Open Access   Article Go Back

Cybersecurity in Developing World towards Excellency by 2026 – Opportunities, Policies

N. Satheesh Kumar1 , Zelalem Mihret2

  1. 1. Dept. Of Computing, Adama Science and Technology, Adama, Ethiopia.
  2. 1. Dept. Of Computing, Adama Science and Technology, Adama, Ethiopia.

Correspondence should be addressed to: satish4info@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-6 , Page no. 42-48, Jun-2017

Online published on Jun 30, 2017

Copyright © N. Satheesh Kumar, Zelalem Mihret . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N. Satheesh Kumar, Zelalem Mihret, “Cybersecurity in Developing World towards Excellency by 2026 – Opportunities, Policies,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.42-48, 2017.

MLA Style Citation: N. Satheesh Kumar, Zelalem Mihret "Cybersecurity in Developing World towards Excellency by 2026 – Opportunities, Policies." International Journal of Computer Sciences and Engineering 5.6 (2017): 42-48.

APA Style Citation: N. Satheesh Kumar, Zelalem Mihret, (2017). Cybersecurity in Developing World towards Excellency by 2026 – Opportunities, Policies. International Journal of Computer Sciences and Engineering, 5(6), 42-48.

BibTex Style Citation:
@article{Kumar_2017,
author = {N. Satheesh Kumar, Zelalem Mihret},
title = {Cybersecurity in Developing World towards Excellency by 2026 – Opportunities, Policies},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {6},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {42-48},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1301},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1301
TI - Cybersecurity in Developing World towards Excellency by 2026 – Opportunities, Policies
T2 - International Journal of Computer Sciences and Engineering
AU - N. Satheesh Kumar, Zelalem Mihret
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 42-48
IS - 6
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
684 662 downloads 564 downloads
  
  
           

Abstract

Information and communication technology (ICT) is playing a major role in the development of socio economic related issues. Some countries in the globe have taken advantage with the effectiveness of ICT, Cyberspace and are in the process of transforming their economies into knowledge and information based economies. These benefits are being challenged by the increasing cyber threats where there is no global conscious on how to regulate cyberspace even through several countries having their own cyber security policies but without proper measures. The current setup of the internet enables developing countries to work together as a global village. The goal of this paper are to help policy makers, businesses, and societal organizations to better prepare for the technological changes ahead and enable all stakeholders to consider how present day policy choices might influence future outcome. In our paper we propose cybersecurity 2026 model along with methodology which concentrate on the several components to form a framework for trust and online security.

Key-Words / Index Term

Cyberspace, ICT, Stakeholders, Cybersecurity Model 2026.

References

[1]. James Manyika, Michael Chui, Jacques Bughin, “Disruptive Technologies: Advances that will transform life, Business and Global Economy, McKinsey”, Global Institute, May 2013.
[2]. R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville, “Future directions for behavioral information security research,” Computers & Security, vol. 32, pp. 90–101, Feb. 2013.
[3]. Greenwald G, MacAskill E., “Boundless Informant: the NSA’s secret tool to track global surveillance data”, The Guardian. 2013 Jun 11;11.
[1]. Cavely, M.D.(2014) Breaking the Cyber Security Dilemma: Aligning Security needs nad Removing Vulnerabilities( Springer Science)
[2]. Laukka, M(2010). "Criteria for privacy support system". Proceedings of the 5th Nordic Workshop on secure IT systems, Raykjavik, Iceland, Oct 12-13.
[3]. DeGusta, Michael. "Are smart phones spreading faster than any technology in human history." Massachusetts Institute of Technology Review (2012). APA
[4]. Manyika J, Bughin J, Lund S, Nottebohm O, Poulter D, Jauch S, Ramaswamy S., “Global flows in a digital age: How trade, finance, people, and data connect the world economy”. McKinsey Global Institute; 2014.
[5]. S.Jayasri, D.Karthika, "Microcontroller Based Traffic and Road Condition Monitoring Alert System Using Internet of Things", International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.272-279, 2016.
[6]. United States. “White House Office, and Barack Obama. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked Worldr”. White House, 2011. APA
[7]. Gwartney, James, Robert Lawson, and Seth Norton. “Economic freedom of the world 2008 annual report”. The Fraser Institute, 2008. APA
[8]. Organisation for Economic Co-operation and Development (OECD). Better skills, better jobs, better lives: a strategic approach to skills policies. OECD, 2012. APA
[9]. The UK Cyber Security Strategy, 2011, https://www.gov.uk/government/uploads/system/uploads/ attachment_data/file/60961/uk-cyber-security-agency-prism-outline-lyrics#lyric