SlideShare a Scribd company logo
1 of 9
THANK YOU!
[EMAIL ADDRESS]
Cybersecurity Capacity Building:
Cross-National Benefits and International Divides
S. Creese‡, W.H. Dutton*, P. Esteve-González*, and R. Shillair†
‡ Founding Director, GCSCC, University of Oxford
* Oxford Martin Fellows, GCSCC, University of Oxford
† Assistant Professor, Quello Centre, Michigan State University & GCSCC Research Associate
The growing centrality of cybersecurity has led many governments and international organizations to
focus on building the capacity of nations to withstand threats to the online security of the public and
its digital resources.
• These initiatives entail a range of actions that vary from education and training, to technology
and related standards, as well as legal and policy frameworks.
• While efforts to proactively address security problems are intuitively valuable, there is little
empirical research on whether they achieve their intended objectives.
This paper takes a cross-national comparative approach to determining whether there is empirical
support for investing in capacity building.
The Oxford GCSCC developed one of the earliest and most prominent models to estimate national
levels of maturity in capacity building – the CMM.
• Direct indicators of 5 dimensions of cybersecurity.
1. Policy and Strategy
2. Culture and Society
3. Education, Training, and Skills
4. Legal and Regulatory Frameworks
5. Technologies and Standards
• Cybersecurity Capacity Scale (CCS): a weighted average of the maturity stage of the 47 variables.
• Data collected for 73 nations using mixed research methods and consulting national stakeholders.
• More information: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3658350
47 ordinal variables (rank of values: 1 – 5)
Marshalling field research from 73 nations, the comparative data analysis:
1) describes the status of capacity building across the nations;
2) determines the impact of capacity building when controlling for other key contextual
variables; and
3) explores the factors shaping national advances in capacity building.
• The analysis shows that relatively higher levels of maturity in cybersecurity capacity translate into
positive outcomes for nations.
• It also reveals a capacity divide between countries based on income levels, that reinforces
economic divides.
• The study provides empirical support to international efforts aimed at building cybersecurity
capacity, and mitigating gaps based on the wealth of nations.
Policyimplications
Region Obs. Income Obs.
Sub-Saharan Africa 15 Low and Lower-Medium 29
Middle East and North Africa 1 Low: 8
Europe and Central Asia 14 Lower-Medium: 21
South Asia 3 Upper-Medium 33
East Asia and Pacific 9 High 11
Latin America and the Caribbean 31
Total 73 Total 73
Negative experiences:
- Encounter Rates (Microsoft)
- Piracy (WEF)
Positive experiences:
- NRI: Business Usage (WEF)
- NRI: Government Usage (WEF)
- NRI: Individual Usage (WEF)
- Voice and Accountability
(Kaufmann et al., 2010)
(CCS)
Cybersecurity
Capacity
Scale
(CCS)
THANK YOU!
[EMAIL ADDRESS]
@CapacityCentre
Dziękuję Ci bardzo / Thank you very much
https://gcscc.ox.ac.uk/
Department of Computer Science
University of Oxford
15 Parks Road, Oxford, OX1 3QD, UK
Phone: +44(0)1865 287903
cybercapacity@cs.ox.ac.uk
https://www.linkedin.com/company/global-cyber-security-capacity-centre/

More Related Content

Similar to Cybersecurity Capacity Building

Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Carolin Weisser
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docxssuser454af01
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docxmecklenburgstrelitzh
 
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1vincentleone
 
Presentation Mr. Axel Marx
Presentation Mr. Axel MarxPresentation Mr. Axel Marx
Presentation Mr. Axel Marxmicconference
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
The Global Knowledge Center Network (GKCN) with The Global University System ...
The Global Knowledge Center Network (GKCN) with The Global University System ...The Global Knowledge Center Network (GKCN) with The Global University System ...
The Global Knowledge Center Network (GKCN) with The Global University System ...Ed Dodds
 
Information, Knowledge Management & Coordination Systems: Complex Systems App...
Information, Knowledge Management & Coordination Systems: Complex Systems App...Information, Knowledge Management & Coordination Systems: Complex Systems App...
Information, Knowledge Management & Coordination Systems: Complex Systems App...CITE
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryDuane Blackburn
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docx
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docxRunning head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docx
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docxtodd521
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
Ilkka Turunen: Challenges and possibilities in networking in the US
Ilkka Turunen: Challenges and possibilities in networking in the USIlkka Turunen: Challenges and possibilities in networking in the US
Ilkka Turunen: Challenges and possibilities in networking in the USTHL
 
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSSEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSS. F. (Sid) Nash
 

Similar to Cybersecurity Capacity Building (20)

Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
 
GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1
 
Presentation Mr. Axel Marx
Presentation Mr. Axel MarxPresentation Mr. Axel Marx
Presentation Mr. Axel Marx
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
FINAL_Report
FINAL_ReportFINAL_Report
FINAL_Report
 
The Global Knowledge Center Network (GKCN) with The Global University System ...
The Global Knowledge Center Network (GKCN) with The Global University System ...The Global Knowledge Center Network (GKCN) with The Global University System ...
The Global Knowledge Center Network (GKCN) with The Global University System ...
 
Information, Knowledge Management & Coordination Systems: Complex Systems App...
Information, Knowledge Management & Coordination Systems: Complex Systems App...Information, Knowledge Management & Coordination Systems: Complex Systems App...
Information, Knowledge Management & Coordination Systems: Complex Systems App...
 
Professor Bryan Edwards - Data for Security and Resilience
Professor Bryan Edwards - Data for Security and ResilienceProfessor Bryan Edwards - Data for Security and Resilience
Professor Bryan Edwards - Data for Security and Resilience
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docx
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docxRunning head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docx
Running head THE NATIONAL INFRASTRUCTURE PROTECTION PLAN1.docx
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
Ilkka Turunen: Challenges and possibilities in networking in the US
Ilkka Turunen: Challenges and possibilities in networking in the USIlkka Turunen: Challenges and possibilities in networking in the US
Ilkka Turunen: Challenges and possibilities in networking in the US
 
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSSEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
 

Recently uploaded

Non Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfNon Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfPratikPatil591646
 
Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfNicoChristianSunaryo
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etclalithasri22
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformationAnnie Melnic
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are successPratikSingh115843
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfnikeshsingh56
 
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...Jack Cole
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaManalVerma4
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelBoston Institute of Analytics
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 

Recently uploaded (17)

Non Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfNon Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdf
 
Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdf
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etc
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformation
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are success
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdf
 
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in India
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 

Cybersecurity Capacity Building

  • 1. THANK YOU! [EMAIL ADDRESS] Cybersecurity Capacity Building: Cross-National Benefits and International Divides S. Creese‡, W.H. Dutton*, P. Esteve-González*, and R. Shillair† ‡ Founding Director, GCSCC, University of Oxford * Oxford Martin Fellows, GCSCC, University of Oxford † Assistant Professor, Quello Centre, Michigan State University & GCSCC Research Associate
  • 2. The growing centrality of cybersecurity has led many governments and international organizations to focus on building the capacity of nations to withstand threats to the online security of the public and its digital resources. • These initiatives entail a range of actions that vary from education and training, to technology and related standards, as well as legal and policy frameworks. • While efforts to proactively address security problems are intuitively valuable, there is little empirical research on whether they achieve their intended objectives. This paper takes a cross-national comparative approach to determining whether there is empirical support for investing in capacity building.
  • 3. The Oxford GCSCC developed one of the earliest and most prominent models to estimate national levels of maturity in capacity building – the CMM. • Direct indicators of 5 dimensions of cybersecurity. 1. Policy and Strategy 2. Culture and Society 3. Education, Training, and Skills 4. Legal and Regulatory Frameworks 5. Technologies and Standards • Cybersecurity Capacity Scale (CCS): a weighted average of the maturity stage of the 47 variables. • Data collected for 73 nations using mixed research methods and consulting national stakeholders. • More information: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3658350 47 ordinal variables (rank of values: 1 – 5)
  • 4. Marshalling field research from 73 nations, the comparative data analysis: 1) describes the status of capacity building across the nations; 2) determines the impact of capacity building when controlling for other key contextual variables; and 3) explores the factors shaping national advances in capacity building. • The analysis shows that relatively higher levels of maturity in cybersecurity capacity translate into positive outcomes for nations. • It also reveals a capacity divide between countries based on income levels, that reinforces economic divides. • The study provides empirical support to international efforts aimed at building cybersecurity capacity, and mitigating gaps based on the wealth of nations. Policyimplications
  • 5. Region Obs. Income Obs. Sub-Saharan Africa 15 Low and Lower-Medium 29 Middle East and North Africa 1 Low: 8 Europe and Central Asia 14 Lower-Medium: 21 South Asia 3 Upper-Medium 33 East Asia and Pacific 9 High 11 Latin America and the Caribbean 31 Total 73 Total 73
  • 6.
  • 7. Negative experiences: - Encounter Rates (Microsoft) - Piracy (WEF) Positive experiences: - NRI: Business Usage (WEF) - NRI: Government Usage (WEF) - NRI: Individual Usage (WEF) - Voice and Accountability (Kaufmann et al., 2010) (CCS) Cybersecurity Capacity Scale (CCS)
  • 8.
  • 9. THANK YOU! [EMAIL ADDRESS] @CapacityCentre Dziękuję Ci bardzo / Thank you very much https://gcscc.ox.ac.uk/ Department of Computer Science University of Oxford 15 Parks Road, Oxford, OX1 3QD, UK Phone: +44(0)1865 287903 cybercapacity@cs.ox.ac.uk https://www.linkedin.com/company/global-cyber-security-capacity-centre/

Editor's Notes

  1. Last page option 1
  2. Last page option 1