Preface
Final report
Table of Contents
List of Tables, Figures and Boxes
     Table 1: Number of participants in preventive education
     Table 2: Number of counselling service by type
     Table 1A: Most committed countries, GCI (normalized score)
     Table 2A: Number of participants of preventive education
     Table 3A: Number of counselling service by type
     Table 4A: Different types of services options to be provided to Government and commercial entities
     Table 5A: Different types of services options to be provided to individuals
     Table 6A: Customized template for national cybersecurity measures
     Figure 1: Cybersecurity awareness survey responses by region
     Figure 2: Importance of raising awareness on cybersecurity
     Figure 3: Public awareness campaigns in cybersecurity
     Figure 4: Importance of cybersecurity awareness for organisations / civil society
     Figure 5: Age groups of targets for cybersecurity awareness campaigns
     Figure 6: Target groups for cybersecurity awareness campaigns
     Figure 7: Most targeted by cybersecurity awareness campaigns
     Figure 8: Cybersecurity issues addressed by awareness campaigns
     Figure 9: Importance of each cybersecurity issue addressed in awareness campaigns
     Figure 10: Public informed of benefits of software/hardware or service based solutions
     Figure 11: Software/hardware or service based solutions made available to public 
     Figure 12: Vicious cycle between spam and cybersecurity
     Figure 13: Breaking the vicious cycle
     Figure 14: Overview of ACTIVE’s activities
     Figure 15: Is there an agency / entity responsible for Child Online Protection? 
     Figure 16: Is there an established public mechanism for reporting issues associated with the protection of children online?
     Figure 17: Are there any technical mechanisms and capabilities deployed to help protect children online?
     Figure 18: Has there been any activity, either by government or by NGOs, to provide support and knowledge to stakeholders (parents, community leaders, teachers, etc.) on how to protect children online?
     Figure 19: Public awareness campaigns in cybersecurity developed and implemented vs. agency/entity responsible for Child Online Protection
     Figure 20: Public awareness campaigns on Child Online Protection for children 
     Figure 21: Public awareness campaigns on Child Online Protection
     Figure 22: Public awareness campaigns on Child Online Protection for children vs. adults
     Figure 1A: GCI heat map
     Figure 2A: GCA
     Figure 3A: GCA linkages
     Figure 4A: Global cybersecurity agenda
     Figure 5A: GCI approach
     Figure 6A: Oman PKI
     Figure 7A: General framework of NCMP major processes that collectively comprise a NCMP
     Figure 8A: General scope for national cybersecurity measures
     Figure 9A: Prevention of malware infection
     Figure 10A: Damage prevention of malware infection
     Figure 11A: Removal of malware
Executive Summary
     i.	Executive summary
     ii.	Introduction
1	CHAPTER 1 − The cybersecurity awareness questionnaire
     1.1	Information gathering methods
     1.2	Analyzing data of awareness campaigns
2	CHAPTER 2 − The state of spam and malware, mitigations and regulatory aspects
     2.1	Sources of spam
     2.2	The impact of spam on the network
     2.3	The risks and mitigations of spear phishing
     2.4	Policy impact on spam
3	CHAPTER 3 − Improving national cybersecurity posture: increasing awareness and improving human resources
     3.1	Outreach campaigns
          3.1.1	Best practices for a communication program
          3.1.2	Sample communications plan
          3.1.3	Campaign strategies
          3.1.4	Measurements of success and metrics
     3.2	Additional capacity building measures
          3.2.1	Activities in Japan
          3.2.2	Activities in the Republic of Korea
          3.2.3	Activities in the CIS Region
          3.2.4	Activities in Norway
     3.3	Private-public partnerships
4	CHAPTER 4 − Child Online Protection (COP)
     4.1	Child Online Protection survey results
     4.2	Child Online Protection strategies and technical solutions
          4.2.1	COP awareness raising and related activities
          4.2.2	Strategies for Child Online Protection
5	CHAPTER 5 − Results from cybersecurity workshops
     5.1	The 1st Cybersecurity Workshop (8 September 2015)
     5.2	The 2nd Cybersecurity Workshop (19-20 April 2016)
     5.3	The 3rd Cybersecurity Workshop (26 January 2017)
6	CHAPTER 6 − Cybersecurity opportunities and challenges
     6.1	Internet addiction
     6.2	Security of electronic transactions
     6.3	Partnerships in cybersecurity
7	CHAPTER 7 − National experiences with common criteria framework for security
8	CHAPTER 8 − Conclusions and recommendations for the next study period
Abbreviations and acronyms
Annexes
Annex 1: The Global Cybersecurity Index 2017
Annex 2: Compendium on cybersecurity country case studies
Annex 3: Cybersecurity activities being conducted by organizations, private sector, and civil society
Annex 4: Contributions mapping
Annex 5: Survey questions
Annex 6: Information on ACTIVE