Sie sind auf Seite 1von 4

5/28/2019 Primary Research Final Analysis Paper - Google Docs

Magesh 1

Amrit Magesh

Ms. Curtin

Independent Research G/T

9 May 2019

Primary Research Final Analysis Paper

In result, the data supported the hypothesis because of many similar protocols from

developing nations that have shown to be ineffective. The data suggested that developing nations

favor joining in coalitions of members of a similar region to advance cyber security purposes.

Whether it be joint heads of states or leaders, the programs maintained some signs of

cooperation. For example, the African Union and Economic Community of Western African

States follow joint programs because they believe the costs for funding cybersecurity could be

alleviated among any one country. Furthermore, the data showed that most developing nations

had concrete, well-developed protocols that defined most possible oversights of cybercriminal

activity within a country. This shows that the developing nations have a general or advanced

understanding of cybersecurity and its importance. Perhaps the most striking correlation between

the analysis of the documents was the striking similarity in organization of protocols for both the

Department of Homeland Security, along with the recommendations from the Congressional

Research Service, and the African Union and ECOWAS. Most aspects of these programs have

shown to favor increased and effective workforce, increased funding, a combination of law

enforcement and the bureaucracy, and others.

On the other hand, the developing nation protocols seemed to share similar

disadvantages: lack of information and bias. For instance, the proposals from the African Union,

https://docs.google.com/document/d/1aBFnpLu2CBWwoL6v03Kav-Ky2Tx6WUz3Wn_fWemm3Do/edit 1/4
5/28/2019 Primary Research Final Analysis Paper - Google Docs

Magesh 2

ECOWAS, and Ezeoha internet banking regulation all are somewhat outdated. This is significant

as cybersecurity has mostly risen in significance recently with the rise of technology use and

access. Moreover, many of the proposed prevention and national strategies are shown to be

lackluster and ineffective as expenses have limited efficiency in all three protocols

aforementioned. These countries risk the most cybercrime making it more difficult for them to

support expensive cybersecurity legislation.

There are obvious differences between the data sets, however. As mentioned earlier, the

proposals from developing nations tend to be outdated and, thus, obsolete while the protocol

from the DHS are relatively modernized, as it was released in 2018. The difference of dates show

how much each type of financially situated country values cybersecurity longevity. While

developing nations did make attempts at effective legislation, most of these attempts were

fruitless as there have not been any updates or revisions since. This could be due to a number of

reasons, but the data suggests lack of responsibility. Another difference is the scope of the

protocol. While the developed nations focus more on one country with a better understanding of

resources and time management, third-world countries promote cybersecurity for regions or even

continents.

More research should be done in the future to analyze how different economically

situated countries allocate fundings or locate groups that can aid efforts for cybersecurity.

Additionally, research should divulge into protocols that explicitly detail how a developed nation

plans on providing for international consensus.

Overall, the five documents showed more criticism and backlash from protocols

developed in Africa rather than the United States. This has been found to be a result of a

https://docs.google.com/document/d/1aBFnpLu2CBWwoL6v03Kav-Ky2Tx6WUz3Wn_fWemm3Do/edit 2/4
5/28/2019 Primary Research Final Analysis Paper - Google Docs

Magesh 3

multitude of factors. Ultimately, regional or individual cooperation for cybersecurity programs in

developing areas have shown to be fruitless. This supports the argument that an international

organization could better fund and run cybersecurity programs in those countries that face the

most cybercrime.

https://docs.google.com/document/d/1aBFnpLu2CBWwoL6v03Kav-Ky2Tx6WUz3Wn_fWemm3Do/edit 3/4
5/28/2019 Primary Research Final Analysis Paper - Google Docs

Magesh 4

Works Cited

Fischer, Eric A. “Cybersecurity Issues and Challenges: In Brief.” Federation of America


Scientists, 12 Aug. 2016, fas.org/sgp/crs/misc/R43831.pdf.

African Union, 2012. Draft Convention on the Establishment of a Legal Framework Conductive
to Cybersecurity in Africa

Economic Community of West African States (ECOWAS), 2009. Draft Directive on Fighting
Cybercrime within ECOWAS (ECOWAS Draft Directive).

Ezeoha, Abel Ebeh. “Regulating Internet Banking In Nigeria: Some Success Prescriptions– Part
2.” Journal of Internet Banking and Commerce, Apr. 2006, www.icommercecentral.com/
open-access/regulating-internet-banking-in-nigeria-some-success-prescriptions-part-1-12.
pdf.

DHS, 2018. “US Department of Homeland Security Cybersecurity Strategy”,


https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf

https://docs.google.com/document/d/1aBFnpLu2CBWwoL6v03Kav-Ky2Tx6WUz3Wn_fWemm3Do/edit 4/4

Das könnte Ihnen auch gefallen