Analyzing Cybersecurity Strategies in Democratic and Authoritarian Regimes: A Comparative Study of the United States and China

Analyzing Cybersecurity Strategies in Democratic and Authoritarian Regimes: A Comparative Study of the United States and China

Mari Malvenishvili
ISBN13: 9781668488461|ISBN10: 1668488469|ISBN13 Softcover: 9781668488508|EISBN13: 9781668488478
DOI: 10.4018/978-1-6684-8846-1.ch016
Cite Chapter Cite Chapter

MLA

Malvenishvili, Mari. "Analyzing Cybersecurity Strategies in Democratic and Authoritarian Regimes: A Comparative Study of the United States and China." Cyber Security Policies and Strategies of the World's Leading States, edited by Nika Chitadze, IGI Global, 2023, pp. 252-263. https://doi.org/10.4018/978-1-6684-8846-1.ch016

APA

Malvenishvili, M. (2023). Analyzing Cybersecurity Strategies in Democratic and Authoritarian Regimes: A Comparative Study of the United States and China. In N. Chitadze (Ed.), Cyber Security Policies and Strategies of the World's Leading States (pp. 252-263). IGI Global. https://doi.org/10.4018/978-1-6684-8846-1.ch016

Chicago

Malvenishvili, Mari. "Analyzing Cybersecurity Strategies in Democratic and Authoritarian Regimes: A Comparative Study of the United States and China." In Cyber Security Policies and Strategies of the World's Leading States, edited by Nika Chitadze, 252-263. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-8846-1.ch016

Export Reference

Mendeley
Favorite

Abstract

This chapter aims to analyze the cybersecurity policies and strategies of the United States and China, representing democratic and authoritarian regimes, respectively. The study explores the key roles played by cyber security policies, legal frameworks, and international relations in these countries. By examining these aspects, the authors discern the disparities between cyber security policies in democratic and authoritarian regimes. The chapter highlights the diverse approaches employed to ensure cyber security and the challenges faced by both countries in countering cyber threats and safeguarding their national interests.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.