Skip to main content

Conclusion: From Cybersecurity to Cyberpower

  • Chapter
Cybersecurity in Israel

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

  • 1425 Accesses

Abstract

This chapter recapitulates the strategic background and the distinctive phases in the evolution of Israeli cybersecurity policy and cyberpower. The strategic context is essential to comprehend past, present, and future Israeli policy. A general conclusion: While cyberspace is driven by technology, national culture and grand strategy shape cybersecurity policy and practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Karl R. Popper defined an Open Society as one in which individuals can question authority. It is not identical to democracy or capitalism, but rather does not punish individuals for expressing criticism.

  2. 2.

    We assess the share of the defence R&D as an additional 1–1.5 % of the GDP, thus bringing the Israeli R&D expenditure close to 6 % of the GDP. See Chap. 3 above.

References

  • Freedman L (2013) Strategy: a history. Oxford University Press, Oxford

    Google Scholar 

  • Popper KR (1945) The open society and its enemies. G. Routledge & Sons, London

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 The Author(s)

About this chapter

Cite this chapter

Tabansky, L., Ben Israel, I. (2015). Conclusion: From Cybersecurity to Cyberpower. In: Cybersecurity in Israel. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-18986-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18986-4_10

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18985-7

  • Online ISBN: 978-3-319-18986-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics