367
Views
0
CrossRef citations to date
0
Altmetric
ARTICLES

Industrial policy and governments’ cybersecurity capacity: a tale of two developments?

ORCID Icon
Pages 194-212 | Received 01 Jun 2021, Accepted 25 Mar 2022, Published online: 04 May 2022

References

  • Aggarwal, V. K., and A. W. Reddie. 2018a. “Comparative Industrial Policy and Cybersecurity: A Framework for Analysis.” Journal of Cyber Policy 3 (3): 291–305. doi:10.1080/23738871.2018.1553989.
  • Aggarwal, V. K., and A. W. Reddie. 2018b. “Comparative Industrial Policy and Cybersecurity: The US Case.” Journal of Cyber Policy 3 (3): 445–466. doi:10.1080/23738871.2018.1551910.
  • Aggarwal, V. K., and A. W. Reddie. 2020. “New Economic Statecraft: Industrial Policy in an Era of Strategic Competition.” Issues & Studies 56 (02): 2040006. doi:10.1142/S1013251120400068.
  • Aguilar Antonio, J. M. 2020. “La Brecha de Ciberseguridad en América Latina Frente al Contexto Global de Ciberamenazas.” Revista de Estudios en Seguridad Internacional 6 (2): 17–43.
  • Aguilar Antonio, J. M. 2021. “Retos y Oportunidades en Materia de Ciberseguridad de América Latina Frente al Contexto Global de Ciberamenazas a la Seguridad Nacional y Política Exterior.” Estudios Internacionales 53 (198): 169–197.
  • Aiginger, K., and D. Rodrik. 2020. “Rebirth of Industrial Policy and an Agenda for the Twenty-First Century.” Journal of Industry, Competition and Trade, 1–19. doi:10.1007/s10842-019-00322-3.
  • Andreoni, A., and F. Tregenna. 2020. “Escaping the Middle-Income Technology Trap: A Comparative Analysis of Industrial Policies in China, Brazil and South Africa.” Structural Change and Economic Dynamics 54: 324–340.
  • Asghari, H., M. Ciere, and M. J. G. van Eeten. 2015. “Post-Mortem of a Zombie: Conficker Cleanup After Six Years.” Proceedings of the 24th USENIX conference on security symposium,Washington, D.C., August 12–14, 1–16.
  • Bergsteiner, H., and G. C. Avery. 2019. “Misleading Country Rankings Perpetuate Destructive Business Practices.” Journal of Business Ethics 159 (3): 863–881.
  • Block, F. 2008. “Swimming Against the Current: The Rise of a Hidden Developmental State in the United States.” Politics & Society 36 (2): 169–206. doi:10.1177/0032329208318731.
  • Calderaro, A., and A. J. Craig. 2020. “Transnational Governance of Cybersecurity: Policy Challenges and Global Inequalities in Cyber Capacity Building.” Third World Quarterly 41 (6): 917–938.
  • Carr, M. 2016. “Public–Private Partnerships in National Cyber-Security Strategies.” International Affairs 92 (1): 43–62.
  • Chang, H. J., and A. Andreoni. 2020. “Industrial Policy in the 21st Century.” Development and Change 51 (2): 324–351. doi:10.1111/dech.12570.
  • Cheung, T. M. 2018. “The Rise of China as a Cybersecurity Industrial Power: Balancing National Security, Geopolitical, and Development Priorities.” Journal of Cyber Policy 3 (3): 306–326. doi:10.1080/23738871.2018.1556720.
  • Creese, S., W. H. Dutton, P. Esteve-González, and R. Shillair. 2021. “Cybersecurity Capacity-Building: Cross-National Benefits and International Divides.” Journal of Cyber Policy 6 (2): 214–235. doi:10.1080/23738871.2021.1979617.
  • e-Governance Academy. 2020. National Cyber Security Index. Available at: https://ncsi.ega.ee/.
  • Forero-Pineda, C. 2006. “The Impact of Stronger Intellectual Property Rights on Science and Technology in Developing Countries.” Research Policy 35 (6): 808–824.
  • Gerring, J. 2011. Social Science Methodology: A Unified Framework. Cambridge University Press: Cambridge.
  • Gierow, H. J. 2015. “Cyber Security in China: Internet Security, Protectionism and Competitiveness: New Challenges to Western Businesses.” Mercator Institute for China Studies 22: 1–10.
  • Haworth, J. 2021. “Africa Sees Increase in Ransomware, Botnet Attacks – but Online Scams Still Pose Biggest Threat.” Available at: https://portswigger.net/daily-swig/africa-sees-increase-in-ransomware-botnet-attacks-but-online-scams-still-pose-biggest-threat.
  • Hoffmann, S., S. Bradshaw, and E. Taylor. 2019. “Networks and Geopolitics: How Great Power Rivalries Infected 5G.” Oxford Information Labs 22: 4.
  • Hoffmann, S., D. Lazanski, and E. Taylor. 2020. “Standardising the Splinternet: How China’s Technical Standards Could Fragment the Internet.” Journal of Cyber Policy 5 (2): 239–264. doi:10.1080/23738871.2020.1805482.
  • Inter-American Development Bank. 2020. Cybersecurity: Risks, Progress, and the Way Forward for Latin America and the Caribbean. Santiago: IADB.
  • International Telecommunication Union (ITU). 2020. Global Cybersecurity Index. Available at: https://www.itu.int/en/ITU-D/Cybersecurity/Pages/global-cybersecurity-index.aspx.
  • International Trade Center. 2021. Trade Competitiveness Map. Available at: https://tradecompetitivenessmap.intracen.org/TPIC.aspx.
  • Janvry, A. D., and E. Sadoulet. 2000. “Growth, Poverty, and Inequality in Latin America: A Causal Analysis, 1970–94.” Review of Income and Wealth 46 (3): 267–287.
  • Johnson, C. 1982. MITI and the Japanese Miracle: The Growth of Industrial Policy, 1925-1975. Redwood City, CA: Stanford University Press.
  • Kelion, L. 2020. “EU Reveals Plan to Regulate Big Tech.” BBC News. Available at: https://www.bbc.com/news/technology-55318225 Accessed: 08 March 2021.
  • Korinek, A., and J. E. Stiglitz. 2021. Artificial Intelligence, Globalization, and Strategies for Economic Development (No. w28453). National Bureau of Economic Research.
  • Krugman, P. R., and M. Obstfeld. 2001. International Economics: Theory and Policy. London: Pearson Education.
  • Kshetri, N. 2016. “Cybersecurity and Development.” Markets, Globalization & Development Review 1 (2): 1–20. doi:10.23860/MGDR-2016-01-02-03.
  • Kurtz, M. J., and S. M. Brooks. 2008. “Embedding Neoliberal Reform in Latin America.” World Politics 60 (2): 231–280.
  • Landes, D. S. 2003. The Unbound Prometheus: Technological Change and Industrial Development in Western Europe from 1750 to the Present. Cambridge University Press: Cambridge.
  • List, F. 1827. “Outlines of American Political Economy.” In Life of Friedrich List and Selections from his Writings, edited by M. Hirst, 147–272. London: Smith, Elder & Co.
  • Makridis, C. A., and M. Smeets. 2019. “Determinants of Cyber Readiness.” Journal of Cyber Policy 4 (1): 72–89. doi:10.1080/23738871.2019.1604781.
  • Mazzucato, M. 2011. The Entrepreneurial State. London: Demos.
  • Nightingale, P. 2004. “Technological Capabilities, Invisible Infrastructure and the Un-Social Construction of Predictability: The Overlooked Fixed Costs of Useful Research.” Research Policy 33 (9): 1259–1284.
  • Peneder, M. 2017. “Competitiveness and Industrial Policy: From Rationalities of Failure Towards the Ability to Evolve.” Cambridge Journal of Economics 41 (3): 829–858. doi:10.1093/cje/bew025.
  • Pollock, P. H. 2008. The Essentials of Political Analysis. Washington, DC: CQ Press.
  • Saeed, M., and S. Osakwe. 2021. Are African Countries Doing Enough to Ensure Cybersecurity and Internet Safety? Available at: https://www.itu.int/en/myitu/News/2021/09/01/06/54/Are-African-countries-doing-enough-to-ensure-cybersecurity-and-Internet-safety.
  • Sanger, D., J. E. Barnes, and N. Perlroth. 2021. “Preparing for Retaliation Against Russia, U.S. Confronts Hacking by China.” New York Times, March 7. Accessed 28 May 2021. https://www.nytimes.com/2021/03/07/us/politics/microsoft-solarwinds-hack-russiachina.html?campaign_id=9&emc=edit_nn_20210307&instance_id=27836&nl=themorning&regi_id=106290854&segment_id=52986&te=1&user_id=360007056ebfce4342b603e79fe47720.
  • Schia, N. N. 2018. “The Cyber Frontier and Digital Pitfalls in the Global South.” Third World Quarterly 39 (5): 821–837.
  • Sinha, A., T. H. Nguyen, D. Kar, M. Brown, M. Tambe, and A. X. Jiang. 2015. “From Physical Security to Cybersecurity.” Journal of Cybersecurity 1 (1): 19–35.
  • Solar, C. 2020. “Cybersecurity and Cyber Defence in the Emerging Democracies.” Journal of Cyber Policy 5 (3): 392–412. doi:10.1080/23738871.2020.1820546.
  • Tijerina, W. 2019. Industrial Development in Mexico: Policy Transformation from Below. Abingdon: Routledge.
  • United Nations Development Programme (UNDP). 2021. Human Development Index. Available at: https://hdr.undp.org/en/content/human-development-index-hdi.
  • US National Research Council, Committee on Science, Engineering, and Public Policy. 1992. The Government Role in Civilian Technology: Building a New Alliance. Washington, DC: National Academy Press. doi:10.17226/1998.
  • Warwick, K. 2013. “Beyond Industrial Policy: Emerging Issues and New Trends.” OECD Science, Technology and Industry Policy Papers, No. 2, OECD Publishing. doi:10.1787/5k4869clw0xp-en.
  • Weiss, L., and J. Hobson. 1995. States and Economic Development: A Comparative Historical Analysis. Polity Press: Cambridge.
  • World Bank. 2019. “World Development Indicators Database.” World Bank. Accessed 09 February 2021. https://databank.worldbank.org/home.aspx.
  • World Economic Forum (WEF). 2019. The Global Competitiveness Report. Geneva: World Economic Forum.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.