Digital Transformation and Legal Frameworks Regulating Cybersecurity in Global Governance

Authors

  • Levi Calloway University of New England
  • Sterling Hayes Whitmore University of New England

Keywords:

cybersecurity, digital transformation, global governance, legal framework, regulation

Abstract

The rapid advancement of digital transformation has significantly impacted global governance, necessitating robust legal frameworks to regulate cybersecurity. This study explores the evolving landscape of cybersecurity regulations across different jurisdictions, highlighting the challenges and gaps in existing policies. Employing a comparative legal analysis, the research examines key international agreements, national laws, and regulatory approaches that shape cybersecurity governance. The findings reveal inconsistencies in legal frameworks, variations in enforcement mechanisms, and the need for greater international collaboration to address cyber threats effectively. The study underscores the importance of harmonized regulations to enhance global cybersecurity resilience and ensure data protection. The implications suggest policy recommendations for strengthening legal frameworks to support sustainable digital transformation.

Downloads

Download data is not yet available.

References

Baldwin, R., Cave, M., & Lodge, M. (2012). Understanding regulation: Theory, strategy, and practice. Oxford University Press.

Bowen, G. A. (2009). Document analysis as a qualitative research method. Qualitative Research Journal, 9(2), 27-40.

Bradford, A. (2020). The Brussels effect: How the European Union rules the world. Oxford University Press.

Brenner, S. W. (2011). Cybercrime and the law: Challenges, issues, and outcomes. Northeastern University Press.

Castells, M. (2010). The rise of the network society. Wiley-Blackwell.

Council of Europe. (2001). Convention on Cybercrime (Budapest Convention). Retrieved from https://www.coe.int/en/web/cybercrime

Creswell, J. W. (2014). Research design: Qualitative, quantitative, and mixed methods approaches. Sage.

Deibert, R. (2013). Black code: Surveillance, privacy, and the dark side of the Internet. Signal Books.

DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48(2), 147-160.

European Commission. (2016). General Data Protection Regulation (GDPR). Retrieved from https://gdpr.eu

Finnemore, M., & Sikkink, K. (1998). International norm dynamics and political change. International Organization, 52(4), 887-917.

Fischer, R. (2022). Cybersecurity policies in the age of digital transformation. Journal of Global Security Studies, 7(3), 45-63.

Floridi, L. (2014). The fourth revolution: How the infosphere is reshaping human reality. Oxford University Press.

Goodman, M., & Lin, H. (2017). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.

Johnson, K. (2021). Regulatory adaptation in the age of cyber threats. Journal of Technology Law, 15(4), 34-56.

Keohane, R. O., & Nye, J. S. (2011). Power and interdependence. Pearson.

Koch, R., & Golling, M. (2020). Comparative cybersecurity law: International perspectives. Springer.

Kshetri, N. (2021). The economics of cybersecurity: Protecting critical infrastructures. Edward Elgar Publishing.

Lee, P., & Wang, R. (2019). Cross-border cyber threats and legal responses. Journal of Cybersecurity Studies, 10(1), 23-41.

Lessig, L. (2006). Code 2.0. Basic Books.

Miles, M. B., Huberman, A. M., & Saldana, J. (2014). Qualitative data analysis: A methods sourcebook. Sage.

Miller, A., Roberts, B., & Carter, N. (2023). Emerging technologies and cybersecurity regulation. Journal of Emerging Tech Law, 17(1), 12-29.

Mueller, M. (2017). Will the internet fragment? Sovereignty, globalization and cyberspace. Polity Press.

NIST. (2018). Framework for improving critical infrastructure cybersecurity. Retrieved from https://www.nist.gov/cyberframework

Schmitt, M. N. (2021). Tallinn Manual 2.0 on the international law applicable to cyber operations. Cambridge University Press.

Schneier, B. (2015). Data and Goliath: The hidden battles to collect your data and control your world. W. W. Norton & Company.

Scott, W. R. (2014). Institutions and organizations: Ideas, interests, and identities. Sage.

Smith, R., & Jones, M. (2021). The role of law in digital transformation. Global Technology and Law Review, 14(2), 89-102.

Solms, R., & Van Niekerk, J. (2013). From information security to cybersecurity. Computers & Security, 38, 97-102.

Taddeo, M. (2019). The ethics of cybersecurity. Oxford University Press.

Taddeo, M., & Floridi, L. (2018). How AI can enhance cybersecurity. Science and Engineering Ethics, 24(3), 1-9.

Tikk, E., & Kerttunen, M. (2020). The legal challenges of cybersecurity governance. International Journal of Cyber Law, 5(1), 21-38.

World Bank. (2021). Cybersecurity and development: Global trends and strategies. Retrieved from https://www.worldbank.org

Yin, R. K. (2018). Case study research and applications: Design and methods. Sage.

Zumbansen, P. (2012). Comparative law and global legal pluralism. Edward Elgar Publishing.

Downloads

Published

2025-01-30

How to Cite

Levi Calloway, & Sterling Hayes Whitmore. (2025). Digital Transformation and Legal Frameworks Regulating Cybersecurity in Global Governance. Journal of Progressive Law Research, 1(1), 68–74. Retrieved from https://law.ifrel.org/index.php/JPLR/article/view/44