Cybersecurity Information‐Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Trade‐offs / Elaine Sedenberg and Jim Dempsey -- Cybersecurity Governance in the GCC / James Shires -- The United Kingdom's Emerging Internet of Things (IoT) Policy Landscape / Leonie Maria Tanczer, Irina Brass, Miles Elsden, Madeline Carr, and Jason Blackstock -- Birds of a Feather: Strategies for Collective Cybersecurity in the Aviation Ecosystem / Emilian Papadopoulos and Evan Sills -- An Incident‐Based Conceptualization of Cybersecurity Governance / Jacqueline Eggenschwiler -- Cyber Governance and the Financial Services Sector: The Role of Public-Private Partnerships / Valeria San Juan and Aaron Martin -- The Regulation of Botnets: How Does Cybersecurity Governance Theory Work When Everyone Is a Stakeholder? / Samantha A. Adams, Karine e Silva, Bert‐Jaap Koops, and Bart van der Sloot -- Governing Risk: The Emergence of Cyber Insurance / Trey Herr -- Containing Conficker: A Public Health Approach / Michael Thornton -- Bug Bounty Programs: Institutional Variation and the Different Meanings of Security / Andreas Kuehn and Ryan Ellis -- Rethinking Data, Geography, and Jurisdiction: A Common Framework for Harmonizing Global Data Flow Controls / Jonah Force Hill and Matthew Noyes -- Private Ordering Shaping Cybersecurity Policy: The Case of Bug Bounties / Amit Elazari Bar On
0
Through twelve detailed case studies, this superb collection provides an overview of the ways in which government officials and corporate leaders across the globe are responding to the challenges of cybersecurity. Drawing perspectives from industry, government, and academia, the book incisively analyzes the actual issues, and provides a guide to the continually evolving cybersecurity ecosystem. It charts the role that corporations, policymakers, and technologists are playing in defining the contours of our digital world. Rewired: Cybersecurity Governance places great emphasis on the interconnection of law, policy, and technology in cyberspace. It examines some of the competing organizational efforts and institutions that are attempting to secure cyberspace and considers the broader implications of the in-place and unfolding efforts-tracing how different notions of cybersecurity are deployed and built into stable routines and practices. Ultimately, the book explores the core tensions that sit at the center of cybersecurity efforts, highlighting the ways in which debates about cybersecurity are often inevitably about much more. -- Provided by publisher.