UID:
almafu_9960010609102883
Format:
1 online resource (262 p.)
ISBN:
1-5013-1729-6
,
1-5013-0223-X
,
1-62356-570-7
Uniform Title:
Security in cyberspace (Bloomsbury Academic)
Content:
"Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual. The essays explore such issues as information ownership, censorship, cyberwars, cyberterrorism, privacy, and rebellion, bringing together expert knowledge from computer science and the social sciences with case studies. It reviews existing policies and practices and discusses the threats and benefits of living in an increasingly networked world. This authoritative analysis of one of the most controversial and compelling security debates of the twenty-first century will appeal to scholars and practitioners interested in security, international relations and policymaking."--Bloomsbury Publishing.
Note:
Description based upon print version of record.
,
List of Abbreviations -- List of Figures and Tables -- Acknowledgments -- Foreword / Carlo Schaerf -- List of Contributors -- Introduction - Security in Cybersapce / Giampiero Giacomello -- Part One: The Nation. Chapter 1: The 'State(s)' of Cybersecurity / Rossella Mattioli ; Chapter 2: Reducing Uncertainties in Cyberspace through Confidence and Capacity Building Measures / Patryk Pawlak ; Chapter 3: Wikileaks and Cyberspace / Judith Reppy ; Chapter 4: Leaks: Securing Communications and Achieving Nuclear Zero / Bruce Larkin ; Chapter 5: Establishing Norms of Behavior in Cyberspace: The Chinese Viewpoint / Chunmei Kang -- Part Two: The Infrastructure and The Individual. Chapter 6: Einstein on the Breach: Surveillance Technology, Cybersecurity and Organizational Change / Milton Mueller and Andreas Kuehn ; Chapter 7: Artificial or 'Legitimate' Barriers to Internet Governance?" / Francesco Giacomini and Laura Cordani ; Chapter 8: Public-Private Partnerships: A 'Soft' Approach to Cybersecurity? Views from the European Union / Maria Grazia Porcedda ; Chapter 9: Targeting One's Ideal Audience: Self-Presentation Practices among Extreme Nationalists on Social Networks / Andra Siibak -- Bibliography -- Index.
,
Also issued in print.
,
English
Additional Edition:
ISBN 1-322-14664-0
Additional Edition:
ISBN 1-62356-803-X
Language:
English
DOI:
10.5040/9781501302237
Bookmarklink