Author
Listed:
- Norris Donald F.
- Mateczun Laura
(University of Maryland, Baltimore County, School of Public Policy, Baltimore, MD, USA)
- Joshi Anupam
- Finin Tim
(University of Maryland, Baltimore County, Department of Computer Science, Baltimore, MD, USA)
Abstract
In this paper, we examine cybersecurity challenges faced by America’s local, governments, including: the extent of cyberattacks; problems faced in preventing attacks from being successful; barriers to providing high levels of cybersecurity management; and actions that local governments believe should be taken to improve cybersecurity practice. Our research method consisted of a focus group of information technology (IT) and cybersecurity officials from one American state. Our findings indicate that cyberattacks are constant and can number in the tens of thousands or more per day. While our participants noted that while they were not perfect at it, they felt that they had cybersecurity technology under good control. Their biggest challenge is human – that is, end-users who make mistakes or engage in misconduct. Local governments face several barriers in providing high levels of cybersecurity, including: insufficient funding and staffing; problems of governance; and insufficient or under-enforced cybersecurity policies. Participants suggested several ways to improve local government cybersecurity, including: vulnerability assessment, scanning and testing, cybersecurity insurance, improving end-user authentication and authorization, end-user training and control, control over the use of external devices, and improved governance methods, among others. We conclude by making suggestions for further research into local government cybersecurity.
Suggested Citation
Norris Donald F. & Mateczun Laura & Joshi Anupam & Finin Tim, 2018.
"Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security,"
Journal of Homeland Security and Emergency Management, De Gruyter, vol. 15(3), pages 1-14, September.
Handle:
RePEc:bpj:johsem:v:15:y:2018:i:3:p:14:n:4
DOI: 10.1515/jhsem-2017-0048
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bpj:johsem:v:15:y:2018:i:3:p:14:n:4. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.degruyterbrill.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.