Description |
1 online resource (xxvi, 862 pages) : illustrations, maps |
Contents |
The Origins of Cyberspace / David J. Pym -- Intentions and Cyberterrorism / Florian J. Egloff -- Technology: Access and Denial / Caitr iona Heinl -- Cyber Espionage / Jon R. Lindsay -- Cyberwar Redux / Ben Buchanan -- On Cyber-Enabled Information Warfare and Information Operations / Herbert Lin, Jaclyn Kerr -- The Deterrence and Prevention of Cyber Conflict / Paul Cornish -- Stepping out of the Shadow: Computer Security Incident Response Teams in the Cybersecurity Ecosystem / Nicole van der Meulen -- Opportunity, Threat and Dependency in the Social Infosphere / Greg Austin -- Data Privacy and Security Law / Fred Cate, Rachel Dockery -- The 'Insider Threat' and the 'Insider Advocate' / Mike Steinmetz -- Personal Protection: 'Cyber Hygiene' / Dave Clemente -- Online Child Safety / John Carr -- Educating for Cyber (Security) / Roger Bradbury -- Securing the Critical National Infrastructure / David Mussington -- The Role of Defence in National Cybersecurity / Mika Kerttunen -- Cybersecurity Capacity Building / Lara Pace, Paul Cornish -- A Political History of Cyberspace / Madeline Carr -- Cybersecurity, Multilateral Export Control, and Standard Setting Arrangements / Elaine Korzak -- Cybersecurity, Global Commerce and International Organisations / David Fidler -- Global Trade and Cybersecurity: Monitoring, enforcement and sanctions / Franz-Stefan Gady, Greg Austin -- Semi-Formal Diplomacy: Track 1.5 and Track 2 / Nigel Inkster -- States, Proxies, and (Remote) Offensive Cyber Operations / Tim Maurer -- Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice / Melissa Hathaway -- International Law for Cyberspace: Competition and Conflict / Thomas Wingfield, Harry Wingo -- Toward a Vulnerability Mitigation Model / Jos e Eduardo Malta de S a Brand ao -- Cyber Power in International Relations / Camino Kavanagh, Tim Stevens -- Community of Common Future in Cyberspace: the Proposal and Practice of China / Tang Lan -- Look West or Look East? India at the Crossroads of Cyberspace / Arun Mohan Sukumar -- The Evolving Concept of the Japanese Security Strategy / Yoko Nitta -- Malaysia / Elina Noor -- The Russian Federation's Approach to Cybersecurity / Anton Shingarev, Anastasiya Kazakova -- Maturing Autonomous Cyber Weapons Systems: Implications for International Cyber Security and Autonomous Weapons Systems Regimes / Caitr iona Heinl -- Future Human and Behavioural Challenges of Cyber Security / Debi Ashenden -- The Future of Democratic Civil Societies in a Post-Western Cybered Era / Chris Demchak -- Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace / Roderic Broadhurst -- Future Normative Challenges / Eneken Tikk -- Conclusion / Paul Cornish -- Introduction / Paul Cornish -- Ethical Standards and 'Communication' Technologies / Onora O'Neill -- Cybersecurity Information Sharing: Voluntary Beginnings and a Mandatory Future / Stuart Murdoch -- Cybersecurity, Human Rights and Empiricism: The Case of Digital Surveillance / Jonathon Penney -- Cybersecurity in Israel: Organisation and Future Challenges / Lior Tabansky -- Rethinking the Governance of Technology in the Digital Age / Jo elle Webb -- / Tim Unwin -- Making Sense of Cybersecurity in Emerging Technology Areas / Claire Vishik, Marcello Balduccini, Michael Huth, Lawrence John -- Project Solarium 1953 and the Cyberspace Solarium Commission 2019 / Mike Steinmetz -- Assessing Harm from Cyber Crime / Eva Ignatuschtschenko -- Managing Risk: Terrorism, Violent Extremism and Anti-Democratic Tendencies in the Digital Space / Alexander Corbeil, Rafal Rohozinski -- Cyberweapons / Sandro Gaycken |
Summary |
Presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, and national level |
Bibliography |
Includes bibliographical references and index |
Notes |
Online resource; title from digital title page (viewed on December 20, 2021) |
Subject |
Computer security.
|
|
Computer networks -- Security measures.
|
|
Cyber intelligence (Computer security)
|
|
Computer Security
|
|
Cyber intelligence (Computer security)
|
|
Computer networks -- Security measures
|
|
Computer security
|
Form |
Electronic book
|
Author |
Cornish, Paul, editor.
|
LC no. |
2021940009 |
ISBN |
9780191840166 |
|
0191840165 |
|