352
Views
1
CrossRef citations to date
0
Altmetric
Article

An integrated complex adaptive governmental policy response to cyberthreats

&
Pages 283-297 | Received 13 Apr 2020, Accepted 13 Sep 2022, Published online: 21 Sep 2022
 

ABSTRACT

This article analyzes the policy options available to governments for addressing the very costly economic impacts of cybersecurity threats. It contributes to complexity thinking in public policy. Complexity involves self-organization, emergence, feedback loops, and adaptation. We show that these are present with cyberthreats. In contrast to plans that involve a series of linear steps to a specific outcome, complexity thinking recommends adaptive design, which creates processes that involve coordinated decentralized capacity for experimentation and resilience. These are illustrated with an examination of the 2007 nation-wide cyberattack on Estonia and the lessons learned from this attack.

Acknowledgements

This is an extensively revised version of a paper prepared for a workshop on disruptive technologies at Lee Kuan Yew School of Public Policy, National University of Singapore, 30–31 August 2019. Comments on that paper from workshop participants are gratefully acknowledged, as is research assistance by Jessica Gut. This paper draws on our co-authored papers presented at the European Group for Public Administration conference in Lausanne, September 2018, and the International Studies Association annual meeting in Toronto, March 2019. This version has benefitted greatly from comments at these conferences and from this journal’s anonymous referees.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

This research was supported by funding from Social Sciences and Humanities Research Council of Canada, grant #435-2016-527.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.