An assessment of U.S. legislation on cybersecurity

Acklyn Murray, Sherali Zeadally, Angelyn Flowers

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Cybercrime continues to be on the rise and cybercriminals are launching increasingly sophisticated cyberattacks aimed at disrupting businesses through denial of service attacks and stealing personal information all with serious economic consequences. Law and policy makers are under increasing pressure to develop timely legislations to address cybercrime issues and provide effective measures to prosecute cybercriminals. We present a comprehensive review of the various laws that are currently available in the Unites States to control cybercrime and support cybersecurity. We also discuss proposed bills in light of how they address cybersecurity challenges in current legislations. Finally, we briefly present recent regulations and proposed bills related to cybersecurity in a few other countries which have set up various government initiatives in this area.

Original languageEnglish
Title of host publicationProceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012
Pages289-294
Number of pages6
DOIs
StatePublished - 2012
Event2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012 - Kuala Lumpur, Malaysia
Duration: Jun 26 2012Jun 28 2012

Publication series

NameProceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012

Conference

Conference2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012
Country/TerritoryMalaysia
CityKuala Lumpur
Period6/26/126/28/12

Keywords

  • cyberattack
  • cybercrime
  • cybersecurity
  • legislation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'An assessment of U.S. legislation on cybersecurity'. Together they form a unique fingerprint.

Cite this