Volume 11 (2014)
Volume 7 (2010)
Volume 6 (2009)
Volume 5 (2008)
Most Downloaded Articles
- Disaster Resilience Indicators for Benchmarking Baseline Conditions by Cutter, Susan L./ Burton, Christopher G. and Emrich, Christopher T.
- Review of Building an Enterprise-Wide Business Continuity Program by Franklin, Charlotte
- Vulnerability of U.S. Cities to Environmental Hazards by Borden, Kevin A./ Schmidtlein, Mathew C./ Emrich, Christopher T./ Piegorsch, Walter W. and Cutter, Susan L.
- The Evolving Role of the Public Information Officer: An Examination of Social Media in Emergency Management by Hughes, Amanda L. and Palen, Leysia
Cybersecurity and US Legislative Efforts to address Cybercrime
1Department of Criminal Justice, University of the District of Columbia, Washington DC, USA
2Department of Computer Science and Information Technology, University of the District of Columbia, Washington DC, USA
Citation Information: Journal of Homeland Security and Emergency Management. Volume 10, Issue 1, Pages 29–55, ISSN (Online) 1547-7355, ISSN (Print) 2194-6361, DOI: 10.1515/jhsem-2012-0007, April 2013
- Published Online:
Deficiencies in cybersecurity may be the greatest national security threat facing the US in the 21st century. Public and private sector organizations as well as individuals are vulnerable, and the nation’s critical infrastructures are also put at risk by these deficiencies. Security professionals, designers, and engineers are currently faced with the challenge of securing cyberspace. Essential to this effort is the necessity to ensure that the nation’s laws are adequate to protect against, prevent, and deter cyberattacks. In this article we present a comprehensive review of current US laws and regulations that are being used to deter cybercrime activities and support cybersecurity. We describe legislation presented in the 112th Congress aimed at strengthening laws in fighting cybercrimes and ensuring a high level of cybersecurity, and we briefly review legislative efforts being undertaken in other countries. Finally, we discuss some future issues to be addressed in the growing area of cyberlaw.