Institutional structure: Difference between revisions

From Identifying Difficult Problems in Cyberlaw
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
== Introduction ==
== Introduction ==
== Status Quo ==
== Status Quo ==
The government structures for responding to cyber-threats are complex, with a number of agencies sharing authority in occasionally overlapping areas.
CHART
This chart, while by no means an exhaustive survey of government action in the realm of cybercrime and cyberwar, attempts to plot several of the major actors in those areas as well as the main ways in which those actors are linked together.
= Actors =
Various government and private actors participate in preventing, detecting, and responding to various cyber-threats. Broadly speaking, these actors fall into four different categories:
* Cyber-specific federal agencies (e.g. Cyber Command)
* Defense and investigation agencies (e.g. Department of Defense, FBI, CIA, NSA)
* Independent agencies with relevant concerns and vulnerabilities (e.g. Department of State, Federal Communications Commission)
* Private corporations
= Links =
* Structural
* Statutory
* Negotiated cooperation
* De facto cooperation
== Centralization vs. Decentralization ==
== Centralization vs. Decentralization ==
== Top-down vs. Bottom-up Institutional Response ==
== Top-down vs. Bottom-up Institutional Response ==

Revision as of 19:10, 18 December 2010

Introduction

Status Quo

The government structures for responding to cyber-threats are complex, with a number of agencies sharing authority in occasionally overlapping areas.

CHART

This chart, while by no means an exhaustive survey of government action in the realm of cybercrime and cyberwar, attempts to plot several of the major actors in those areas as well as the main ways in which those actors are linked together.

Actors

Various government and private actors participate in preventing, detecting, and responding to various cyber-threats. Broadly speaking, these actors fall into four different categories:

  • Cyber-specific federal agencies (e.g. Cyber Command)
  • Defense and investigation agencies (e.g. Department of Defense, FBI, CIA, NSA)
  • Independent agencies with relevant concerns and vulnerabilities (e.g. Department of State, Federal Communications Commission)
  • Private corporations

Links

  • Structural
  • Statutory
  • Negotiated cooperation
  • De facto cooperation

Centralization vs. Decentralization

Top-down vs. Bottom-up Institutional Response