{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T19:19:07Z","timestamp":1769023147411,"version":"3.49.0"},"reference-count":28,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2007,10,2]],"date-time":"2007-10-02T00:00:00Z","timestamp":1191283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10,2]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to show that the full potential of the internet has not yet been realised. One of the key reasons for this is users' declining trust in the internet. Over the past two decades, the internet has transformed many aspects of modern life. With an estimated four million users worldwide at the end of 2006, the use of the internet continues to grow. Building trust and confidence is one of the main enablers for the future growth and use of the internet. The paper aims to review some of the reasons behind the declining trust, the changing nature of cyber\u2010threats, and aims to look at cybersecurity in the context of developing countries and the specific problems these countries are facing when dealing with growing number of cyber\u2010threats.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>This contribution gives an overview of some of the evolving cyber\u2010threats and their potential impact in order to determine whether the growth of the information society is really at risk. It further considers what the different stakeholders can do to build a safer and more secure information society. The paper poses questions, outlines possible options for a way forward and based on this gives the readers a better understanding of the issues and challenges involved in building confidence and security in the use of ICTs. The paper proposes a framework with increased co\u2010operation, collaboration, and information sharing, to connect the individual cybersecurity communities and single initiatives, in order to allow stakeholders to build together a roadmap for cybersecurity.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>During the discussions leading up to and during the two phases of the World Summit on the information society, country representative participants re\u2010affirmed their commitment to deal effectively with the significant and growing problems posed by spam and other cyber\u2010threats. As no single country or entity can alone create trust, confidence and security in the use of ICTs, it is clear that increased international action is needed to address the issues involved.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>This paper tries to provide readers with a simple overview of the state of cybersecurity, and with a framework for further considering how new technologies and the growing use of the internet will impact upon stakeholders' trust in the use of ICTs.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Along with increasing dependency on ICTs, new threats to network and information security have emerged. These include growing misuse of electronic networks for criminal purposes or for objectives that can furthermore adversely affect the integrity of critical infrastructures within states. This paper puts forward some concrete suggestions on how countries could look at the issues related to cybersecurity.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14684520710832306","type":"journal-article","created":{"date-parts":[[2007,10,13]],"date-time":"2007-10-13T07:05:57Z","timestamp":1192259157000},"page":"566-582","source":"Crossref","is-referenced-by-count":9,"title":["Towards an international road\u2010map for cybersecurity"],"prefix":"10.1108","volume":"31","author":[{"given":"Christine","family":"Sund","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022021320272336200_b1","unstructured":"Anti\u2010Phishing Working Group (APWG) (2006), \u201cPhishing activity trends\u201d, Report for the Month of November 2006, available at: http:\/\/antiphishing.org\/reports\/apwg_report_november_2006.pdf."},{"key":"key2022021320272336200_b2","unstructured":"Council of Europe (CoE) (2007), \u201cConvention on cybercrime\u201d, Convention on Cybercrime, CETS No. 185, CoE, available at: www.coe.int\/economiccrime."},{"key":"key2022021320272336200_b3","unstructured":"European Schoolnet (2006), \u201cYoung people struggle to maintain their privacy online\u201d, European Schoolnet, December, available at: www.saferinternet.org\/ww\/en\/pub\/insafe\/news\/insafe_survey.htm."},{"key":"key2022021320272336200_b4","unstructured":"Farber, D. and Katz, M. (2007), \u201cHold off on net neutrality\u201d, The Washington Post, 19 January, available at: www.washingtonpost.com\/wp\u2010dyn\/content\/article\/2007\/01\/18\/AR2007011801508.html."},{"key":"key2022021320272336200_b5","unstructured":"International Telecommunication Union (ITU) (2002), \u201cInternational coordination to increase the security of critical network infrastructures\u201d, paper presented at the ITU Workshop on Creating Trust in Critical Network Infrastructures, Seoul, 20\u201022 May, available at: www.itu.int\/osg\/spu\/ni\/security\/docs\/cni.04.pdf."},{"key":"key2022021320272336200_b6","unstructured":"International Telecommunication Union (ITU) (2004), \u201cHow to craft an effective anti\u2010spam law\u201d, paper presented at the ITU WSIS Thematic Meeting on Countering Spam, Geneva, 7\u20109 July available at: www.itu.int\/osg\/spu\/spam\/contributions\/Background%20Paper_How%20to%20craft%20and%20effective%20anti\u2010spam%20law.pdf."},{"key":"key2022021320272336200_b7","unstructured":"International Telecommunication Union (2005a), \u201cITU survey on anti\u2010spam legislation worldwide 2005\u201d, paper presented at the ITU WSIS Thematic Meeting on Cybersecurity, Geneva, 28 June\u20101 July, available at: www.itu.int\/osg\/spu\/spam\/."},{"key":"key2022021320272336200_b8","unstructured":"International Telecommunication Union (ITU) (2005b), \u201cChairman's report\u201d, ITU WSIS Thematic Meeting on Cybersecurity, available at: www.itu.int\/osg\/spu\/cybersecurity\/chairmansreport.pdf."},{"key":"key2022021320272336200_b9","unstructured":"International Telecommunication Union (ITU) (2006a), \u201cITU trust and awareness survey\u201d, March\u2010May, available at: www.itu.int\/newsarchive\/press_releases\/2006\/09.html."},{"key":"key2022021320272336200_b10","unstructured":"International Telecommunication Union (ITU) (2006b), \u201cStemming the international tide of spam\u201d, Trends in Telecommunication Reform 2006, pp. 111\u201025, available at: www.itu.int\/ITU\u2010D\/treg\/publications\/Chap%207_Trends_2006_E.pdf."},{"key":"key2022021320272336200_b11","unstructured":"International Telecommunication Union (ITU) (2006c), \u201cWSIS outcome documents\u201d, WSIS Outcome Documents Booklet, Geneva, available at: www.itu.int\/wsis\/documents\/doc_multi.asp?lang=en&id=2316|0."},{"key":"key2022021320272336200_b12","unstructured":"International Telecommunication Union (ITU) (2006d), \u201cChairman's report\u201d, Partnerships for Global Cybersecurity, available at: www.itu.int\/osg\/spu\/cybersecurity\/2006\/chairmansreport.pdf."},{"key":"key2022021320272336200_b13","unstructured":"International Telecommunication Union (ITU) (2007a), \u201cWSIS action line C5 \u2013 building confidence and security in the use of ICTs\u201d, available at: www.itu.int\/wsis\/implementation\/c5\/."},{"key":"key2022021320272336200_b14","unstructured":"International Telecommunication Union (ITU) (2007b), \u201cITU\u2010T Study Group 17: main ITU study group on telecommunication security and related standards activities\u201d, available at: www.itu.int\/ITU\u2010T\/studygroups\/com17\/index.asp."},{"key":"key2022021320272336200_b15","unstructured":"International Telecommunication Union (ITU) (2007c), \u201cICT security standards roadmap\u201d, ICT Security Standards Roadmap, available at: www.itu.int\/ITU\u2010T\/studygroups\/com17\/ict\/."},{"key":"key2022021320272336200_b16","unstructured":"Interpol (2007), Regional Working Parties \u2013 Interpol Resources, available at: www.interpol.int\/Public\/TechnologyCrime\/default.asp."},{"key":"key2022021320272336200_b17","doi-asserted-by":"crossref","unstructured":"Jakobsson, M. and Ratkiewicz, J. (2006), \u201cDesigning ethical phishing experiments: a study of (ROT13) rOn\u201d, Indiana University, Bloomington, IN, available at: www2006.org\/programme\/files\/pdf\/3533.pdf.","DOI":"10.1145\/1135777.1135853"},{"key":"key2022021320272336200_b18","unstructured":"London's Metropolitan Police Service (2007), \u201cProgress of MPS e\u2010Crime Strategy\u201d, available at: www.mpa.gov.uk\/committees\/mpa\/2007\/070125\/10.htm#fn001."},{"key":"key2022021320272336200_b19","unstructured":"Messaging Anti Abuse Working Group (MAAWG) (2005), \u201cWorldwide messaging operators unite under a common code of conduct\u201d, MAAWG's 4th General Meeting, available at: www.maawg.org\/news\/maawg050510."},{"key":"key2022021320272336200_b20","unstructured":"MessageLabs (2006), \u201c2006: the year spam raised the game and threats got personal\u201d, MessageLabs, 13 December, available at: www.messagelabs.com\/resources\/press\/1459."},{"key":"key2022021320272336200_b21","unstructured":"Moses, A. (2006), \u201c2006: the year we were spammed a lot\u201d, The Sydney Morning Herald, 16 December, available at: www.smh.com.au\/news\/security\/2006\u2010the\u2010year\u2010we\u2010were\u2010spammed\u2010a\u2010lot\/2006\/12\/18\/1166290467781.html."},{"key":"key2022021320272336200_b22","unstructured":"Ollmann, G. (2004), \u201cUnderstanding and preventing phishing attacks\u201d, NISCC: The Phishing Guide, available at: www.cpni.gov.uk\/docs\/phishing_guide.pdf."},{"key":"key2022021320272336200_b23","unstructured":"Secure Computing (2006), Secure Computing Wages War Against Image Spam, Secure Computing press release, 31 October, available at: www.securecomputing.com\/image_spam_WP.cfm."},{"key":"key2022021320272336200_b24","unstructured":"Sullivan, B. (2007), \u201cSpam is back an worse than ever\u201d, The Red Tape Chronicles, 19 January, available at: http:\/\/redtape.msnbc.com\/2007\/01\/spam_is_back_an.html."},{"key":"key2022021320272336200_b25","unstructured":"VeriSign (2007), \u201cA holistic approach to security intelligence\u201d, p.3, available at: www.verisign.com\/static\/037640.pdf."},{"key":"key2022021320272336200_b26","unstructured":"WSIS (2004), \u201cB5 \u2212 Building confidence and security in the use of ICT\u201d, WSIS Geneva Declaration of Principles, available at: www.itu.int\/wsis\/docs\/geneva\/official\/dop.html."},{"key":"key2022021320272336200_b27","unstructured":"WSIS (2006a), \u201cTunis commitment\u201d, WSIS Outcome Documents, available at: www.itu.int\/wsis\/documents\/doc_multi.asp?lang=en&id=2266|2267."},{"key":"key2022021320272336200_b28","unstructured":"WSIS (2006b), \u201cTunis agenda\u201d, WSIS Outcome Documents, available at: www.itu.int\/wsis\/documents\/doc_multi.asp?lang=en&id=2266|2267."}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520710832306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710832306\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710832306\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:52Z","timestamp":1753404052000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/31\/5\/566-582\/314568"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,2]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2007,10,2]]}},"alternative-id":["10.1108\/14684520710832306"],"URL":"https:\/\/doi.org\/10.1108\/14684520710832306","relation":{},"ISSN":["1468-4527"],"issn-type":[{"value":"1468-4527","type":"print"}],"subject":[],"published":{"date-parts":[[2007,10,2]]}}}