International Political Economy

Size: px
Start display at page:

Download "International Political Economy"

Transcription

1 International Political Economy Series Editor: Timothy M. Shaw, Visiting Professor, University of Massachusetts Boston, USA, and Emeritus Professor, University of London, UK The global political economy is in flux as a series of cumulative crises impacts its organization and governance. The International Political Economy series has tracked its development in both analysis and structure over the last three decades. It has always had a concentration on the global South. Now the South increasingly challenges the North as the centre of development, also reflected in a growing number of submissions and publications on indebted Eurozone economies in Southern Europe. An indispensable resource for scholars and researchers, the series examines a variety of capitalisms and connections by focusing on emerging economies, companies and sectors, debates and policies. It informs diverse policy communities as the established trans-atlantic North declines and the rest, especially the BRICS, rise. Titles include: Caroline Kuzemko THE ENERGY SECURITY CLIMATE NEXUS Hans Löfgren and Owain David Williams (editors) THE NEW POLITICAL ECONOMY OF DRUGS Production, Innnovation and TRIPS in the Global South Timothy Cadman (editor) CLIMATE CHANGE AND GLOBAL POLICY REGIMES Towards Institutional Legitimacy Ian Hudson, Mark Hudson and Mara Fridell FAIR TRADE, SUSTAINABILITY, AND SOCIAL CHANGE Andrés Rivarola Puntigliano and José Briceño-Ruiz (editors) RESILIENCE OF REGIONALISM IN LATIN AMERICA AND THE CARIBBEAN Development and Autonomy Godfrey Baldacchino (editor) THE POLITICAL ECONOMY OF DIVIDED ISLANDS Unified Geographies, Multiple Polities Mark Findlay CONTEMPORARY CHALLENGES IN REGULATING GLOBAL CRISES Nir Kshetri CYBERCRIME AND CYBERSECURITY IN THE GLOBAL SOUTH Kristian Stokke and Olle Törnquist (editors) DEMOCRATIZATION IN THE GLOBAL SOUTH The Importance of Transformative Politics

2 Jeffrey Wilson GOVERNING GLOBAL PRODUCTION Resource Networks in the Asia-Pacific Steel Industry International Political Economy Series Standing Order ISBN hardcover Series Standing Order ISBN paperback (outside North America only) You can receive future titles in this series as they are published by placing a standing order. Please contact your bookseller or, in case of difficulty, write to us at the address below with your name and address, the title of the series and one of the ISBNs quoted above. Customer Services Department, Macmillan Distribution Ltd, Houndmills, Basingstoke, Hampshire RG21 6XS, England

3 Cybercrime and Cybersecurity in the Global South Nir Kshetri Associate Professor, University of North Carolina-Greensboro, USA

4 Nir Kshetri 2013 Softcover reprint of the hardcover 1st edition All rights reserved. No reproduction, copy or transmission of this publication may be made without written permission. No portion of this publication may be reproduced, copied or transmitted save with written permission or in accordance with the provisions of the Copyright, Designs and Patents Act 1988, or under the terms of any licence permitting limited copying issued by the Copyright Licensing Agency, Saffron House, 6 10 Kirby Street, London EC1N 8TS. Any person who does any unauthorized act in relation to this publication may be liable to criminal prosecution and civil claims for damages. The author has asserted his right to be identified as the author of this work in accordance with the Copyright, Designs and Patents Act First published 2013 by PALGRAVE MACMILLAN Palgrave Macmillan in the UK is an imprint of Macmillan Publishers Limited, registered in England, company number , of Houndmills, Basingstoke, Hampshire RG21 6XS. Palgrave Macmillan in the US is a division of St Martin s Press LLC, 175 Fifth Avenue, New York, NY Palgrave Macmillan is the global academic imprint of the above companies and has companies and representatives throughout the world. Palgrave and Macmillan are registered trademarks in the United States, the United Kingdom, Europe and other countries. ISBN ISBN (ebook) DOI / This book is printed on paper suitable for recycling and made from fully managed and sustained forest sources. Logging, pulping and manufacturing processes are expected to conform to the environmental regulations of the country of origin. A catalogue record for this book is available from the British Library. A catalog record for this book is available from the Library of Congress

5 Contents List of Figures and Tables Preface and Acknowledgements viii x 1 Cybercrime and Cybersecurity in the Global South: Status, Drivers and Trends Introduction Cybercrime and cybersecurity issues in relation to the international political economy Definitions of major terms A review of cybercrimes in the GS The GN GS structural differences in cybercrime and cybersecurity A typology of cybercrimes in the GS Concluding comments 28 2 Technological and Global Forces Shaping Cybercrime and Cybersecurity in the Global South Introduction Technological forces Global forces Concluding comments 49 3 Cybercrime and Cybersecurity in the Former Soviet Union and Central and Eastern Europe Introduction Assessing the nature, extent and impact of cybercrimes associated with the region Formal and informal institutions related to cybercrime The push and pull factors related to cybercrimes International collaboration, cooperation and partnership Case studies of some firms from the region engaged in cybercrimes Discussion and implications 75 v

6 vi Contents 4 Cybercrime and Cybersecurity in China Introduction A survey of cybercrimes associated with China Structure of the Chinese economy in relation to cybercrimes originating from and affecting the country Institutional factors Concluding comments 98 5 Cybercrime and Cybersecurity in India Introduction An overview of cybercrimes in India Structure of the Indian economy in relation to cybercrimes originating from and affecting the country Institutions related to cybercrimes A Case study of NASSCOM s efforts in enhancing cybersecurity in the Indian offshoring industry Discussion and implications Concluding comments Cybercrime and Cybersecurity in the Middle East and North African Economies Introduction A survey of cybercrimes associated with the MENA economies Structure of the MENA economies in relation to cybercrimes originating from and affecting them Institutions related to cybercrimes in MENA Discussion and implications Concluding comments Cybercrime and Cybersecurity in Latin American and Caribbean Economies Introduction The escalation of cybercrime activities associated with LAC economies Economic factors Institutional factors related to cybercrimes in LAC economies 145

7 Contents vii 7.5 Natures of organized crime and cybercrime groups in LAC economies Concluding comments Cybercrime and Cybersecurity in Sub-Saharan African Economies Introduction SSA s digitization: The cybercrime and cybersecurity dimensions Hollowness in Africa s digitization initiatives Externalities in the SSA cybercrime industry Progresses on the institutional and technological fronts Concluding comments Cybercrime and Cybersecurity in the Developing Pacific Island Economies Introduction Digitization of DPIEs and cybercrimes associated with these economies A framework for explaining cybercrimes associated with DPIEs Discussion and implications Concluding comments Discussion, Implications and Concluding Remarks Introduction Dominant and idiosyncratic forces related to cybercrimes in GS economies Evolution of cybersecurity-related institutions in the GN and the GS International relations and international politics issues related to cybersecurity Future research Final thought 202 Notes 205 References 206 Index 247

8 Figures and Tables Figures 1.1 A typology of cybercrimes 21 Tables 1.1 Explanation of some of the major terms used in the book Top cybercrime sources ( ) Top cybercrime sources and targets ( ) Some examples of cybercrimes associated with various categories of perpetrators and targets in the GS A 2 2 matrix for categories of cyberattacks representing jurisdiction of the target/victim and motivation: an illustration from China Various examples and some of the associated mechanisms related to cybercrimes associated with the GS Various flows related to cybercrime and cybersecurity Some examples of notable international cybercrime networks associated with the FSU&CEE economies Some representative studies on China s position in the global cyberattack industry Some notable examples of the engagement of ethnic Chinese in alleged cyberespionage activities against economic and industrial targets Some notable examples of China s alleged cyber espionage activities against military and political targets Cybercrime activities originating in LAC economies Cybercrime activities targeting LAC economies Some economies in Latin America and the Caribbean as top cybercrime sources Some of the top cybercrime-originating SSA countries Cybercrime-related laws in selected SSA economies 165 viii

9 List of Figures and Tables ix 8.3 Current states and future prospects of cybercrimes in SSA economies Digitization and escalation of cybercrime activities and evolution of cybersecurity-related institutions in DPIEs: Major milestones Externality mechanisms and feedback systems producing increasing return in cybercrime activities associated with DPIEs Various forms of controls for cybercrime activities in DPIEs Determinants and impacts of cybercrimes in DPIEs Dominant and idiosyncratic forces related to cybercrimes in the economies used in the book 194

10 Preface and Acknowledgements As cybercrime is becoming more and more pervasive in our daily lives, it has raised a multitude of challenges, ranging from theoretical foundations to public policy. Especially the complex, multifaceted and dynamic nature of cybercrime associated with the Global South is a critical but little-examined problem in social science research. This topic s importance is even more obvious with the emergence of some economies in the South as new centres of capitalisms, especially the so-called BRICS economies (Brazil, Russia, India, China and South Africa). At the same time, dominant economies in the Global South and Global North are deeply divided in their views regarding the governance of cyberspace. Although the popular press has paid considerable attention to cybercrime in the Global South, very little research has been undertaken to further our understanding of this phenomenon. Our understanding of the underlying drivers and effects of such crimes on the global society and economy is thus limited. The purpose of this book is to contribute to filling this void. Cybercrime in the Global South is a subject of interest to a number of disciplines ranging from political science and developmental economics to law, criminology and sociology. The book looks at the state and structure of cybercrimes in the Global South and attempts to highlight institutional, economic and social processes related to such crimes. It takes a close look at economies in the Global South with high incidence and origination of cybercrimes. The major thrust of this book is also on technological and global forces shaping cybercrimes in the Global South. Also examined in the book are specific country and regional cases, which can give deep insights, rich data and meaningful information on the dominant drivers, idiosyncratic forces and impacts of cybercrimes as well as the natures of inter-north/south and intra-south variations in such crimes. I am particularly grateful to Christina Brian, Senior Commissioning Editor IPE, Development & Environment, at Palgrave for her enthusiastic support of the idea of this book. Amanda McGrath s effective, timely and efficient communication and support have been helpful to facilitate the smooth flow of the project. I also received invaluable help and support from my graduate assistant Aroop Menon. Finally, I highly x

11 Preface and Acknowledgements xi appreciate the work that Sumitha Nithyanandan, Project Manager, Integra Software Services and her team put in the book production process, who demonstrated a high level of competence, efficiency and professionalism. As for the ideas, concepts, content and theories presented in this book, I am indebted and thankful to several people for comments, suggestion, support, encouragement and feedbacks. First, I would like to express my sincere gratitude to Tim Shaw, editor, International Political Economy Series, at Palgrave Macmillan. Tim s inspiration and guidance during the germination of the book were invaluable. Tim was the first to realize the need for a book on this important topic. His enthusiastic response gave me the energy necessary to develop my ideas into a book. Various papers related to this book were presented at scholarly meetings including IV Simpisio De Investigaciones es estudios de trabajo, Universidad De La Salle, Bogota, Colombia, April 2012; Pacific Telecommunications Council s (PTC) Annual Conference, Honolulu, HI, January 2012; Sixth Annual Mid-Atlantic Strategy Colloquium, University of North Carolina, Chapel Hill, NC, 2 3 December 2011; International Telecommunications Society Asia-Pacific Regional Conference, June 2011, Taipei, Taiwan; 11th Annual International Business Research Forum, Philadelphia, 9 10 April I thank the many professionals involved in these meetings, who provided comments and suggestions and helped me refine my thinking. Thanks go as well to anonymous Palgrave peer reviewers for their helpful and encouraging comments on the book proposal. There is nothing more important than having a loving and supportive family to create the foundation for a project such as this book. I express my love and gratitude to my wife and best friend, Maya. Without her support and encouragement this book would not have existed at all. Finally, I would like to dedicate this book to my mother, Manamaya Kshetri, for her love and support.

Stock Message Boards

Stock Message Boards Stock Message Boards This page intentionally left blank Stock Message Boards A Quantitative Approach to Measuring Investor Sentiment Ying Zhang STOCK MESSAGE BOARDS Copyright Ying Zhang, 2014. Softcover

More information

Mastering. Pascal and Delphi Programming

Mastering. Pascal and Delphi Programming Mastering Pascal and Delphi Programming MACMILLAN MASTER SERIES Accounting Advanced English Language Advanced Pure Mathematics Arabic Banking Basic Management Biology British Politics Business Administration

More information

0 Mastering Microsoft Office

0 Mastering Microsoft Office 0 Mastering Microsoft Office MACMILLAN MASTER SERIES Accounting Advanced English Language Advanced Pure Mathematics Arabic Banking Basic Management Biology British Politics Business Administration Business

More information

Mastering. Spreadsheets Q

Mastering. Spreadsheets Q Mastering Spreadsheets Q Macmillan Master Series Accounting Arabic Astronomy Background to Business Banking Basic Management Biology British Politics Business Communication Business Law Business Microcomputing

More information

The Global Cybercrime Industry

The Global Cybercrime Industry Nir Kshetri The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives 4y Springer 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and

More information

Mastering. C Programming 0

Mastering. C Programming 0 Mastering C Programming 0 Palgrave Master Series Accounting Accounting Skills Advanced English Language Advanced English Literature Advanced Pure Mathematics Arabic Basic Management Biology British Politics

More information

In Business Now Series Graphs and Charts Renee Huggett Markets Renee Huggett

In Business Now Series Graphs and Charts Renee Huggett Markets Renee Huggett Graphs and Charts In Business Now Series Graphs and Charts Renee Huggett Markets Renee Huggett IN BUSINESS NOW Graphs and Charts Renée Huggett M MACMILLAN Renée Huggett 1990 All rights reserved. No reproduction,

More information

MACMILAN MASTER SBUEI

MACMILAN MASTER SBUEI Mastering JavaO MACMILAN MASTER SBUEI Accounting Advanced English Language Advanced Pure Mathematics Arabic Banking Basic Management Biology British Politics Business Administration Business Communication

More information

MASTERING COBOL PROGRAMMING

MASTERING COBOL PROGRAMMING MASTERING COBOL PROGRAMMING MACMILLAN MASTER SERIES Banking Basic English Law Basic Management Biology British Politics Business Communication Business Microcomputing Chemistry COBOL Programming Commerce

More information

Contents The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures

Contents The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures Contents 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures... 1 1.1 The Rapidly Rising Global Cybercrime Industry... 1 1.1.1 Cybercrime: Definitional

More information

Laptops and Netbooks: Mobile Broadband Traffic Across Regions

Laptops and Netbooks: Mobile Broadband Traffic Across Regions Laptops and Netbooks: Mobile Broadband Traffic Across Regions 2009- Coda Research Consultancy Ltd, 2009 All rights reserved. No part of this work may be reproduced or transmitted in any form or by any

More information

Program and Electronic Projects for the SSC, Electron and Spectrum Computers

Program and Electronic Projects for the SSC, Electron and Spectrum Computers Program and Electronic Projects for the SSC, Electron and Spectrum Computers Macmillan Electronic Projects Series Audio Circuits and Projects (revised edition) Graham Bishop Program and Electronic Projects

More information

Research on Industrial Security Theory

Research on Industrial Security Theory Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3

More information

IFC ENERGY STORAGE MARKET REPORT

IFC ENERGY STORAGE MARKET REPORT IFC ENERGY STORAGE MARKET REPORT DEVELOPMENTS AND OPPORTUNITIES FOR ENERGY STORAGE IN EMERGING MARKETS JANUARY 9, 2016 ANISSA DEHAMNA PRINCIPAL RESEARCH ANALYST NAVIGANT RESEARCH 1 / 2016 NAVIGANT CONSULTING,

More information

Inter-regional South-South Cooperation for

Inter-regional South-South Cooperation for Inter-regional South-South Cooperation for Inclusive and Sustainable Development: The Asia-Pacific Perspective by Dr. Noeleen Heyzer Under-Secretary-General of the United Nations and Executive Secretary

More information

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society Resolutions 2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling the outcome

More information

HLG Briefly. HLG was established on March 6, 2015 during the 46 th Session of the UN Statistical Commission

HLG Briefly. HLG was established on March 6, 2015 during the 46 th Session of the UN Statistical Commission HLG Briefly Activity of the High-Level Group for Partnership, Coordination and Capacity Building for Statistics for Agenda 030 on Sustainable Development (HLG) HLG was established on March 6, 015 during

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Cybersecurity & Spam after WSIS: How MAAWG can help

Cybersecurity & Spam after WSIS: How MAAWG can help Cybersecurity & Spam after WSIS: How MAAWG can help MAAWG Brussels Meeting 27-29 June 2006 Robert Shaw Deputy Head ITU Strategy and Policy Unit International Telecommunication Union 28 June 2006 1 Setting

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

TELECOMS SERVICES FOR SMALL AND MEDIUM-SIZED ENTERPRISES: WORLDWIDE FORECAST

TELECOMS SERVICES FOR SMALL AND MEDIUM-SIZED ENTERPRISES: WORLDWIDE FORECAST RESEARCH FORECAST REPORT TELECOMS SERVICES FOR SMALL AND MEDIUM-SIZED ENTERPRISES: WORLDWIDE FORECAST 2017 2022 CATHERINE HAMMOND analysysmason.com About this report This report analyses the demand for

More information

Fundamentals of Operating Systems. Fifth Edition

Fundamentals of Operating Systems. Fifth Edition Fundamentals of Operating Systems Fifth Edition Fundamentals of Operating Systems A.M. Lister University of Queensland R. D. Eager University of Kent at Canterbury Fifth Edition Springer Science+Business

More information

Mobile Phone Security and Forensics

Mobile Phone Security and Forensics Mobile Phone Security and Forensics Iosif I. Androulidakis Mobile Phone Security and Forensics A Practical Approach Second Edition Iosif I. Androulidakis Pedini Ioannina Greece ISBN 978-3-319-29741-5

More information

Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited

More information

Internet Governance: Today and Tomorrow

Internet Governance: Today and Tomorrow Internet Governance: Today and Tomorrow Philip Smith Internet Society Board of Trustees APNIC 28 Beijing August 25, 2009 The Internet Society Founded in 1992 by Internet pioneers International non-profit

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Lexical Priming in Spoken English Usage

Lexical Priming in Spoken English Usage Lexical Priming in Spoken English Usage This page intentionally left blank Lexical Priming in Spoken English Usage Michael Pace-Sigge University of Eastern Finland, Finland Michael Pace-Sigge 2013 Softcover

More information

INFORMATION SECURITY FOR MANAGERS

INFORMATION SECURITY FOR MANAGERS INFORMATION SECURITY FOR MANAGERS INFORMATION SECURITY FOR MANAGERS William Caelli Dennis Longley Michael Shain M stockton press Macmillan Publishers Ltd, 1989 Softcover reprint of the hardcover 1st edition

More information

More information from: https://www.wiseguyreports.com/reports/ dry-cleaning-and-laundry-services-global-marketreport-2018-including

More information from: https://www.wiseguyreports.com/reports/ dry-cleaning-and-laundry-services-global-marketreport-2018-including Report Information More information from: https://www.wiseguyreports.com/reports/2947663-dry-cleaning-and-laundry-services-global-marketreport-2018-including Dry-Cleaning And Laundry Services Global Market

More information

Cybercrime and Cybersecurity Issues in the BRICS Economies

Cybercrime and Cybersecurity Issues in the BRICS Economies Cybercrime and Cybersecurity Issues in the BRICS Economies By: Nir Kshetri Kshetri, Nir (2015). Cybercrime and Cybersecurity Issues in the BRICS Economies, Editorial, Journal of Global Information Technology

More information

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 2016 PARTNERSHIP FORUM Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 31 March 2016 Dialogue Two (3:00 p.m. 5:45 p.m.) ECOSOC CHAMBER,

More information

Global Infrastructure Hub Update. G20 Infrastructure Working Group, January 2019

Global Infrastructure Hub Update. G20 Infrastructure Working Group, January 2019 Global Infrastructure Hub Update G20 Infrastructure Working Group, January 2019 IWG Update Introduction Dear IWG members, After a successful 2018, we start 2019 with great enthusiasm, ready to deliver

More information

CIGF Terminology and Concepts. C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U )

CIGF Terminology and Concepts. C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U ) + CIGF Terminology and Concepts C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U ) What We Will Cover Fundamentals IG Actors Common Acronyms Concepts Infrastructure Legal Socio Cultural

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS MOBILE CLOUDS EXPLOITING DISTRIBUTED RESOURCES IN WIRELESS,

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

EU Crisis Management Framework

EU Crisis Management Framework EU Crisis Management Framework Crisis Management and Disaster Response Course 26-27 May 2014, Zagreb Republic of Croatia CMDR COE Chief Expert Elizabetha Bobocheva European External Action Service CONTENT

More information

Digital Forensics - Global Market Outlook ( )

Digital Forensics - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /

More information

OAS Cybersecurity Capacity Building Efforts

OAS Cybersecurity Capacity Building Efforts OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

DEPARTMENT OF LAW NORTH EASTERN HILL UNIVERSITY

DEPARTMENT OF LAW NORTH EASTERN HILL UNIVERSITY NATIONAL SEMINAR ON APRIL 29, 2016 Jointly Organized By DEPARTMENT OF LAW NORTH EASTERN HILL UNIVERSITY and North Eastern Council Ministry of Development of North Eastern Region Government of India BACKGROUND

More information

Electricity Security Assessment Framework

Electricity Security Assessment Framework Electricity Security Assessment Framework Extending the framework beyond borders Matthew Wittenstein ESAP Workshop VII April 28, 2016 Keeping the lights on while transforming the power system Electricity

More information

DOI: / Scandinavian Object Shift and Optimality Theory

DOI: / Scandinavian Object Shift and Optimality Theory DOI: 10.1057/9781137431646.0001 Scandinavian Object Shift and Optimality Theory Also by Eva Engels OPTIMIZING ADVERB POSITIONS Also by Sten Vikner VERB MOVEMENT AND EXPLETIVE SUBJECTS IN THE GERMANIC LANGUAGES

More information

Launched at UNCTAD 14. Nairobi Azimio

Launched at UNCTAD 14. Nairobi Azimio Launched at UNCTAD 14 We welcome the formal unveiling of the etrade for All initiative at UNCTAD XIV. It provides a new approach to trade development through electronic exchanges by allowing developing

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

MULTIMEDIA DATABASE MANAGEMENT SYSTEMS

MULTIMEDIA DATABASE MANAGEMENT SYSTEMS MULTIMEDIA DATABASE MANAGEMENT SYSTEMS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE MULTIMEDIA SYSTEMS AND APPLICATIONS Recently Published Titles: Consulting Editor Borko Furht Florida

More information

Computer Literacy - A Beginners' Guide

Computer Literacy - A Beginners' Guide Computer Literacy - A Beginners' Guide Other Macmillan Books of Related Interest Advanced Graphics with the Acorn Electron Ian O. Angell and Brian J. Jones Advanced Graphics with the BBC Model B Microcomputer

More information

GNSSN. Global Nuclear Safety and Security Network

GNSSN. Global Nuclear Safety and Security Network GNSSN Global Nuclear Safety and Security Network MESSAGE FROM THE DIRECTOR GENERAL 1 Countries must be able to transfer education and training capacity together with the technology they provide. Yukiya

More information

Embedded Tech Trends: Market Insights

Embedded Tech Trends: Market Insights Presentation Embedded Tech Trends: Market Insights ihsmarkit.com Brian Arbuckle, Senior Market Analyst, 0044 (0) 7973 336459, brian.arbuckle@ihsmarkit.com 22 January 2018 Another year on and what has changed?...

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

Regional Consultation on South-South Cooperation in Asia and the Pacific

Regional Consultation on South-South Cooperation in Asia and the Pacific Regional Consultation on South-South Cooperation in Asia and the Pacific Towards Buenos Aires 40 th Anniversary 27-29 June 2018, Bangkok, UNCC Concepts, global processes, state of the South-South Cooperation

More information

A Multi-Stakeholder Approach in the Fight Against Cybercrime

A Multi-Stakeholder Approach in the Fight Against Cybercrime A Multi-Stakeholder Approach in the Fight Against Cybercrime Cybercrime Directorate INTERPOL Global Complex for Innovation Ease of Criminal Use Low Entry Cost Emerging Technology Wide Spread and Huge Impact

More information

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This

More information

Failure-Modes-Based Software Reading

Failure-Modes-Based Software Reading SPRINGER BRIEFS IN COMPUTER SCIENCE Yang-Ming Zhu Failure-Modes-Based Software Reading SpringerBriefs in Computer Science More information about this series at http://www.springer.com/series/10028 Yang-Ming

More information

Current and Emerging Trends in Cyber Operations

Current and Emerging Trends in Cyber Operations Current and Emerging Trends in Cyber Operations Palgrave Macmillan s Studies in Cybercrime and Cybersecurity This book series addresses the urgent need to advance knowledge in the fields of cybercrime

More information

South-South Cooperation:

South-South Cooperation: Special Unit for South-South Cooperation South-South Cooperation: Meeting Development Challenges with Southern Solutions South-South cooperation helps developing countries learn how best to apply successful

More information

Virtual Currencies and The Commonwealth. 1 June 2016

Virtual Currencies and The Commonwealth. 1 June 2016 1 Virtual Currencies and The Commonwealth 1 June 2016 The Commonwealth Cybercrime Initiative Mission CCI aims to provide coherent, comprehensive and sustainable assistance to member states to build capacity

More information

G8 Lyon-Roma Group High Tech Crime Subgroup

G8 Lyon-Roma Group High Tech Crime Subgroup G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies

More information

Overview of recent changes in the International IP interconnection ecosystem

Overview of recent changes in the International IP interconnection ecosystem Presentation for ITU Overview of recent changes in the International IP interconnection ecosystem 23 January 2012 Michael Kende Introduction 2 The Internet is characterized by two underlying trends in

More information

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)] United Nations General Assembly Distr.: General 9 February 2010 Sixty-fourth session Agenda item 50 Resolution adopted by the General Assembly [on the report of the Second Committee (A/64/417)] 64/187.

More information

Sussex Police Business Crime Strategy

Sussex Police Business Crime Strategy Sussex Police Business Crime Strategy 2014-2016 Sussex Police Serving Sussex www.sussex.police.uk Foreword Sussex Police recognise that businesses are a vital part of our local communities and are essential

More information

COMPUTATIONAL DYNAMICS

COMPUTATIONAL DYNAMICS COMPUTATIONAL DYNAMICS THIRD EDITION AHMED A. SHABANA Richard and Loan Hill Professor of Engineering University of Illinois at Chicago A John Wiley and Sons, Ltd., Publication COMPUTATIONAL DYNAMICS COMPUTATIONAL

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Promoting Energy Efficiency Finance: Examples of Tools and Best Practices. 30 November 2017

Promoting Energy Efficiency Finance: Examples of Tools and Best Practices. 30 November 2017 Promoting Energy Efficiency Finance: Examples of Tools and Best Practices 30 November 2017 Some Housekeeping Items Two Options for Audio (select audio mode): 1. Listen through your computer. Please select

More information

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit

More information

Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD

Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD UNESCAP Regional Consultation on e-commerce for Sustainable Development in Asia and the Pacific Bangkok, 30 October 2017 Information Economy

More information

World Summit on the Information Society (WSIS) and the Digital Divide

World Summit on the Information Society (WSIS) and the Digital Divide World Summit on the Information Society (WSIS) and the Digital Divide Dr Tim Kelly, Head, Strategy and Policy Unit International Telecommunication Union KADO/APWINC Digital Opportunity Conference, Seoul,

More information

LIS 665 Lesson Plan Kelly Denzer April 2, 2016

LIS 665 Lesson Plan Kelly Denzer April 2, 2016 LIS 665 Lesson Plan Kelly Denzer April 2, 2016 Introduction: This lesson plan, bibliography, and reflection details the steps I took when researching a brokered convention, a task given to me by my friend

More information

Overview of the latest trends in FDI & focus on Balkan countries. Hugues de Cibon OCO Global, Paris Belgrade March 2015

Overview of the latest trends in FDI & focus on Balkan countries. Hugues de Cibon OCO Global, Paris Belgrade March 2015 Overview of the latest trends in FDI & focus on Balkan countries Hugues de Cibon OCO Global, Paris Belgrade March 2015 Summary Introduction: OCO FDI? FDI trends World trends Focus on Balkan countries 2

More information

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security

More information

National Communications Authority

National Communications Authority National Communications Authority - Press Release The International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence Opens in Accra A three-day International Workshop on Criminal

More information

ISO in the world today

ISO in the world today ISO 27001 in the world today 1 Agenda ISO 27001 worldwide Why ISO 27001 Framework to implement ISO 27001 2 ISO 27001 worldwide Source: ISO Annual Survey 3 ISO 27001 worldwide Number of Certificates Year

More information

CELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS

CELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS analysysmason.com RESEARCH FORECAST REPORT CELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS 2015 2025 MICHELE MACKENZIE Analysys Mason Limited 2016 About this report This report

More information

LPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS

LPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS RESEARCH FORECAST REPORT LPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS 2015 2025 MICHELE MACKENZIE Analysys Mason Limited 2016 analysysmason.com About this report Low-power, wide-area (LPWA) is

More information

We are also organizational home of the Internet Engineering Task Force (IETF), the premier Internet standards-setting body.

We are also organizational home of the Internet Engineering Task Force (IETF), the premier Internet standards-setting body. 1 Founded in 1992, by Internet pioneers The Internet Society is the world's trusted independent source of leadership for Internet policy, technology standards, and future development. More than simply

More information

Systemic Analyser in Network Threats

Systemic Analyser in Network Threats Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication

More information

Trends and Opportunities in the Global Printing Market. Thayer Long President Association for Print Technologies May 2018

Trends and Opportunities in the Global Printing Market. Thayer Long President Association for Print Technologies May 2018 Trends and Opportunities in the Global Printing Market Thayer Long President Association for Print Technologies May 2018 Geographic scope The 26 countries selected and analyzed span across all global regions,

More information

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the

More information

CHAPTER 1 CYBER CRIME A CONCEPTUAL AND THEORETICAL FRAMEWORK

CHAPTER 1 CYBER CRIME A CONCEPTUAL AND THEORETICAL FRAMEWORK page 1 / 5 page 2 / 5 chapter 1 cyber crime pdf 1 Chapter 19 Cyber Laws in India Objectives: This chapter presents the meaning and definition of cyber crime, the legislation in India dealing with offences

More information

ITU-ACMA Asia Pacific Regulators Roundtable July 2014

ITU-ACMA Asia Pacific Regulators Roundtable July 2014 ITU-ACMA Asia Pacific Regulators Roundtable 2014 21-22 July 2014 Session 2: Evolution of the Regulator Addressing International Concerns Content Page Cyber Security Cross-border Data Flow Interoperability

More information

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG Document WSIS-II/PC-3/CONTR/035-E 17 August 2005 Original: English UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG Y:\APP\PDF_SERVER\ALL-USER\IN\COORDUNIT\WGIG-COVER.DOC 17.08.05 17.08.05 www.itu.int/wsis

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

ITU ACTIVITIES IN CAPACITY BUILDING

ITU ACTIVITIES IN CAPACITY BUILDING ITU ACTIVITIES IN CAPACITY BUILDING Eng Mustafa Al Mahdi Associate Programme Officer ARO/BDT-ITU Mustafa-ahmed.al-mahdi@itu.int International Telecommunication Union Presentation outline New CoE Strategy

More information

Legal Foundation and Enforcement: Promoting Cybersecurity

Legal Foundation and Enforcement: Promoting Cybersecurity Legal Foundation and Enforcement: Promoting Cybersecurity Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection February 19, 2008 Mark L. Krotoski Computer

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS Introduction If you re a growing service organization, whether a technology provider, financial services corporation, healthcare company, or professional

More information

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society ECOSOC Resolution 2008/3 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling

More information

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER AMCHAM Background AMCHAM Thailand was formed in 1956 with a membership of 8 American companies and 60 American nationals. Today, AMCHAM has over 650 members, comprising 2,000 executives and professionals.

More information

Global Initiatives in Support of Measurements of SDGs

Global Initiatives in Support of Measurements of SDGs Global Initiatives in Support of Measurements of SDGs UN Statistics division Taking Collective Action to Accelerate Transformation of Official Statistics for Agenda 2030 27 28 March 2017, Bangkok 48 th

More information

Federal Ministry of Budget & National Planning TACKLING NIGERIA'S INFRASTRUCTURE DEFICIT THROUGH PUBLIC PRIVATE PARTNERSHIPS

Federal Ministry of Budget & National Planning TACKLING NIGERIA'S INFRASTRUCTURE DEFICIT THROUGH PUBLIC PRIVATE PARTNERSHIPS Federal Ministry of Budget & National Planning TACKLING NIGERIA'S INFRASTRUCTURE DEFICIT THROUGH PUBLIC PRIVATE PARTNERSHIPS SUMMIT CONVENORS His Excellency Prof. Yemi Osinbajo SAN Vice President, Federal

More information

CISI - International Introduction to Securities & Investment Study Support Training EUROPE MIDDLE EAST & NORTH AFRICA ASIA

CISI - International Introduction to Securities & Investment Study Support Training EUROPE MIDDLE EAST & NORTH AFRICA ASIA CISI - International Introduction to Securities & Investment Study Support Training About ISC & UIC Investment Studies Center (ISC) Contributing to the provision of promising national cadres, capable of

More information

Regional Focus: Asia Pacific - the world's largest mobile phone market

Regional Focus: Asia Pacific - the world's largest mobile phone market Regional Focus: Asia Pacific - the world's largest mobile phone market Euromonitor International 10 March 2010 Asia Pacific has the highest number of mobile phone subscriptions of all world regions, yet

More information

New Syllabus Mathematics for 0-Level 1

New Syllabus Mathematics for 0-Level 1 New Syllabus Mathematics for 0-Level 1 New Syllabus Mathematics for 0-Level 1 New Syllabus Mathematics for 0-Level 2 New Syllabus Mathematics for 0-Levell Owen Perry, B.Sc., Head of Department of General

More information

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change Senate Meeting of April 28, 2010 Graduate Studies Committee Hegis Code: 0502 Program Code: 32786 LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK Department of Economics and Business Curriculum Change

More information

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity. Jane s Defence Industry & Markets Intelligence Centre Develop Advantage. Mitigate Risk. Capture Opportunity. OVERVIEW A challenging marketplace The global A&D industry is facing an increasingly volatile,

More information

MACRO ECONOMIC LANDSCAPE & TECHNOLOGY WORLD

MACRO ECONOMIC LANDSCAPE & TECHNOLOGY WORLD MACRO ECONOMIC LANDSCAPE & TECHNOLOGY WORLD Asia in an international comparison Matthias Hartmann, CEO GfK SE June 2015 1 World Economy & Growth Challenges 2 Slight acceleration in global economic growth:

More information