Format:
1 Online-Ressource (xiv, 214 Seiten)
ISBN:
9781119777564
Series Statement:
Cybersecurity set volume 1
Note:
Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 1 The "Science" of Cybersecurity in the Human and Social Sciences: Issues and Reflections -- 1.1. Introduction -- 1.2. A method? -- 1.3. Data? -- 1.4. One or more definition(s)? -- 1.5. Conclusion -- 1.6. References -- Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity -- 2.1. Introduction -- 2.2. Definition -- 2.2.1. What is a definition? -- 2.2.2. Usefulness of definitions -- 2.2.3. Rules for constructing definitions -- 2.2.4. Definitions of cybersecurity -- 2.3. Typology -- 2.3.1. What is a typology? -- 2.3.2. Usefulness of typologies -- 2.3.3. Rules for the construction of typologies -- 2.3.4. Cybersecurity typologies -- 2.4. Taxonomy -- 2.4.1. What is a taxonomy? -- 2.4.2. Usefulness of taxonomy -- 2.4.3. Rules for the construction of taxonomies -- 2.4.4. Taxonomies of cybersecurity -- 2.5. Ontologies -- 2.5.1. What is ontology? -- 2.5.2. Usefulness of ontologies -- 2.5.3. Rules for construction of ontologies -- 2.5.4. Cybersecurity ontologies -- 2.6. Conclusion -- 2.7. References -- Chapter 3 Cybersecurity and Data Protection - Research Strategies and Limitations in a Legal and Public Policy Perspective -- 3.1. Introduction -- 3.2. Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? -- 3.2.1. Potential tensions between cybersecurity and data protection -- 3.2.2. Potential synergies between cybersecurity and data protection -- 3.3. Methodological approaches and challenges for the study of cybersecurity - legal and public policy perspectives -- 3.3.1. Legal interpretation and comparison as methodological approaches to the study of cybersecurity -- 3.3.2. Public policy approaches to the study of cybersecurity
,
3.3.3. Transdisciplinary synergies between legal and public policy perspectives -- 3.4. Conclusion and outlook -- 3.5. References -- Chapter 4 Researching State-sponsored Cyber-espionage -- 4.1. Defining cybersecurity and cyber-espionage -- 4.2. Taxonomies of cyber-threats -- 4.3. The structure of this chapter -- 4.4. The significance of state-sponsored cyber-espionage -- 4.5. Research themes in state-sponsored cyber-espionage -- 4.6. Theorizing state-sponsored cyber-espionage in the social sciences -- 4.7. Research methodologies into state-sponsored cyberespionage -- 4.8. Intellectual precision and objectivity in state-sponsored cyber-espionage research -- 4.9. Detecting state actors in cyber-espionage research -- 4.10. Identifying specific state actors in cyber-espionage research -- 4.11. Conclusion: researching a transformational subject -- 4.12. References -- Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk -- 5.1. Introduction -- 5.2. The scientific approach to move from uncertainty to risk -- 5.3. Learning about the data: the exploratory phase -- 5.4. Data cleansing -- 5.5. Statistical exploration on the various variables of the dataset -- 5.6. Univariate modeling for the relevant variables -- 5.7. Multivariate and dynamic modeling -- 5.7.1. A fast-changing environment: time dependency -- 5.7.2. Causal relations -- 5.7.3. Models for prediction -- 5.8. Conclusion -- 5.9. Acknowledgments -- 5.10. References -- Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research -- 6.1. Introduction -- 6.1.1. Previous research -- 6.2. Information warfare and cybersecurity -- 6.3. Researching information warfare and cybersecurity -- 6.4. Qualitative research methodologies for information warfare and cybersecurity -- 6.4.1. Clustering of documents -- 6.4.2. Clustering of words
,
6.4.3. Word frequencies and word clouds -- 6.4.4. Text search and word trees -- 6.4.5. Example use cases of qualitative document analysis -- 6.5. An analysis of national cybersecurity strategies -- 6.5.1. Selection process for the documents -- 6.5.2. Analysis -- 6.5.3. Discussion -- 6.6. An analysis of the alignment of South Africa's Cybercrimes Bill to international legislation -- 6.6.1. Background to the documents -- 6.6.2. Analysis -- 6.6.3. Discussion -- 6.7. An analysis of the influence of classical military philosophy on seminal information warfare texts -- 6.8. Reflections on qualitative document analysis for information warfare and cybersecurity research -- 6.9. Conclusion -- 6.10. References -- Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France -- 7.1. Introduction -- 7.2. Localization of an online field -- 7.2.1. Online ethnographic work and empathy -- 7.2.2. Cybersecurity issues of an online field -- 7.3. Online-offline continuum -- 7.4. Continuum between security and insecurity -- 7.5. Conclusion -- 7.6. References -- List of Authors -- Index -- Other titles from ISTE in Information Systems, Web and Pervasive Computing -- EULA.
Additional Edition:
Erscheint auch als Druck-Ausgabe ISBN 9781786305398
Language:
English
Keywords:
Computersicherheit
;
Humanwissenschaften
;
Sozialwissenschaften
DOI:
10.1002/9781119777588
URL:
Volltext
(URL des Erstveröffentlichers)
Author information:
Aden, Hartmut 1964-
Bookmarklink