Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter December 4, 2012

Cybersecurity Policy-Making at the Local Government Level: An Analysis of Threats, Preparedness, and Bureaucratic Roadblocks to Success

  • Kiki Caruson EMAIL logo , Susan A. MacManus and Brian D. McPhee

Abstract

Cybersecurity is a serious and complex problem that is escalating at all levels, yet little research has examined the issue at the local government level. This probative study, based on an extensive e-survey of Florida county officials, focuses on: (1) the incidence of cyber attacks – type, source (internal vs. external), and severity (major, minor); (2) perceived threats to agency operations – internally and externally from utility and telecommunications companies, financial institutions, hospitals, and schools; (3) the current status of cybersecurity planning; (4) the urgency of unmet preparedness-related needs; and (5) the degree to which financial, personnel, and organizational roadblocks have deterred the development of comprehensive cybersecurity plans. Controls are made for agency size and type of position held. The study finds that the knowledge or awareness gap between IT professionals and generalist and specialist public administrators is even wider at the local than at the federal (or state) levels. Preparedness lags because of this knowledge gap. There is little sense of urgency, partially because many non-IT officials have little understanding of newer, more dangerous cyber threats and cyber crime.


Corresponding author: Kiki Caruson, Department of Government and International Affairs, University of South Florida, 4202 East Fowler Avenue, SOC 107, Tampa, FL 33620, USA

  1. 1

    Response rates to our earlier mail statewide surveys of local government professionals were 21% (2004 survey) and 24% (2007 survey). Those surveys were related to homeland security and emergency management issues.

  2. 2

    Sixty-four percent of the survey respondents are from larger counties with populations >100,000; 29% from counties with populations ranging from 25,000 to 100,000; and 7% from small counties (below 25,000). Comparatively, among Florida’s 67 counties, 51% have populations >100,000; 30% between 25,000 and 100,000; and 19% <25,000. Thus, the survey respondents, like the population overall, are disproportionately located in larger counties.

  3. 3

    Other research has used this same approach (Reddick 2010). The author of a national survey of city managers examining homeland security preparedness argues that this approach is more appropriate when the purpose of the research is to “develop future research themes on homeland security and adaptive management” and to “determine the intensity of responses” (Reddick 2010: p. 89). He also uses crosstabs to control for variations in city size.

  4. 4

    χ2 significant at the 0.05 level.

  5. 5

    χ2 significant at the 0.01 level.

  6. 6

    χ2 significant at the 0.05 level.

  7. 7

    χ2 significant at the 0.01 level.

  8. 8

    χ2 significant at the 0.04 level.

  9. 9

    χ2 significant at the 0.05 level.

  10. 10

    χ2 significant at the 0.05 level.

  11. 11

    χ2 significant at the 0.05 level.

  12. 12

    χ2 significant at the 0.05 level.

  13. 13

    χ2 significant at the 0.05 level.

  14. 14

    In the post 9/11 period, Florida experienced an anthrax death in south Florida, the flight school training of the terrorists who flew into the World Trade Centers, and the arrest of seven men who planned to blow up Chicago’s Sears Tower and the FBI headquarters in Miami.

  15. 15

    The greatest concerns were lack of money, followed by personnel limitations, technology/interoperability (equipment), lack of external cooperation, and lack of clear plan/roles (Reddick 2010: p. 97).

  16. 16

    CSO (2010) included some federal, state, and local officials in their analysis, although most of their survey respondents came from the private sector (IT and security professionals).

References

Agranoff, Robert (2007) Managing Within Collaboration: Adding Value to Public Organizations. Georgetown University Press: Washington, DC.Search in Google Scholar

Caruson, Kiki and Susan A. MacManus (2006) “Mandates and Management Challenges in the Trenches: An Intergovernmental Perspective of Homeland Security,” Public Administration Review, 66:522–536.10.1111/j.1540-6210.2006.00613.xSearch in Google Scholar

Caruson, Kiki and Susan A. MacManus (2011) “Gauging Disaster Vulnerabilities at the Local Level: Divergence and Convergence in an ‘All-Hazards’ System,” Administration and Society, 43:346–371.10.1177/0095399711400049Search in Google Scholar

CDW-G (2009) CDW-G Federal Cybersecurity Report: Danger on the Front Lines. Available at: http://webobjects.cdw.com/webobjects/media/pdf/Newsroom/2009-CDWG-Federal-Cybersecurity-Report-1109.pdf.Search in Google Scholar

Chabinsky, Steven R. (2009). “Statement before the Senate Judiciary Committee Subcommittee on Terrorism and Homeland Security,” November 17.Search in Google Scholar

Cooper, Brian and Maria Philips (2010) Custom Surveys Within Your Budget. Paramount Market Publishing, Inc.: Ithaca, NY.Search in Google Scholar

CSO (Chief Security Officer) Magazine (2010) 2010 Cyber Security Watch Survey. Available at: http://www.csoonline.com/documents/pdfs/2010CyberSecurity Results.pdf.Search in Google Scholar

Deloitte (2010) Cyber Crime: A Clear and Present Danger: Combating the Fastest Growing Cyber Security Threat. Deloitte & Touche Center for Security & Privacy Solutions. Available at: http://www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/Documents/AERS/us_aers_Deloitte%20Cyber%20Crime%20POV%20Jan252010.pdf.Search in Google Scholar

Eysenbach, G. (2004) “Improving the Quality of Web Surveys: The Checklist for Reporting Results of Internet E-Surveys,” Journal of Medical Internet Resources, 6:34.10.2196/jmir.6.3.e34Search in Google Scholar

Gohring, Nancy (2011) “Cybercrime Getting Easier to Commit, Federal Agents Say,” PCWorld. Available at: http://www.pcworld.com/article/241388/cybercrime_getting_easier_to_commit_federal_agents_say.html.Search in Google Scholar

Hayes, James K. and Charles K. Ebinger (2011) “The Private Sector and the Role of Risk and Responsibility in Securing the Nation’s Infrastructure,” Journal of Homeland Security and Emergency Management, 8(1).10.2202/1547-7355.1597Search in Google Scholar

Hewlett-Packard Development Company (2010) Secure Your Network: 2010 Top Cyber Security Risks Report. Available at: http://dvlabs.tippingpoint.com/img/FullYear2010%20Risk%20Report.pdf.Search in Google Scholar

Hoover, J. Nicholas (2009) “Government IT Confronts Security Treats Daily,” InformationWeek, November 12. Available at: http://www.informationweek.com/government/security/government-it-confronts-security-threats/221601320.Search in Google Scholar

Janairo, Edward (2002) “States Fight Against Cyber-Terrorism,” State Government News, (March). Available at: http://www.csg.org/knowledgecenter/docs/sgn0203StatesFightCyber-Terrorism.pdf.Search in Google Scholar

Kemp, Roger L. (ed.)(2010) Homeland Security: Best Practices For Local Governments, 2nd edition. ICMA Press: Washington, DC.Search in Google Scholar

Lawson, Sean (2011) “Working Paper: Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History. Mercatus Center, George Mason University.” Available at: http://mercatus.org/sites/default/files/publication/beyond-cyber-doom-cyber-attack-scenarios-evidence-history.pdf.Search in Google Scholar

Lohrmann, Dan (2010) “5 Reasons Cybersecurity Should Be a Top Priority,” Governing, Available at: http://www.governing.com/five-reasons-why-cybersecurity-should-be-prioirty-public-officials.html.Search in Google Scholar

MacManus, Susan A. and Kiki Caruson (2011) “Research Note: Emergency Management: Gauging the Extensiveness and Quality of Public and Private Sector Collaboration at the Local Level,” Urban Affairs Review, 47:280–299.10.1177/1078087410362050Search in Google Scholar

Page, Doug (2005) “Cyber Insecurity,” Homeland1.com. Available at: http://www.homeland1.com/homeland-security-products/cyber-security/articles/397559-cyber-insecurity/.Search in Google Scholar

Ponemon, Larry (2009) Cyber Security Mega Trends: Study of IT Leaders in the U.S. Federal Government. Ponemon Institute: Traverse City, Michigan.Search in Google Scholar

Prieto, Daniel B. and Steven Bucci (2010) “Meeting the Cybersecurity Challenge: Empowering Stakeholders and Ensuring Coordination.” PRIETO AND BUCCI U.S. Federal White Paper. Available at: https://www-304.Prieto and Bucci.com/easyaccess3/fileserve?contentid=192188.Search in Google Scholar

PRNewswire (2011) “Cybersecurity Challenges, Opportunities Explored at CompTTA Breakaway 2000.” Available at: www.prnewswire.com/news-releases/cybersecurity-challenges-opportunities-explored.Search in Google Scholar

Reddick, Christopher G. (2010) “Homeland Security Preparedness and City Governments,” In: (Roger L. Kemp. ed.) Homeland Security: Best Practices For Local Governments, 2nd edition. ICMA Press: Washington, DC, pp. 85–102.Search in Google Scholar

Spizziri, Martha (2000) “E-surveys: Consider This Before You Start.” American Society of Business Publication Editors (ASBPE). Available at: http://www.asbpe.org/archives/2000/07esurveys.htm.Search in Google Scholar

U.S. Department of Homeland Security (2009) “Supplemental Resource: Cyber Security Guidance, Homeland Security Grant Program, Fiscal Year 2010.” Available at: http://www.fema.gov/pdf/government/grant/2010/fy10_hsgp_cyber.pdf.Search in Google Scholar

U.S. Government Accountability Office (GAO) (2005) “Information Security: Emerging Cybersecurity Issues Threaten Federal Information Systems.” Available at: http://www.gao.gov/new.items/d05231.pdf.Search in Google Scholar

Worthen, Ben. (2010) “Most People Don’t Understand Cyber Threats, Says Former DHS Chief,” Digits: Technology News and Insights, The Wall Street Journal. Available at: http://blogs.wsj.com/digits/2010/03/03/most-people-don%E2%80%99t-understand-cyber-threats-says-former-dhs-chief.Search in Google Scholar

Wybourne, Martin N, Martha F. Austin and Charles C. Palmer (2009) “National Cyber Security: Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior; A Report to the Chairman and Ranking Member of the U.S. Senate Committee on Homeland Security and Government Affairs,” I3P:Institute for Information Infrastructure Protection, Hanover, N.H: College, Available at: http://www.thei3p.org.Search in Google Scholar

Published Online: 2012-12-04

©2012 Walter de Gruyter GmbH & Co. KG, Berlin/Boston

Downloaded on 26.2.2025 from https://www.degruyter.com/document/doi/10.1515/jhsem-2012-0003/html
Scroll to top button