Cyber law and cyber security in developing and emerging economies / Zeinab Karake Shalhoub and Sheikha Lubna Al Qasimi.
2010
K564.C6 K368 2010 (Map It)
Available at Cellar
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Author
Title
Cyber law and cyber security in developing and emerging economies / Zeinab Karake Shalhoub and Sheikha Lubna Al Qasimi.
Published
Cheltenham, UK ; Northampton, MA : Edward Elgar, [2010]
Copyright
©2010
Call Number
K564.C6 K368 2010
ISBN
9781845428716 (hbk. : alk. paper)
1845428714 (hbk. : alk. paper)
9781849803380 (e-book)
1849803382 (e-book)
1845428714 (hbk. : alk. paper)
9781849803380 (e-book)
1849803382 (e-book)
Description
v, 239 pages ; 24 cm
System Control No.
(OCoLC)461278682
Summary
"This book illuminates the impact of cyber law on the growth and development of emerging and developing economies. Using a strong theoretical framework firmly grounded in resource-based and technology diffusion literature, the authors convey a subtle understanding of the ways public and private sector entities in developing and emerging countries adopt cyber space processes." "The diffusion of cyber activities in developing and emerging economies is relatively low, with the main stumbling blocks resting in regulatory, cultural, and social factors. Cyber crimes constitute a prime obstacle to the diffusion of e-commerce and e-governments in developing economies, and governments have an important role in developing control mechanisms in the form of laws. However, setting appropriate policies and complementary services, particularly those affecting the telecommunications sector and other infrastructure, human capital and the investment environment, severely constrains Internet access. Using both strategic and operational perspectives, the authors discuss the concrete experience of constructing and implementing cyber laws and cyber security measures in developing and emerging countries, and analyse their content and appropriateness."--BOOK JACKET.
Bibliography, etc. Note
Includes bibliographical references and index.
Record Appears in
Gift
Purchased from the income of the Silver Fund
Added Author
Gift

The Arthur W. Diamond Law Library
Purchased from the income of the Silver Fund
Table of Contents
1.
Establishing the context
1
2.
Security and trust in cyber space
30
3.
Resource-based view and theory
82
4.
Methodology and development of hypotheses
127
5.
Data collection and empirical results
169
6.
Conclusion, recommendations, and future research
213
Index
237