IDEAS home Printed from https://ideas.repec.org/a/bpj/johsem/v6y2009i1p16n76.html
   My bibliography  Save this article

The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen

Author

Listed:
  • Harknett Richard J.

    (University of Cincinnati)

  • Stever James A

    (University of Cincinnati)

Abstract

In May 2009, the Obama administration released its, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, which it expected would lay the groundwork for a new national cybersecurity strategy. Staking out separate policy development space, Congressional leaders began hearings and introduced legislation. The most significant - the Cybersecurity Act of 2009 - proposed major changes in current federal government approaches. The common starting point of all of these reform efforts is that current federal organization and current national cybersecurity policy is inadequate for the task of securing cyberspace.This article analyzes past federal reorganization efforts in response to the last technological revolution with serious national security implications - nuclear technology -- and the more recent response to homeland security. While much of the current cybersecurity debate leans toward radical reforming, we counsel an incremental approach to reorganization that builds on the hard work of the last decade combined with a genuine reconceptualization of the threat solution set. Borrowing from the language of the nuclear era, we call for cybersecurity to rest on a balanced triad of intergovernmental relations, private corporate involvement, and active cyber citizenship as a resilient model that can manage this new and challenging security environment. In particular, we introduce the third leg as a critical new concept that has been absent from standard policy debate. The road to cybersecurity is destined to be long, circuitous, and difficult. Extensive negotiations between federal, state, local, and private sector leaders loom. No truly significant federal policy reform can be achieved without considering the intergovernmental policy dimensions combined with the overall threat perception driving those reforms. Success will remain elusive if government to private business relations do not improve and much will be undermined if the general public remains inactive in contributing to national cybersecurity.

Suggested Citation

  • Harknett Richard J. & Stever James A, 2009. "The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 6(1), pages 1-16, November.
  • Handle: RePEc:bpj:johsem:v:6:y:2009:i:1:p:16:n:76
    DOI: 10.2202/1547-7355.1649
    as

    Download full text from publisher

    File URL: https://doi.org/10.2202/1547-7355.1649
    Download Restriction: For access to full text, subscription to the journal or payment for the individual article is required.

    File URL: https://libkey.io/10.2202/1547-7355.1649?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bpj:johsem:v:6:y:2009:i:1:p:16:n:76. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.degruyter.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.