skip to main content


Title: Cybersecurity and Local Government
CYBERSECURITY AND LOCAL GOVERNMENT Learn to secure your local government’s networks with this one-of-a-kind resource In Cybersecurity and Local Government, a distinguished team of researchers delivers an insightful exploration of cybersecurity at the level of local government. The book makes a compelling argument that every local government official, elected or otherwise, must be reasonably knowledgeable about cybersecurity concepts and provide appropriate support for it within their governments. It also lays out a straightforward roadmap to achieving those objectives, from an overview of cybersecurity definitions to descriptions of the most common security challenges faced by local governments. The accomplished authors specifically address the recent surge in ransomware attacks and how they might affect local governments, along with advice as to how to avoid and respond to these threats. They also discuss the cybersecurity law, cybersecurity policies that local government should adopt, the future of cybersecurity, challenges posed by Internet of Things, and much more. Throughout, the authors provide relevant field examples, case studies of actual local governments, and examples of policies to guide readers in their own application of the concepts discussed within. Cybersecurity and Local Government also offers: A thorough introduction to cybersecurity generally, including definitions of key cybersecurity terms and a high-level overview of the subject for non-technologists. A comprehensive exploration of critical information for local elected and top appointed officials, including the typical frequencies and types of cyberattacks. Practical discussions of the current state of local government cybersecurity, with a review of relevant literature from 2000 to 2021. In-depth examinations of operational cybersecurity policies, procedures and practices, with recommended best practices. Perfect for local elected and top appointed officials and staff as well as local citizens, Cybersecurity and Local Government will also earn a place in the libraries of those studying or working in local government with an interest in cybersecurity.  more » « less
Award ID(s):
1753681
NSF-PAR ID:
10340533
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Wiley (book)
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract

    Decentralization reform has both advantages and risks. Bringing service delivery “closer to the people” can improve information flows and strengthen accountability, but it may also leave systems vulnerable to elite capture and corruption by municipal government officials. While past research has acknowledged the possibility of corruption under decentralization, relatively little work has connected those risks to features of these reforms or specific local institutional arrangements. To explore the conditions that can help mitigate the risks of corruption under decentralization, we study the case of health sector reform in Honduras where municipal governments, associations, and NGOs each serve as intermediary-managing organizations under a common decentralized health service delivery model. We argue that three types of institutional arrangements reflecting local accountability practices serve as checks on the authority granted through decentralization and can help guard against corruption: external supervision, civil society engagement, and public participation. Empirically, we draw on data from more than 600 street-level bureaucrats, valuable but under-utilized informants about municipal corruption, across a matched sample of 65 municipalities with contrasting forms of administration. We find that reported corruption is highest under decentralization led by municipal governments, as compared to association- or NGO-led varieties. Both external supervision and civil society engagement help attenuate the positive association between decentralization and corruption, but public participation does not. Overall, this research highlights the importance of considering reform features and local conditions when designing policies to help manage risks and support effective social sector decentralization.

     
    more » « less
  2. Abstract

    Marine aquaculture (mariculture) plays a relatively small role in the United States’ domestic seafood production, despite considerable scope for industry development and high volumes of imported farmed seafood resulting in a significant trade deficit. Currently, most mariculture in the United States occurs in nearshore waters or land‐based tanks and is regulated and guided using state‐level policy, with a relative absence of national coordinating mechanisms to link the patchwork of state policies. There is no comprehensive evaluation showing how different state policies may be enabling or impeding mariculture development. In response, we provide the first systematic overview of state‐level mariculture policy for the 23 coastal marine states in the United States. We compiled information for 16 aquaculture and mariculture policy attributes, including legislation, regulations and management characteristics, particularly those that could enable mariculture development. We found considerable heterogeneity in how states govern and regulate mariculture. As examples, 48% of states have an aquaculture development act, 35% have spatial zoning specifically for mariculture and only 26% have a government‐provided mariculture best management practices document. We examined the relationship between enabling policies and metrics of mariculture output (e.g. production value, number of farms), and while the effect of enabling policy is often equivocal, certain features stand out as important (e.g. government‐provided best management practices). Overall, this policy synthesis suggests approaches that may be influential in enabling mariculture development, which could inform new state‐level policies, an effective overarching federal policy in the United States, or policies in other countries seeking to support an expanded mariculture industry.

     
    more » « less
  3. 1. Description of the objectives and motivation for the contribution to ECE education The demand for wireless data transmission capacity is increasing rapidly and this growth is expected to continue due to ongoing prevalence of cellular phones and new and emerging bandwidth-intensive applications that encompass high-definition video, unmanned aerial systems (UAS), intelligent transportation systems (ITS) including autonomous vehicles, and others. Meanwhile, vital military and public safety applications also depend on access to the radio frequency spectrum. To meet these demands, the US federal government is beginning to move from the proven but inefficient model of exclusive frequency assignments to a more-efficient, shared-spectrum approach in some bands of the radio frequency spectrum. A STEM workforce that understands the radio frequency spectrum and applications that use the spectrum is needed to further increase spectrum efficiency and cost-effectiveness of wireless systems over the next several decades to meet anticipated and unanticipated increases in wireless data capacity. 2. Relevant background including literature search examples if appropriate CISCO Systems’ annual survey indicates continued strong growth in demand for wireless data capacity. Meanwhile, undergraduate electrical and computer engineering courses in communication systems, electromagnetics, and networks tend to emphasize mathematical and theoretical fundamentals and higher-layer protocols, with less focus on fundamental concepts that are more specific to radio frequency wireless systems, including the physical and media access control layers of wireless communication systems and networks. An efficient way is needed to introduce basic RF system and spectrum concepts to undergraduate engineering students in courses such as those mentioned above who are unable to, or had not planned to take a full course in radio frequency / microwave engineering or wireless systems and networks. We have developed a series of interactive online modules that introduce concepts fundamental to wireless communications, the radio frequency spectrum, and spectrum sharing, and seek to present these concepts in context. The modules include interactive, JavaScript-based simulation exercises intended to reinforce the concepts that are presented in the modules through narrated slide presentations, text, and external links. Additional modules in development will introduce advanced undergraduate and graduate students and STEM professionals to configuration and programming of adaptive frequency-agile radios and spectrum management systems that can operate efficiently in congested radio frequency environments. Simulation exercises developed for the advanced modules allow both manual and automatic control of simulated radio links in timed, game-like simulations, and some exercises will enable students to select from among multiple pre-coded controller strategies and optionally edit the code before running the timed simulation. Additionally, we have developed infrastructure for running remote laboratory experiments that can also be embedded within the online modules, including a web-based user interface, an experiment management framework, and software defined radio (SDR) application software that runs in a wireless testbed initially developed for research. Although these experiments rely on limited hardware resources and introduce additional logistical considerations, they provide additional realism that may further challenge and motivate students. 3. Description of any assessment methods used to evaluate the effectiveness of the contribution, Each set of modules is preceded and followed by a survey. Each individual module is preceded by a quiz and followed by another quiz, with pre- and post-quiz questions drawn from the same pool. The pre-surveys allow students to opt in or out of having their survey and quiz results used anonymously in research. 4. Statement of results. The initial modules have been and are being used by three groups of students: (1) students in an undergraduate Introduction to Communication Systems course; (2) an interdisciplinary group of engineering students, including computer science students, who are participating in related undergraduate research project; and (3) students in a graduate-level communications course that includes both electrical and computer engineers. Analysis of results from the first group of students showed statistically significant increases from pre-quiz to post-quiz for each of four modules on fundamental wireless communication concepts. Results for the other students have not yet been analyzed, but also appear to show substantial pre-quiz to post-quiz increases in mean scores. 
    more » « less
  4. Powerful corporations leverage the law to shape the regulatory environments in which they operate. A key strategy for achieving this is litigation. I ask under what conditions corporations litigate, and specifically, what happens when two repeat players, transnational agribusiness firms and local governments, face each other in court. I compare outcomes of two cases—Hawaii and Arica, Chile—documenting how different sociopolitical contexts and legal systems shape how actors engage the law. Interviews with firm managers, unions, government officials, lawyers, and advocacy organization leaders and document analysis reveal that firms seize on existing institutional norms and politics to define their localized legal strategies. Throughstrategic legalism, a defensive legal strategy that is outcome‐oriented and context‐specific, firms accomplish legal compliance and political containment of their opposition. In Hawaii, firms rely onpreemptive legality,a strategy that moves controversial issues like pesticide safety from one domain of democratic politics to another that is largely incontestable because it is preempted by a higher authority. In Chile, firms useauthoritarian legality, an approach that draws on authoritarian structures and policies within the state, to sway legal outcomes. These cases reveal the mechanisms that corporations draw on to institutionalize their power advantages through the law, offering a typology for future scholars to better understand how the strategic behavior of corporations shapes regulatory outcomes.

     
    more » « less
  5. In recent years, credit rating agencies have begun to incorporate a municipality's resilience and vulnerability to climate change into their US municipal bond rating methods. Drawing on the case of Greater Miami resilience planning and Science and Technology Studies-inspired work on inscriptive devices, I investigate how this incorporation practically happens, and how it shapes the ways that Greater Miami governments attempt to govern climate risk through resilience investments. What “counts” as resilience there, I suggest, is increasingly an effect of the observational practices of rating agencies. However, the still-emergent status of resilience as an object of knowledge among rating agencies and Greater Miami governments means that resilience retains a degree of plasticity, allowing government officials and residents alike to mobilize the term for different purposes and toward different ends. In tracing the emergent relations between rating agency practice on climate risk and local government resilience investments, the paper makes two contributions to scholarship in economic and urban geography. First, it illuminates the ways that extra-local practices of expert valuation shape the local construction of environmental fixes. Second, it offers insights into how one of the key actors of the 2007–2008 financial crisis is beginning to lay the epistemic groundwork for future economic crises and inequalities in and between cities, this time as they relate to climate change impacts and a city's supposed resilience and vulnerability to them.

     
    more » « less