354
Views
1
CrossRef citations to date
0
Altmetric
Article

An integrated complex adaptive governmental policy response to cyberthreats

&
Pages 283-297 | Received 13 Apr 2020, Accepted 13 Sep 2022, Published online: 21 Sep 2022

References

  • Abbott, K. W., P. Genschel, D. Snidal, and B. Zangl. 2016. “Two Logics of Indirect Governance: Delegation and Orchestration.” British Journal of Political Science 46 (4): 719–729. doi:10.1017/S0007123414000593.
  • Abbott, K. W., and D. Snidal. 2009. “ Strengthening International Regulation Through Transnational New Governance: Overcoming the Orchestration Deficit .” Vanderbilt Journal of Transnational Law 42 (2): 501–578.
  • Alter, K. J., and K. Raustiala. 2018. “The Rise of International Regime Complexity.” Annual Review of Law and Social Science 14 (1): 329–349. doi:10.1146/annurev-lawsocsci-101317-030830.
  • Andress, J., and S. Winterfeld. 2013. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Waltham MA: Elsevier.
  • Armstrong, R. C., and J. R. Mayo. 2009. “Leveraging Complexity in Software for Cybersecurity.” In CSIIRW ’09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. Oak Ridge Tennessee: Association for Computing Machinery. 10.1145/1558607.1558643.
  • Aro, J. 2016. “The Cyberspace War: Propaganda and Trolling as Warfare Tools.” European View 15 (1): 121–132. doi:10.1007/s12290-016-0395-5.
  • Backman, S. 2021. “Conceptualizing Cyber Crises.” Journal of Contingencies and Crisis Management 29 (4): 429–438. doi:10.1111/1468-5973.12347.
  • Basel Committee on Banking Supervision. 2018. Regulatory Consistency Assessment Programme (RCAP) Handbook for Jurisdictional Assessments. Basel, Switzerland: Bank for International Settlements. https://www.bis.org/bcbs/publ/d434.pdf
  • Beck, K., M. Beedle, A. van Bennekum, A. Cockburn, W. Cunningham, M. Fowler, J. Grenning, et al. 2001. “Principles behind the Agile Manifesto .” . https://agilemanifesto.org/principles.html
  • Beck, U., A. Giddens, and S. Lash. 1994. Reflexive Modernization: Politics, Tradition and Aesthetics in the Modern Social Order. Stanford, Calif: Stanford University Press.
  • Black, J. 2008. “Constructing and Contesting Legitimacy and Accountability in Polycentric Regulatory Regimes.” Regulation & Governance 2 (2): 137–164. doi:10.1111/j.1748-5991.2008.00034.x.
  • Boons, F., A. van Buuren, L. Gerrits, and G. R. Teisman. 2009. “Towards an Approach of Evolutionary Public Management”. In Managing Complex Governance Systems: Dynamics, Self-Organization and Coevolution in Public Investments. G. Teisman, A. van Buuren, and L. Gerrits edited by. Vol. 3, 231–249.Routledge Critical Studies in Public Management New York ; London:Routledge.
  • Bousquet, A., and S. Curtis. 2011. “Beyond Models and Metaphors: Complexity Theory, Systems Thinking and International Relations.” Cambridge Review of International Affairs 24 (1): 43–62. doi:10.1080/09557571.2011.558054.
  • Brass, I., and J. H. Sowell. 2020. “Adaptive Governance for the Internet of Things: Coping with Emerging Security Risks.” Regulation & Governance rego: 12343. doi:10.1111/rego.12343. July.
  • Brown, T. 2008. “Design Thinking.” Harvard Business Review 86 (6): 84–92.
  • Bueger, C. 2018. “Territory, Authority, Expertise: Global Governance and the Counter-Piracy Assemblage.” European Journal of International Relations 24 (3): 614–637. doi:10.1177/1354066117725155.
  • Buijs, J.-M., J. Eshuis, and D. Byrne. 2009. “Approaches to Researching Complexity in Public Management”. In Managing Complex Governance Systems: Dynamics, Self-Organization and Coevolution in Public Investments. G. Teisman, A. van Buuren, and L. Gerrits edited by. Vol. 3, 213–230.Routledge Critical Studies in Public Management New York ; London:Routledge.
  • Capano, G., and J. Jie Woo. 2017. “Resilience and Robustness in Policy Design: A Critical Appraisal.” Policy Sciences 50 (3): 399–426. doi:10.1007/s11077-016-9273-x.
  • Cardon, E. 2022. “Fighting Alone Is Called Losing: The Unlearned Lessons of Fragmented Systems.” Cyber Defense Review 7 (1): 75–82.
  • Chandler, D. 2014. In  Resilience: The Governance of Complexity. New York, NY: Routledge .
  • Cohen, J. E. 2019. Between Truth and Power: The Legal Constructions of Informational Capitalism. New York, NY: Oxford University Press.
  • Colander, D. C., and R. Kupers. 2016. Complexity and the Art of Public Policy: Solving Society’s Problems from the Bottom Up. Princeton Oxford: Princeton University Press.
  • Cordella, A., and A. Paletti. 2019. “Government as a Platform, Orchestration, and Public Value Creation: The Italian Case.” Government Information Quarterly 36 (4): 101409. doi:10.1016/j.giq.2019.101409.
  • Council of Europe. 2022. “Chart of Signatures and Ratifications of Treaty 185.” Council of Europe Treaty Office. 2 March 2022. https://www.coe.int/en/web/conventions/full-list?module=signatures-by-treaty&treatynum=185
  • Crandall, M. 2014. “Soft Security Threats and Small States: The Case of Estonia.” Defence Studies 14 (1): 30–55. doi:10.1080/14702436.2014.890334.
  • Crandall, M., and C. Allan. 2015. “Small States and Big Ideas: Estonia’s Battle for Cybersecurity Norms.” Contemporary Security Policy 36 (2): 346–368. doi:10.1080/13523260.2015.1061765.
  • Crowley, K., J. Stewart, A. Kay, and B. William Head. 2020. Reconsidering Policy: Complexity, Governance and the State. Bristol, UK Chicago, IL, USA: Policy Press.
  • DeBúrca, G., R. O. Keohane, and C. Sabel. 2014. “Global Experimentalist Governance.” British Journal of Political Science 44 (3): 477–486. doi:10.1017/S0007123414000076.
  • Diamond, L. 2010. “Liberation Technology.” Journal of Democracy 21 (3): 69–83. doi:10.1353/jod.0.0190.
  • Dudley, R., and D. Golden. 2021. “The Colonial Pipeline Ransomware Hackers Had a Secret Weapon: Self-Promoting Cybersecurity Firms.” MIT Technology Review and ProPublica May. https://www.technologyreview.com/2021/05/24/1025195/colonial-pipeline-ransomware-bitdefender
  • Estonian Defence League. 2022. “Estonian Defence League’s Cyber Unit.” Kaitseliit. 2 March 2022. https://www.kaitseliit.ee/en/cyber-unit
  • Feldstein, S. 2019. “The Road to Digital Unfreedom: How Artificial Intelligence Is Reshaping Repression.” Journal of Democracy 30 (1): 40–52. doi:10.1353/jod.2019.0003.
  • Ferguson, N. 2018. The Square and the Tower: Networks and Power, from the Freemasons to Facebook. New York: Penguin Press, an imprint of Penguin Random House LLC.
  • Finnemore, M., and D. B. Hollis. 2016. “Constructing Norms for Global Cybersecurity.” American Journal of International Law 110 (3): 425–479. doi:10.1017/S0002930000016894.
  • GFCE. 2022. “About the GFCE.” GFCE 2022. https://thegfce.org/about-the-gfce/
  • Ginosar, A. 2013. “Co-Regulation: From Lip-Service to a Genuine Collaboration — The Case of Regulating Broadcast Advertising in Israel.” Journal of Information Policy 3: 104–122. doi:10.5325/jinfopoli.3.2013.0104.
  • GOV.UK. 2022. “Government as a Platform.” Government Digital Service (blog) 9 March 2022. https://gds.blog.gov.uk/category/government-as-a-platform/
  • Gunningham, N. 2012. “Regulatory Reform and Reflexive Regulation: Beyond Command and Control.” In Reflexive Governance for Global Public Goods, edited by E. Brousseau, T. Dedeurwaerdere, and B. Siebenhüner, 85–104. Cambridge MA: MIT Press.
  • Howard, P. N. 2015. Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up. New Haven : London: Yale University Press.
  • IBM Security. 2021a. “Cost of a Data Breach Report 2021.” Armonk NY: IBM. https://www.ibm.com/security/data-breach
  • IBM Security. 2021b. “X-Force Threat Intelligence Index 2021.” https://www.ibm.com/security/threat-intelligence
  • International Telecommunication Union. 2021. Global Cybersecurity Index 2020. Geneva: International Telecommunication Union.
  • Jayakumar, S. 2020. “Cyber Attacks by Terrorists and Other Malevolent Actors: Prevention and Preparedness.” In Handbook of Terrorism Prevention and Preparedness, edited by A. P. Schmidt, 871–930. The Hague: International Centre for Counter-Terrorism Press.
  • Joseph, J. 2013. “Resilience as Embedded Neoliberalism: A Governmentality Approach.” Resilience 1 (1): 38–52. doi:10.1080/21693293.2013.765741.
  • Kooiman, J. 2003. Governing as Governance. London ; Thousand Oaks, Calif: SAGE.
  • Koppenjan, J. F. M., and E.-H. Klijn. 2004. Managing Uncertainties in Networks: A Network Approach to Problem Solving and Decision Making. London ; New York: Routledge.
  • Kreienkamp, J., and T. Pegram. 2020.“Governing Complexity: Design Principles for the Governance of Complex Global Catastrophic Risks.” International Studies Review, October. doi:10.1093/isr/viaa074.
  • Krisch, N. 2017. “Liquid Authority in Global Governance.” International Theory 9 (2): 237–260. doi:10.1017/S1752971916000269.
  • Larner, W., and W. Walters. 2006. Global Governmentality: Governing International Spaces. London: Routledge.
  • Leveson, N. G. 2012. In Engineering a Safer World: Systems Thinking Applied to Safety. Cambridge, MA: MIT Press.
  • Levi-Faur, D. 2005. “The Global Diffusion of Regulatory Capitalism.” The ANNALS of the American Academy of Political and Social Science 598 (1): 12–32. doi:10.1177/0002716204272371.
  • Lewallen, J. 2021. “Emerging Technologies and Problem Definition Uncertainty: The Case of Cybersecurity.” Regulation & Governance 15 (4): 1035–1052. doi:10.1111/rego.12341.
  • Liedtka, J. 2018. “Why Design Thinking Works.” Harvard Business Review 96 (5): 72–79.
  • Lindsay, J., and E. Gartzke. 2017. “Cybersecurity and Cross-Domain Deterrence: The Consequences of Complexity”. In US National Cybersecurity: International Politics, Concepts and Organization, edited by, D. Van Puyvelde and A. F. Brantly. 11–27. London ; New York: Routledge, Taylor & Francis Group. Routledge Studies in Conflict, Security and Technology
  • Małecka, A. 2021. “Nation-State Cyber Operations Legal Considerations: An Estonian Case Study.” Safety & Defense 7 (3): 99–108.
  • Mansfield-Devine, S. 2012. “Estonia: What Doesn’t Kill You Makes You Stronger.” Network Security 7 (July): 12–20.
  • Margetts, H., and A. Naumann. 2017. In Government as a Platform: What can Estonia Show the World?. Oxford: Centre for Technology & Global Affairs, University of Oxford. https://www.politics.ox.ac.uk/materials/publications/16061/government-as-a-platform.pdf
  • Marsden, C. T. 2008. “Beyond Europe: The Internet, Regulation, and Multistakeholder Governance—Representing the Consumer Interest?” Journal of Consumer Policy; Dordrecht 31 (1): 115–132. doi:10.1007/s10603-007-9056-z.
  • Mergel, I., S. Ganapati, and A. B. Whitford. 2021. “Agile: A New Way of Governing.” Public Administration Review 81 (1): 161–165. doi:10.1111/puar.13202.
  • Mergel, I., Y. Gong, and J. Bertot. 2018. “Agile Government: Systematic Literature Review and Future Research.” Government Information Quarterly, Agile Government and Adaptive Governance in the Public Sector 35 (2): 291–298. doi:10.1016/j.giq.2018.04.003.
  • Morgan, S. 2020. “Global Cybercrime Damages Predicted To Reach $6 Trillion Annually By 2021.” Cybercrime Magazine 9 November 2020. https://cybersecurityventures.com/annual-cybercrime-report-2020/
  • National Institute of Standards and Technology. 2021. “Compliance with Cybersecurity and Privacy Laws and Regulations.” NIST. 4 August 2021. https://www.nist.gov/mep/cybersecurity-resources-manufacturers/compliance-cybersecurity-and-privacy-laws-and-regulations
  • NATO Cooperative Cyber Defence Centre of Excellence. 2022a. “History.” CCDOE 2022. https://ccdcoe.org/about-us/
  • NATO Cooperative Cyber Defence Centre of Excellence. 2022b. “Locked Shields.” CCDOE 2022. https://ccdcoe.org/exercises/locked-shields/
  • Nye, J. S., Jr. 2016. “The Regime Complex for Managing Global Cyber Activities Global Commission on Internet Governance.” In Who Runs the Internet? The Global Multi-Stakeholder Model of Internet Governance: Research, 6–15. Vol. 2. Waterloo and London: Centre for International Governance Innovation and the Royal Institute of International Affairs.
  • OECD. 2018. Adapting to Technological and Societal Disruption. Paris: Technology and Innovation Outlook. Organization for Economic Cooperation and Development: Organization for Economic Cooperation and Development. OECD Science.
  • Ong, A.-H. 2007. Global Assemblages Technology, Politics, and Ethics as Anthropological Problems. Malden, Mass: Blackwell.
  • Orsini, A., P. Le Prestre, P. M. Haas, M. Brosig, P. Pattberg, O. Widerberg, L. Gomez-Mera, et al. 2020. “Forum: Complex Systems and International Governance.” International Studies Review 22 (4): 1008–1038. doi:10.1093/isr/viz005.
  • Osborne, D., and T. Gaebler. 1992. Reinventing Government: How the Entrepreneurial Spirit Is Transforming the Public Sector. New York, N.Y: Plume.
  • Paris Call. 2018. “Paris Call for Trust and Security in Cyberspace.” . 9 March 2022. https://pariscall.international/en/
  • Pollitt, C. 2009. “Complexity Theory and Evolutionary Public Administration: A Sceptical Afterword”. In Managing Complex Governance Systems: Dynamics, Self-Organization and Coevolution in Public Investments. G. Teisman, A. van Buuren, and L. Gerrits edited by. Vol. 3, 213–230.Routledge Critical Studies in Public Management New York ; London:Routledge.
  • Red Canary. 2021. “.” 2021 Threat Detection Report. https://redcanary.com/threat-detection-report/
  • Republic of Estonia. 2019. “Cybersecurity Strategy 2019-2022.” https://www.mkm.ee/sites/default/files/kyberturvalisuse_strateegia_2022_eng.pdf
  • Ruggie, J. G. 2014. “Global Governance and ‘New Governance Theory’: Lessons from Business and Human Rights.” Global Governance: A Review of Multilateralism and International Organizations 20 (1): 5–17. doi:10.1163/19426720-02001002.
  • Ruiz, M. M. 2018. ““Is Estonia’s Approach to Cyber Defense Feasible in the United States?”.” War on the Rocks 9. January:https://warontherocks.com/2018/01/estonias-approach-cyber-defense-feasible-united-states/
  • Ruiz, M. M. 2020. “To Bolster Cybersecurity, the US Should Look to Estonia.” Wired, 14 February 2020. https://www.wired.com/story/opinion-to-bolster-cybersecurity-the-us-should-look-to-estonia/
  • Sassen, S. 2009. Territory, Authority, Rights: From Medieval to Global Assemblages. Princeton: Princeton University Press. http://public.eblib.com/choice/publicfullrecord.aspx?p=457903
  • Slaughter, A.-M. 2017. The Chessboard and the Web: Strategies of Connection in a Networked World. The Henry L. Stimson Lectures Series. New Haven: Yale University Press. https://www.amazon.ca/Chessboard-Web-Strategies-Connection-Networked/dp/0300215649
  • Tallinn University of Technology. 2022. “MSc in Cybersecurity.” TALTECH. 2 March 2022. https://taltech.ee/en/cyber-msc
  • Talmazan, Y. 2019. “Data Security Meets Diplomacy: Why Estonia Is Storing Its Data in Luxembourg.” NBC News. 25 June 2019. https://www.nbcnews.com/news/world/data-security-meets-diplomacy-why-estonia-storing-its-data-luxembourg-n1018171
  • Teisman, G., A. van Buuren, and L. Gerrits, edited by. 2009. In  Managing Complex Governance Systems: Dynamics, Self-Organization and Coevolution in Public Investments. Routledge Critical Studies in Public Management. New York ; London: Routledge.
  • Temple-Raston, D. 2021. “A ‘Worst Nightmare’ Cyberattack: The Untold Story of the SolarWinds Hack.” NPR. 16 April 2021. https://www.npr.org/2021/04/16/985439655/a-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hack
  • Tikk, E. 2021. “The Leaps and Bounds of E-Estonia.” Media Development 2 (May): 29–32.
  • Tisdale, S. M. 2015. “Cybersecurity: Challenges from a Systems, Complexity, Knowledge Management and Business Intelligence Perspectrive.” Issues in Information Systems 16 (III): 191–198.
  • Winickoff, D. E., and S. M. Pfotenhauer. 2018. “Technology Governance and the Innovation Process OECD,.” In OECD Science, Technology and Innovation Outlook 2018: Adapting to Technological and Societal Disruption, 221–240. Paris, France: OECD Publishing
  • Xu, S. 2014. “Emergent Behavior in Cybersecurity.” In HotSoS ’14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. Raleigh North Carolina: Association for Computing Machinery. 10.1145/2600176.2600189.
  • Zeitlin, J., ed. 2015. Extending Experimentalist Governance? The European Union and Transnational Regulation. First ed. Oxford, United Kingdom: Oxford University Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.