Cyber Security Politics
Socio-Technological Transformations and Political Fragmentation
Herausgeber: Dunn Cavelty, Myriam; Wenger, Andreas
Cyber Security Politics
Socio-Technological Transformations and Political Fragmentation
Herausgeber: Dunn Cavelty, Myriam; Wenger, Andreas
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation.
Andere Kunden interessierten sich auch für
- Cyber Security Education58,99 €
- Gordon CoreraRussians Among Us30,99 €
- Samuli HaatajaCyber Attacks and International Law on the Use of Force63,99 €
- Gary WatersAustralia and Cyber-warfare26,99 €
- Jack A JarmonThe Cyber Threat and Globalization61,99 €
- Lieutenant Commander Bharat SinghPresent and Emerging Threats to National Security in Digital and Cyber Space31,99 €
- Nigel InksterChina's Cyber Power28,99 €
-
-
-
This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Routledge
- Seitenzahl: 288
- Erscheinungstermin: 27. Mai 2024
- Englisch
- Abmessung: 234mm x 156mm x 16mm
- Gewicht: 442g
- ISBN-13: 9780367626648
- ISBN-10: 0367626640
- Artikelnr.: 70342963
- Verlag: Routledge
- Seitenzahl: 288
- Erscheinungstermin: 27. Mai 2024
- Englisch
- Abmessung: 234mm x 156mm x 16mm
- Gewicht: 442g
- ISBN-13: 9780367626648
- ISBN-10: 0367626640
- Artikelnr.: 70342963
Myriam Dunn Cavelty is deputy head of research and teaching at the Center for Security Studies (CSS), ETH Zurich, Switzerland. Andreas Wenger is professor of international and Swiss security policy at ETH Zurich and director of the Center for Security Studies (CSS), Switzerland.
1. Introduction: Cyber security between socio-technological uncertainty and
political fragmentation Part I: Socio-technical transformations and cyber
conflict trends 2. Influence operations and other conflict trends 3. A
threat to democracies? An overview of theoretical approaches and empirical
measurements for studying the effects of disinformation 4. Cultural
violence and fragmentation on social media: Interventions and
countermeasures by humans and social bots 5. Artificial intelligence and
the offence-defense balance in cyber security 6. Quantum computing and
classical politics: The ambiguity of advantage in signals intelligence 7.
Cyber space in space: Fragmentation, vulnerability, and uncertainty Part
II: Political responses in a complex environment 8. Cyber uncertainties:
Observations from cross-national wargames 9. Uncertainty and the study of
cyber deterrence: The case of Israel's limited reliance on cyber deterrence
10. Cyber securities and cyber security politics: Understanding different
logics of German cyber security policies 11. Battling the bear: Ukraine's
approach to national cyber and information security 12. Uncertainty,
fragmentation, and international obligations as shaping influences: Cyber
security policy development in Albania 13. Big tech's push for norms to
tackle uncertainty in cyberspace 14. Disrupting the second oldest
profession: The impact of cyber on intelligence 15. Understanding
transnational cyber attribution: Moving from 'whodunit' to who did it 16.
Conclusion: The ambiguity of cyber security politics in the context of
multidimentional uncertainty
political fragmentation Part I: Socio-technical transformations and cyber
conflict trends 2. Influence operations and other conflict trends 3. A
threat to democracies? An overview of theoretical approaches and empirical
measurements for studying the effects of disinformation 4. Cultural
violence and fragmentation on social media: Interventions and
countermeasures by humans and social bots 5. Artificial intelligence and
the offence-defense balance in cyber security 6. Quantum computing and
classical politics: The ambiguity of advantage in signals intelligence 7.
Cyber space in space: Fragmentation, vulnerability, and uncertainty Part
II: Political responses in a complex environment 8. Cyber uncertainties:
Observations from cross-national wargames 9. Uncertainty and the study of
cyber deterrence: The case of Israel's limited reliance on cyber deterrence
10. Cyber securities and cyber security politics: Understanding different
logics of German cyber security policies 11. Battling the bear: Ukraine's
approach to national cyber and information security 12. Uncertainty,
fragmentation, and international obligations as shaping influences: Cyber
security policy development in Albania 13. Big tech's push for norms to
tackle uncertainty in cyberspace 14. Disrupting the second oldest
profession: The impact of cyber on intelligence 15. Understanding
transnational cyber attribution: Moving from 'whodunit' to who did it 16.
Conclusion: The ambiguity of cyber security politics in the context of
multidimentional uncertainty
1. Introduction: Cyber security between socio-technological uncertainty and
political fragmentation Part I: Socio-technical transformations and cyber
conflict trends 2. Influence operations and other conflict trends 3. A
threat to democracies? An overview of theoretical approaches and empirical
measurements for studying the effects of disinformation 4. Cultural
violence and fragmentation on social media: Interventions and
countermeasures by humans and social bots 5. Artificial intelligence and
the offence-defense balance in cyber security 6. Quantum computing and
classical politics: The ambiguity of advantage in signals intelligence 7.
Cyber space in space: Fragmentation, vulnerability, and uncertainty Part
II: Political responses in a complex environment 8. Cyber uncertainties:
Observations from cross-national wargames 9. Uncertainty and the study of
cyber deterrence: The case of Israel's limited reliance on cyber deterrence
10. Cyber securities and cyber security politics: Understanding different
logics of German cyber security policies 11. Battling the bear: Ukraine's
approach to national cyber and information security 12. Uncertainty,
fragmentation, and international obligations as shaping influences: Cyber
security policy development in Albania 13. Big tech's push for norms to
tackle uncertainty in cyberspace 14. Disrupting the second oldest
profession: The impact of cyber on intelligence 15. Understanding
transnational cyber attribution: Moving from 'whodunit' to who did it 16.
Conclusion: The ambiguity of cyber security politics in the context of
multidimentional uncertainty
political fragmentation Part I: Socio-technical transformations and cyber
conflict trends 2. Influence operations and other conflict trends 3. A
threat to democracies? An overview of theoretical approaches and empirical
measurements for studying the effects of disinformation 4. Cultural
violence and fragmentation on social media: Interventions and
countermeasures by humans and social bots 5. Artificial intelligence and
the offence-defense balance in cyber security 6. Quantum computing and
classical politics: The ambiguity of advantage in signals intelligence 7.
Cyber space in space: Fragmentation, vulnerability, and uncertainty Part
II: Political responses in a complex environment 8. Cyber uncertainties:
Observations from cross-national wargames 9. Uncertainty and the study of
cyber deterrence: The case of Israel's limited reliance on cyber deterrence
10. Cyber securities and cyber security politics: Understanding different
logics of German cyber security policies 11. Battling the bear: Ukraine's
approach to national cyber and information security 12. Uncertainty,
fragmentation, and international obligations as shaping influences: Cyber
security policy development in Albania 13. Big tech's push for norms to
tackle uncertainty in cyberspace 14. Disrupting the second oldest
profession: The impact of cyber on intelligence 15. Understanding
transnational cyber attribution: Moving from 'whodunit' to who did it 16.
Conclusion: The ambiguity of cyber security politics in the context of
multidimentional uncertainty