government Studies and Best Practices, 2012, pp. 1-12
M. Alsaleh, & Alomar, N.: ‘'A review of cybersecurity and cybercrime in the Middle East: Empirical evidence and literature review’', Computers & Security, 81, 2019, pp. 239-55
E. Alomari, Elrefaei, L., & Albawardi, A.: ‘'A study of the awareness of cybercrime amongst the general public in Saudi Arabia’', In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), IEEE Access, 2012, pp. 234-38
O. A. Hathaway, Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J.: ‘'The Law of Cyber-Attack’', California Law Review, 2014, pp. 817-85
S. Soudani, Aloul, F., & Al-Ali, A.: ‘'Cybersecurity awareness in the Arab region’', International Journal of Information and Computer Security, 9, (1-2), 2017, pp. 38-55
N. R. F. Al-Rodhan: ‘'Cybersecurity in the Gulf Cooperation Council countries: A regional perspective’', The GCSP Digital Series, Geneva Centre for Security Policy, 2018
N. Choucri, Madnick, S., & Ferwerda, J.: ‘'Institutions for cybersecurity: International responses and global needs’', Policy and Internet, 10, (1), 2018, pp. 96-114
S. J. Shackelford, Proia, A. N., Martell, B. R., & Craig, A.: ‘'Toward a global standard of cybersecurity care? Exploring the implications of the 2014 NIST Cybersecurity Framework on shaping reasonable national and international cybersecurity practices’', Texas International Law Journal, 50, (2), 2019, pp. 305-46
G. Abu-Tayeh, Weimann, G., & Clarke, R.: ‘'Cyberterrorism: Trends and Responses’', In Cyberterrorism, 2018, pp. 13-43
D. Lacey: ‘'Mind the Gap: The (ISC)² Cybersecurity Workforce Study’', Research & Politics, 2018
G. Evron: ‘'A Postmortem on the Iranian DDoS Attacks against the US Financial Sector: The Unintended Consequences of Iran's Cybersecurity Strategy’', Journal of Strategic Security, 10, (2), 2017, pp. 29-44
M. Dunn Cavelty: ‘The Routledge Handbook of Security Studies’ (2009. 2009)
M. D. Al-Khaldi: ‘'Research Fairness Initiative opens a new era for equitable and impactful research collaborations’', European journal of public health, 30, 2020
M. Alsaleh, & Alomar, N.: ‘'Cybersecurity in Saudi Arabia: An overview of threats, regulations, and the role of pub-lic-private partnerships’', Journal of Information Security and Applications, 47, 2019, pp. 352-60
Y. Chen: ‘'Information security management: compliance challenges and new directions’', Journal of Information Technology Case and Application Research, 24, 2022, pp. 243 - 49
El-gazzar, and Stendal: ‘'Examining How GDPR Challenges Emerging Technologies’', Journal of Information Policy, 2020
H. Wang, W. Xiong, G. Wu, and D. Zhu: ‘'Public–private partnership in Public Administration discipline: a literature review’', Public Management Review, 20, 2018, pp. 293 - 316
H. Younies, and T. N. e. Al-Tawil: ‘'Effect of cybercrime laws on protecting citizens and businesses in the United Arab Emirates (UAE)’', Journal of Financial Crime, 27, 2020, pp. 1089-105
L. Tabansky, and I. B. Israel: ‘The National Cyber-Strategy of Israel and the INCB’, in Editor (Ed.)^(Eds.): ‘Book The National Cyber-Strategy of Israel and the INCB’ (2015, edn.), pp.
R. A. Ahmad, and M. S. Hashim: ‘'The Organisation of Islamic Conference — Computer Emergency Response Team(OIC-CERT): Answering cross border cooperation’', 2011 Second Worldwide Cybersecurity Summit (WCS), 2011, pp. 1-5
T. Riebe, M.-A. Kaufhold, and C. Reuter: ‘'The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study’', Proceedings of the ACM on Human-Computer Interaction, 5, 2021, pp. 1 - 30
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.