Cybersecurity in Gulf Cooperation Council Economies

  • Nir Kshetri
Chapter

Abstract

This chapter examines the cybersecurity landscape of the six Gulf Cooperation Council economies. Key elements of data protection regulations in these economies draw on a number of frameworks such as the Shari’ah principles, U.S. data privacy laws, EU data protection directive, UN Model Laws on e-commerce and electronic signatures and other sources. This chapter examines CS regulations in these economies, their principal triggers, drivers and facilitators as well as challenges facing these economies on the CS front. Also analyzed in the chapter are similarities and differences of these economies’ CS frameworks with those of the EU and the U.S. For the U.S. and other Western countries, the strategic significance of GCC economies’ CS initiatives is growing due to the fact that these economies are involved in intelligence gathering and sharing about key issues such as Iranian arms, and their rapidly growing CS market due primarily to some of the high profile cyber-attacks faced by some of the GCC economies has created opportunities for Western technology firms specializing in CS.

Keywords

Saudi Arabia Data Protection United Arab Emirate Gulf Cooperation Council Free Zone 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Allison, A. (2013). The hidden value of IT departments. MEED: Middle East Economic Digest, 57(18), 41.Google Scholar
  2. Al-Saud, N. B. A. (2012). Cybersecurity strategies. JFQ: Joint Force Quarterly, 64, 75–81 (1st Quarter).Google Scholar
  3. arabianindustry.com. (2013, August 1). Saudi Electricity Company’s IT transformation. http://arabianindustry.com/utilities/features/2013/aug/1/saudi-electricity-companys-it-transformation-4391218/#.VA8IPVcaTIY
  4. arabnews.com. (2014). 400,000 porn sites blocked by CITC. http://www.arabnews.com/news/598441
  5. Brenner, J. F. (2013). Eyes wide shut: The growing threat of cyber attacks on industrial control systems. Bulletin of the Atomic Scientists, 69(5), 15–20.CrossRefGoogle Scholar
  6. Bronk, C. (2014). Hacks on gas: Energy, cybersecurity, and U.S. defense. The James A. Baker Iii Institute For Public Policy, Rice University.Google Scholar
  7. Burgers, R., Baars, H., Adriaensen, M., & Raja, A. (2014). Middle East needs cyber security from within utilities face energy threat. DNV KEMA Energy & Sustainability.Google Scholar
  8. businessweekme.com. (2014). Fallout from the Saudi Aramco breach continues. http://businessweekme.com/Bloomberg/newsmid/190/newsid/35
  9. Carr, J. (2012). Why wasn’t Saudi Aramco’s oil production targeted? http://jeffreycarr.blogspot.de/2012/09/why-wasnt-saudi-aramcos-oil-production.html
  10. Cornish, J. (2013). Data protection and privacy laws in the Middle East. Latham & Watkins LL. http://www.jdsupra.com/legalnews/data-protection-and-privacy-laws-in-the-24928/
  11. Cornwell, A. (2014). Cyber attacks an increasing threat for Mideast oil and gas. http://gulfnews.com/business/oil-gas/cyber-attacks-an-increasing-threat-for-mideast-oil-and-gas-1.1399982
  12. dnaindia.com. (2013). Saudi Arabia to ban WhatsApp soon. http://www.dnaindia.com/scitech/report-saudi-arabia-to-ban-whatsapp-soon-1850251
  13. Eduard, K. (2014). Website of Kuwait’s Ministry of Interior Hacked and Defaced. http://news.softpedia.com/news/Website-of-Kuwait-s-Ministry-of-Interior-Hacked-and-Defaced-435068.shtml
  14. El-Guindy, M. N. (2013). Middle East Cyber Security Threat Report 2014. http://netsafe.me/category/cybercrime/
  15. Elliott, S. (2012). Privacy and data interception in Saudi Arabia. http://www.privacydatasecurityblog.com/2012/06/08/privacy-and-data-interception-in-saudi-arabia/
  16. Fielding-Smith, A. (2013). Middle East cyber crimes force concerted response from banks. http://www.ft.com/intl/cms/s/0/28010fda-25f1-11e3-8ef6-00144feab7de.html#axzz2osZmvj8v
  17. financierworldwide.com. (2013). Talking point: Cyber security and data protection in the Middle East. http://www.financierworldwide.com/article.php?id=11296&page=2
  18. gartner.com. (2013). Gartner says The Middle East and Africa IT infrastructure spending to reach US$ 4 billion. http://www.gartner.com/newsroom/id/2347215
  19. gitex.com. (2013). MENA outpacing most of world in cloud computing growth. http://www.gitex.com/Content/MENA-outpacing-most-of-world-in-cloud-computing-growth
  20. globalvoicesonline.org. (2014). 7 Cases that prove online activism is under siege in Saudi Arabia. http://advocacy.globalvoicesonline.org/2014/07/15/7-cases-that-prove-online-activism-is-under-siege-in-saudi-arabia/
  21. gulfnews.com. (2012). Oman forum calls for tough laws against cybercrime. http://gulfnews.com/news/gulf/oman/oman-forum-calls-for-tough-laws-against-cybercrime-1.1035332
  22. Hermida, A. (2002). Saudis block 2,000 websites. http://news.bbc.co.uk/2/hi/technology/2153312.stm
  23. Idlebi, N. (2008, February). Cyber legislation in the ESCWA region security issues. UN-Economic and Social Commission for Western Asia, Data Protection and Privacy (DP&P)Google Scholar
  24. ITA. (2011). Electronic transactions law. Information Technology Authority (ITA). http://www.ita.gov.om/ITAPortal/MediaCenter/Document_detail.aspx?NID=56
  25. jpost.com. (2013, June 9). US aids Gulf allies to counter Iran cyber-attacks. http://www.jpost.com/Iranian-Threat/News/US-aids-allies-defend-against-Iran-cyber-attacks-315903
  26. Khaleej Times (United Arab Emirates). (2014, August). GCC cloud market to post seven-fold growth by 2020. http://www.khaleejtimes.com/article/20140821/ARTICLE/308219895/1037
  27. Knickmeyer, E. (2013). After cyberattacks, Saudi steps up online security. http://blogs.wsj.com/middleeast/2013/08/26/after-cyberattacks-saudi-steps-up-online-security/
  28. KPMG. (2012). International executive services: Thinking beyond borders Kuwait. KPMG International.Google Scholar
  29. Kshetri, N., & Murugesan, S. (2013). EU and US cybersecurity strategies: Impacts on businesses and consumers. IEEE Computer, 46(10), 84–88.CrossRefGoogle Scholar
  30. menafn.com. (2011). Rate of cyber crimes in Qatar negligible: Official, MENAFN, The Peninsula. http://www.menafn.com/menafn/qn_news_story_s.aspx?storyid=1093423127
  31. Mustafa, A. (2014). UAE to double security budget, focus on cyber. http://mobile.defensenews.com/article/302240015
  32. Nusca, A. (2014). It’s time for corporate boards to tackle cybersecurity. Here’s why. Fortune.com. 1-1.
  33. O’Connell, N. (2012). Data protection and privacy issues in the Middle East. http://www.legal500.com/c/united-arab-emirates/developments/17454
  34. Ratnam, G. (2014). Pentagon aiding allies on cybersecurity in Gulf to Asia. http://www.bloomberg.com/news/2014-03-31/pentagon-aiding-allies-on-cybersecurity-in-gulf-to-asia.html
  35. Saudi Gazette. (2014). 38 percent Saudi companies unsure about cyber security. https://en-maktoob.news.yahoo.com/38-percent-saudi-companies-unsure-cyber-security-084219081.html
  36. saudigazette.com.sa. (2014). Haia asks ministry to arrest blasphemers. http://www.saudigazette.com.sa/index.cfm?method=home.regcon&contentid=20140819215183
  37. Schwentker, R. B. (2013). Cyber warfare – The new reality. Infrastructure, 52(3), 1–5 (cover story).Google Scholar
  38. scidev.net. (2013). Gulf countries ‘need early-warning on cyber attacks’. http://www.scidev.net/global/technology/news/gulf-countries-need-early-warning-on-cyber-attacks.html
  39. Smythe, C. (2013). Eight charged with debit card cyber-crime targeting banks. http://www.bloomberg.com/news/2013-05-09/eight-charged-with-debit-card-cyber-crime-targeting-banks.html
  40. The peninsulaqatar. (2014). Cyber attacks: Qatar third most targeted. http://thepeninsulaqatar.com/news/qatar/303181/cyber-attacks-qatar-third-most-targeted
  41. thepeninsulaqatar.com. (2013). Energy, water and cyber security top goals. http://thepeninsulaqatar.com/news/qatar/262025/energy-water-and-cyber-security-top-goals
  42. United Nations. (2007, August). National profile of the information society in Kuwait. Economic and Social Commission for Western Asia (Escwa), United Nations.Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Nir Kshetri
    • 1
  1. 1.University of North CarolinaGreensboroUSA

Personalised recommendations