«IZVESTIYA IRKUTSKOGO GOSUDARSTVENNOGO UNIVERSITETA». SERIYA «POLITOLOGIYA. RELIGIOVEDENIE»
«THE BULLETIN OF IRKUTSK STATE UNIVERSITY». SERIES «POLITICAL SCIENCE AND RELIGION STUDIES»
ISSN 2073-3380 (Print)

List of issues > Series «Political Science and Religion Studies». 2023. Vol 45

Features of the Formation of the National Cybersecurity System of the State of Kuwait

Author(s)
L. V. Tsukanov
Abstract
The article is devoted to the analysis of the state of the national cybersecurity system of the State of Kuwait. Based on the cybersecurity standards of the International Telecommunication Union (a specialized UN agency responsible for coordinating international efforts to develop the digital sector) the author reveals the main specific features of the formation of the Kuwaiti cyber system, and also determines the level of the country's participation in the development of the international digital security system. The author comes to the conclusion that the digital system of Kuwait is formed with imbalances, and many decisions are aimed at "selective" relief of digital threats. In addition, the author draws attention to the existence of contradictions in the Kuwaiti model of international cooperation on cybersecurity issues: on the one hand, the country advocates more active participation in international processes, and, on the other hand, does not actively participate in the work of key international platforms. In addition, the sharp anti-Israeli position of the country has a certain negative impact on the Kuwaiti model of digital protection. The author notes that Kuwait is currently aimed at harmonizing the national cyber system and developing a more effective approach to international cooperation. However, to make these efforts more effective, some aspects of the existing approach need to be revisited, such as developing a model for interacting with digital companies that do business with Israel.
About the Authors
Tsukanov Leonid Vyacheslavovich, Postgraduate, Department of Oriental Studies, Department (Faculty) of International Relations, Ural Federal University named after the First President of Russia B. N. Yeltsin, 19, Mir st., Yekaterinburg, 620050, Russian Federation, e-mail: leon.tsukanov@mail.ru
For citation
Tsukanov L.V. Features of the Formation of the National Cybersecurity System of the State of Kuwait. The Bulletin of Irkutsk State University. Series Political Science and Religion Studies, 2023, vol. 45, pp. 49-58. https://doi.org/10.26516/2073- 3380.2023.45.49 (in Russian)
Keywords
Kuwait, cybersecurity, digital development strategies, public-private partnership, international cooperation, GCC.
UDC
341.231+327.83+327.7
DOI
https://doi.org/10.26516/2073-3380.2023.45.49
References
  1. Melkumyan E.S. Razvitie arabskih monarhij zaliva: proryv v budushchee [The development of the Arab monarchies of the Gulf: a breakthrough into the future]. Aziya i Afrika segodnya [Asia and Africa today], 2020, no. 2, pp. 37-42. (in Russian)
  2. Savel'ev A.G., Karasev P.A. Perspektivy regulirovaniya i snizheniya voennoj kiberugrozy [Prospects for regulation and reduction of the military cyber threat]. Bulletin of the Moscow University. Series 12, Political Science, 2018, no. 5, pp. 47-61. (in Russian)
  3. Abu-Taieh E. Cyber security crime and punishment: comparative study of the laws of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia. International Journal of Cyber Warfare and Terrorism, 2018, № . 3, pp. 46-59.
  4. al-Mutairi N.H. The Right to Privacy in the Digital Age as Expressed in a Muslim Country: A Case Study of Kuwait. Arab Law Quarterly, 2022, no. 1, pp. 1-28.
  5. Ashour S.M.K. The regional security system in the Middle East in the context of international changes since 2011. Iraqi Journal Of Political Science, 2022, no. 6, pp. 1-15.
  6. Hakmeh J. Cybercrime Legislation in the GCC Countries. Fit for Purpose? Available at: https://www.chathamhouse.org/sites/default/files/publications/research/2018-07-04-cybercrime-legislation-gcc-hakmeh-final.pdf (date of access: 21.04.2023).
  7. Hassib B., Shires J. Cybersecurity in the GCC: From Economic Development to Geopolitical Controversy. Middle East Policy, 2022, vol. 29, no. 1, pp. 90-103.
  8. Ko K. An Analysis of Cybersecurity Threats and Countermeasures in the Kuwaiti Banking Sector. Kuwait Journal of Information Technology and Decision Sciences, 2023, vol. 1, no. 1, pp. 1-8.
  9. Levac L. Kuwait: Law regarding Electronic Transactions in force – introduction of a concept akin to data privacy. Available at: https://www.globalcompliancenews.com/2015/12/11/kuwait-law-regarding-electronic-transactionsin-force-introduction-of-a-concept-akin-to-data-privacy/ (date of access: 25.04.2023).
  10. Pöpper C., Maniatakos M., Di Pietro R. Cyber Security Research in the Arab Region: A Blooming Ecosystem with Global Ambitions. Communications of the ACM, 2021, vol. 64, no. 4, pp. 96-101.
  11. Semsari M. C., Keskin O. Threats to Energy Security and Energy Policies in Central Asia and the Middle East. Handbook of Research on Cyber Approaches to Public Administration and Social Policy. IGI Global, 2022, pp. 343-364.

Full text (russian)