feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV042332010
    Format: 266 S. , graph. Darst. , 23 cm
    Edition: 1. ed.
    ISBN: 9783848708437
    Series Statement: Schriftenreihe des Arbeitskreises Europäische Integration e.V 83
    Note: Literaturangaben
    Additional Edition: Erscheint auch als Online-Ausgabe, PDF ISBN 978-3-8452-5028-1
    Language: English
    Subjects: Political Science
    RVK:
    Keywords: Europäische Union ; Polizei ; Internationale Kooperation ; Vertrag von Lissabon ; Berlin ; Konferenzschrift ; Konferenzschrift
    Author information: Aden, Hartmut 1964-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV047017474
    Format: 1 Online-Ressource (xiv, 214 Seiten)
    ISBN: 9781119777564
    Series Statement: Cybersecurity set volume 1
    Note: Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 1 The "Science" of Cybersecurity in the Human and Social Sciences: Issues and Reflections -- 1.1. Introduction -- 1.2. A method? -- 1.3. Data? -- 1.4. One or more definition(s)? -- 1.5. Conclusion -- 1.6. References -- Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity -- 2.1. Introduction -- 2.2. Definition -- 2.2.1. What is a definition? -- 2.2.2. Usefulness of definitions -- 2.2.3. Rules for constructing definitions -- 2.2.4. Definitions of cybersecurity -- 2.3. Typology -- 2.3.1. What is a typology? -- 2.3.2. Usefulness of typologies -- 2.3.3. Rules for the construction of typologies -- 2.3.4. Cybersecurity typologies -- 2.4. Taxonomy -- 2.4.1. What is a taxonomy? -- 2.4.2. Usefulness of taxonomy -- 2.4.3. Rules for the construction of taxonomies -- 2.4.4. Taxonomies of cybersecurity -- 2.5. Ontologies -- 2.5.1. What is ontology? -- 2.5.2. Usefulness of ontologies -- 2.5.3. Rules for construction of ontologies -- 2.5.4. Cybersecurity ontologies -- 2.6. Conclusion -- 2.7. References -- Chapter 3 Cybersecurity and Data Protection - Research Strategies and Limitations in a Legal and Public Policy Perspective -- 3.1. Introduction -- 3.2. Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? -- 3.2.1. Potential tensions between cybersecurity and data protection -- 3.2.2. Potential synergies between cybersecurity and data protection -- 3.3. Methodological approaches and challenges for the study of cybersecurity - legal and public policy perspectives -- 3.3.1. Legal interpretation and comparison as methodological approaches to the study of cybersecurity -- 3.3.2. Public policy approaches to the study of cybersecurity , 3.3.3. Transdisciplinary synergies between legal and public policy perspectives -- 3.4. Conclusion and outlook -- 3.5. References -- Chapter 4 Researching State-sponsored Cyber-espionage -- 4.1. Defining cybersecurity and cyber-espionage -- 4.2. Taxonomies of cyber-threats -- 4.3. The structure of this chapter -- 4.4. The significance of state-sponsored cyber-espionage -- 4.5. Research themes in state-sponsored cyber-espionage -- 4.6. Theorizing state-sponsored cyber-espionage in the social sciences -- 4.7. Research methodologies into state-sponsored cyberespionage -- 4.8. Intellectual precision and objectivity in state-sponsored cyber-espionage research -- 4.9. Detecting state actors in cyber-espionage research -- 4.10. Identifying specific state actors in cyber-espionage research -- 4.11. Conclusion: researching a transformational subject -- 4.12. References -- Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk -- 5.1. Introduction -- 5.2. The scientific approach to move from uncertainty to risk -- 5.3. Learning about the data: the exploratory phase -- 5.4. Data cleansing -- 5.5. Statistical exploration on the various variables of the dataset -- 5.6. Univariate modeling for the relevant variables -- 5.7. Multivariate and dynamic modeling -- 5.7.1. A fast-changing environment: time dependency -- 5.7.2. Causal relations -- 5.7.3. Models for prediction -- 5.8. Conclusion -- 5.9. Acknowledgments -- 5.10. References -- Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research -- 6.1. Introduction -- 6.1.1. Previous research -- 6.2. Information warfare and cybersecurity -- 6.3. Researching information warfare and cybersecurity -- 6.4. Qualitative research methodologies for information warfare and cybersecurity -- 6.4.1. Clustering of documents -- 6.4.2. Clustering of words , 6.4.3. Word frequencies and word clouds -- 6.4.4. Text search and word trees -- 6.4.5. Example use cases of qualitative document analysis -- 6.5. An analysis of national cybersecurity strategies -- 6.5.1. Selection process for the documents -- 6.5.2. Analysis -- 6.5.3. Discussion -- 6.6. An analysis of the alignment of South Africa's Cybercrimes Bill to international legislation -- 6.6.1. Background to the documents -- 6.6.2. Analysis -- 6.6.3. Discussion -- 6.7. An analysis of the influence of classical military philosophy on seminal information warfare texts -- 6.8. Reflections on qualitative document analysis for information warfare and cybersecurity research -- 6.9. Conclusion -- 6.10. References -- Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France -- 7.1. Introduction -- 7.2. Localization of an online field -- 7.2.1. Online ethnographic work and empathy -- 7.2.2. Cybersecurity issues of an online field -- 7.3. Online-offline continuum -- 7.4. Continuum between security and insecurity -- 7.5. Conclusion -- 7.6. References -- List of Authors -- Index -- Other titles from ISTE in Information Systems, Web and Pervasive Computing -- EULA.
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781786305398
    Language: English
    Keywords: Computersicherheit ; Humanwissenschaften ; Sozialwissenschaften
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Cover
    Author information: Aden, Hartmut 1964-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV049565396
    Format: XVII, 314 Seiten , Illustrationen
    ISBN: 9780367321093 , 9780367521998
    Series Statement: Routledge/UACES contemporary European studies
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-0-429-31668-5
    Language: English
    Subjects: Political Science
    RVK:
    Keywords: Europäische Union ; Mitgliedsstaaten ; Finanzpolitik ; Strukturfonds ; Verantwortlichkeit ; Zurechnung ; Aufsatzsammlung ; Aufsatzsammlung
    Author information: Aden, Hartmut 1964-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV042370745
    Format: 1 Online-Ressource (266 S.) , graph. Darst.
    Edition: 1. ed.
    ISBN: 9783845250281 , 9783848708437
    Series Statement: Schriftenreihe des Arbeitskreises Europäische Integration e.V 83
    Note: Literaturangaben
    Language: English
    Subjects: Political Science
    RVK:
    Keywords: Europäische Union ; Polizei ; Internationale Kooperation ; Vertrag von Lissabon ; Berlin ; Konferenzschrift ; Electronic books
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Author information: Aden, Hartmut 1964-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_1497742250
    ISBN: 9781137339881
    In: The Palgrave handbook of the European administrative system, Basingstoke [u.a.] : Palgrave Macmillan, 2015, (2015), Seite 313-326, 9781137339881
    In: 9781349464562
    In: year:2015
    In: pages:313-326
    Language: English
    Author information: Aden, Hartmut 1964-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV044945824
    Format: 1 Online-Ressource (i, 23 Seiten) , Diagramme
    ISBN: 9789461386274
    Series Statement: CEPS research report no. 2017/11 (July 2017)
    Language: English
    URL: Volltext  (kostenfrei)
    Author information: Aden, Hartmut 1964-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages