Regulatory approaches for cyber security of critical infrastructures: The case of Turkey

2016-06-01
Critical infrastructures are vital assets for public safety, economic welfare and/or national security of countries. Today, cyber systems are extensively used to control and monitor critical infrastructures. A considerable amount of the infrastructures are connected to the Internet over corporate networks. Therefore, cyber security is an important item for the national security agendas of several countries. The enforcement of security principles on the critical infrastructure operators through the regulations is a still-debated topic. There are several academic and governmental studies that analyze the possible regulatory approaches for the security of the critical infrastructures. Although most of them favor the market-oriented approaches, some argue the necessity of government interventions. This paper presents a three phased-research to identify the suitable regulatory approach for the critical infrastructures of Turkey. First of all, the data of the critical infrastructures of Turkey are qualitatively analyzed, by using grounded theory method, to extract the vulnerabilities associated with the critical infrastructures. Secondly, a Delphi survey is conducted with six experts to extract the required regulations to mitigate the vulnerabilities. Finally, a focus group interview is conducted with the employees of the critical infrastructures to specify the suitable regulatory approaches for the critical infrastructures of Turkey. The results of the research show that the critical infrastructure operators of Turkey, including privately held operators, are mainly in favor of regulations. (C) 2016 Bilge Karabacak, Sevgi Ozkan Yildirim, Nazife Baykal. Published by Elsevier Ltd. All rights reserved.
COMPUTER LAW & SECURITY REVIEW

Suggestions

A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness
Karabacak, Bilge; Özkan Yıldırım, Sevgi; Baykal, Nazife (2016-12-01)
Critical infrastructures are vital assets for the public safety, economic welfare and national security of countries. Cyber systems are used extensively to monitor and control critical infrastructures. A number of infrastructures are connected to the Internet via corporate networks. Cyber security is, therefore, an important item of the national security agenda of a country. The intense interest in cyber security has initiated research focusing on national cyber security maturity assessments. However, littl...
Developing and verifying a set of principles for the cyber security of the critical infrastructures of Turkey
Karabacak, Bilge; Özkan Yıldırım, Sevgi; Baykal, Nazife; Department of Information Systems (2015)
Critical infrastructures are vital assets for countries as a harm given to critical infrastructures may affect public order, economic welfare and/or national security. Today, cyber systems are extensively used to control and monitor critical infrastructures. Therefore, cyber threats have the potential to adversely affect the order of societies and countries. In this PhD study, the root causes of the susceptibility of the critical infrastructures of Turkey to the cyber threats are identified by analyzing the...
Welfare effects of intergovernmental transfers: equity versus efficiency
Çevik, Zeynep Burcu; Parmaksız, Ömer Kağan; Department of Economics (2016)
Intergovernmental transfers, that are significant source of income for state and local governments, are needed to annihilate the fiscal imbalances. This dissertation aims to investigate the welfare effects of an intergovernmental transfer rules in fiscally decentralized economies. The particular linear redistribution rule used in this study takes into account two criteria: equity and efficiency. The model consists of citizens, symmetric local governments and a central government, which are in a strategic in...
CONCEPTUALISING COUNTERTERRORISM
Crelinsten, Ronald (2019-01-01)
The concept of human security reflects the view that international security cannot be achieved unless the peoples of the world are free from violent threats to their lives, their safety, or their rights. As suggested by Abraham Maslow, the tools that a particular counterterrorism (CT) approach uses can often reflect a particular conception of terrorism and the threat it poses. Those responsible for countering terrorism must therefore broaden their toolboxes so as to avoid narrow, truncated conceptions of th...
Security Sector Reform: Defence Reform in South Sudan between 2005 and 2013
McLean, Fiona; Baracco, Luciano; Political Science and International Relations (2018-4)
The internationally dominant framework for Security Sector Reform presents an integrated, holistic approach to national security sector management that claims to deliver, through international donors, a system for conflict-prone countries that will contribute to the stability required to enable sustainable peace and development. Security Sector Reform policy explains how a prescribed methodology, based on liberal democratic principles of good governance, contributes to long-term conflict prevention by addre...
Citation Formats
B. Karabacak, S. Özkan Yıldırım, and N. Baykal, “Regulatory approaches for cyber security of critical infrastructures: The case of Turkey,” COMPUTER LAW & SECURITY REVIEW, pp. 526–539, 2016, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/31199.