Beruflich Dokumente
Kultur Dokumente
Magesh 1
Amrit Magesh
Ms. Curtin
9 May 2019
In result, the data supported the hypothesis because of many similar protocols from
developing nations that have shown to be ineffective. The data suggested that developing nations
favor joining in coalitions of members of a similar region to advance cyber security purposes.
Whether it be joint heads of states or leaders, the programs maintained some signs of
cooperation. For example, the African Union and Economic Community of Western African
States follow joint programs because they believe the costs for funding cybersecurity could be
alleviated among any one country. Furthermore, the data showed that most developing nations
had concrete, well-developed protocols that defined most possible oversights of cybercriminal
activity within a country. This shows that the developing nations have a general or advanced
understanding of cybersecurity and its importance. Perhaps the most striking correlation between
the analysis of the documents was the striking similarity in organization of protocols for both the
Department of Homeland Security, along with the recommendations from the Congressional
Research Service, and the African Union and ECOWAS. Most aspects of these programs have
shown to favor increased and effective workforce, increased funding, a combination of law
On the other hand, the developing nation protocols seemed to share similar
disadvantages: lack of information and bias. For instance, the proposals from the African Union,
https://docs.google.com/document/d/1aBFnpLu2CBWwoL6v03Kav-Ky2Tx6WUz3Wn_fWemm3Do/edit 1/4
5/28/2019 Primary Research Final Analysis Paper - Google Docs
Magesh 2
ECOWAS, and Ezeoha internet banking regulation all are somewhat outdated. This is significant
as cybersecurity has mostly risen in significance recently with the rise of technology use and
access. Moreover, many of the proposed prevention and national strategies are shown to be
lackluster and ineffective as expenses have limited efficiency in all three protocols
aforementioned. These countries risk the most cybercrime making it more difficult for them to
There are obvious differences between the data sets, however. As mentioned earlier, the
proposals from developing nations tend to be outdated and, thus, obsolete while the protocol
from the DHS are relatively modernized, as it was released in 2018. The difference of dates show
how much each type of financially situated country values cybersecurity longevity. While
developing nations did make attempts at effective legislation, most of these attempts were
fruitless as there have not been any updates or revisions since. This could be due to a number of
reasons, but the data suggests lack of responsibility. Another difference is the scope of the
protocol. While the developed nations focus more on one country with a better understanding of
resources and time management, third-world countries promote cybersecurity for regions or even
continents.
More research should be done in the future to analyze how different economically
situated countries allocate fundings or locate groups that can aid efforts for cybersecurity.
Additionally, research should divulge into protocols that explicitly detail how a developed nation
Overall, the five documents showed more criticism and backlash from protocols
developed in Africa rather than the United States. This has been found to be a result of a
https://docs.google.com/document/d/1aBFnpLu2CBWwoL6v03Kav-Ky2Tx6WUz3Wn_fWemm3Do/edit 2/4
5/28/2019 Primary Research Final Analysis Paper - Google Docs
Magesh 3
developing areas have shown to be fruitless. This supports the argument that an international
organization could better fund and run cybersecurity programs in those countries that face the
most cybercrime.
https://docs.google.com/document/d/1aBFnpLu2CBWwoL6v03Kav-Ky2Tx6WUz3Wn_fWemm3Do/edit 3/4
5/28/2019 Primary Research Final Analysis Paper - Google Docs
Magesh 4
Works Cited
African Union, 2012. Draft Convention on the Establishment of a Legal Framework Conductive
to Cybersecurity in Africa
Economic Community of West African States (ECOWAS), 2009. Draft Directive on Fighting
Cybercrime within ECOWAS (ECOWAS Draft Directive).
Ezeoha, Abel Ebeh. “Regulating Internet Banking In Nigeria: Some Success Prescriptions– Part
2.” Journal of Internet Banking and Commerce, Apr. 2006, www.icommercecentral.com/
open-access/regulating-internet-banking-in-nigeria-some-success-prescriptions-part-1-12.
pdf.
https://docs.google.com/document/d/1aBFnpLu2CBWwoL6v03Kav-Ky2Tx6WUz3Wn_fWemm3Do/edit 4/4