Security in cyberspace: targeting nations, infrastructures, individuals

"Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and...

Full description

Saved in:  
Bibliographic Details
Contributors: Giacomello, Giampiero (Editor)
Format: Print Book
Language:English
Published: New York [u.a.] Bloomsbury 2014
In:Year: 2014
Online Access: Cover (Verlag)
Inhaltsverzeichnis (Verlag)
Availability in Tübingen:Present in Tübingen.
UB: KB 20 A 8012
Check availability: HBZ Gateway
Subito Delivery Service: Order now.
Keywords:

MARC

LEADER 00000cam a2200000 4500
001 1611166128
003 DE-627
005 20230610175018.0
007 tu
008 140930s2014 xxu||||| 00| ||eng c
020 |a 9781623568030  |9 978-1-62356-803-0 
035 |a (DE-627)1611166128 
035 |a (DE-576)414951514 
035 |a (DE-599)BSZ414951514 
035 |a (OCoLC)1012103671 
035 |a (OCoLC)890025457 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XD-US 
050 0 |a TK5105.59 
082 0 |a 363.3 
082 0 4 |a POL011000  |a POL012000  |a POL037000  |q bisacsh 
084 |a 2,1  |2 ssgn 
130 0 |a Security in cyberspace 
245 1 0 |a Security in cyberspace  |b targeting nations, infrastructures, individuals  |c ed. by Giampiero Giacomello 
264 1 |a New York [u.a.]  |b Bloomsbury  |c 2014 
300 |a XXIII, 237 S.  |b graph. Darst. 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Includes bibliographical references and index 
505 8 0 |a Machine generated contents note:List of Abbreviations List of Figures and Tables Acknowledgments Foreword Carlo Schaerf List of Contributors Introduction - Security in Cybersapce Giampiero Giacomello Part One: The Nation Chapter 1: The 'State(s)' of Cybersecurity Rossella Mattioli Chapter 2: Reducing Uncertainties in Cyberspace through Confidence and Capacity Building Measures Patryk Pawlak Chapter 3: Wikileaks and Cyberspace Judith Reppy Chapter 4: Leaks: Securing Communications and Achieving Nuclear Zero Bruce Larkin Chapter 5: Establishing Norms of Behavior in Cyberspace: The Chinese Viewpoint Chunmei Kang Part Two: The Infrastructure and The Individual Chapter 6: Einstein on the Breach: Surveillance Technology, Cybersecurity and Organizational Change Milton Mueller and Andreas Kuehn Chapter 7: Artificial or 'Legitimate' Barriers to Internet Governance?" Francesco Giacomini and Laura Cordani Chapter 8: Public-Private Partnerships: A 'Soft' Approach to Cybersecurity? Views from the European Union Maria Grazia Porcedda Chapter 9: Targeting One's Ideal Audience: Self-Presentation Practices among Extreme Nationalists on Social Networks Andra SiibakBibliography Index. 
520 |a "Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual. The essays explore such issues as information ownership, censorship, cyberwars, cyberterrorism, privacy, and rebellion, bringing together expert knowledge from computer science and the social sciences with case studies. It reviews existing policies and practices and discusses the threats and benefits of living in an increasingly networked world. This authoritative analysis of one of the most controversial and compelling security debates of the twenty-first century will appeal to scholars and practitioners interested in security, international relations and policymaking"-- 
583 1 |a Archivierung/Langzeitarchivierung gewährleistet  |f SSG  |2 pdager  |5 DE-21 
650 0 |a Computer networks  |x Security measures 
650 0 |a Internet  |x Security measures  |x Political aspects 
650 0 |a Telecommunication policy 
650 0 |a National Security 
689 0 0 |d s  |0 (DE-588)7864395-8  |0 (DE-627)700634487  |0 (DE-576)363213635  |a Internetkriminalität  |2 gnd 
689 0 1 |d s  |0 (DE-588)4181167-7  |0 (DE-627)104353333  |0 (DE-576)210002980  |a Sicherheitsmaßnahme  |2 gnd 
689 0 |5 DE-101 
689 1 0 |d s  |0 (DE-588)7864395-8  |0 (DE-627)700634487  |0 (DE-576)363213635  |a Internetkriminalität  |2 gnd 
689 1 1 |d s  |0 (DE-588)4181167-7  |0 (DE-627)104353333  |0 (DE-576)210002980  |a Sicherheitsmaßnahme  |2 gnd 
689 1 |5 (DE-627) 
700 1 |a Giacomello, Giampiero  |e Hrsg.  |0 (DE-588)1095251015  |0 (DE-627)855928042  |0 (DE-576)182792404  |4 edt 
776 1 |z 9781623566999 
776 1 |z 9781623565701 
856 4 2 |u https://swbplus.bsz-bw.de/bsz414951514inh.htm  |m B:DE-576;DE-Frei85  |q application/pdf  |v 20141215100125  |x Verlag  |3 Inhaltsverzeichnis 
856 4 2 |u http://www.netread.com/jcusers2/bk1388/030/9781623568030/image/lgcover.9781623568030.jpg  |v 2015-03-04  |x Verlag  |3 Cover 
889 |w (DE-627)788158198 
935 |i mdedup 
951 |a BO 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3157680730 
LOK |0 003 DE-627 
LOK |0 004 1611166128 
LOK |0 005 20160629124554 
LOK |0 008 160427||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 852   |a DE-21 
LOK |0 852 1  |c KB 20 A 8012  |9 00 
LOK |0 935   |a krim 
LOK |0 938   |a 1606  |f 34 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 315768082X 
LOK |0 003 DE-627 
LOK |0 004 1611166128 
LOK |0 005 20141209113530 
LOK |0 008 140930||||||||||||||||ger||||||| 
LOK |0 040   |a DE-Frei85  |c DE-627  |d DE-Frei85 
LOK |0 852   |a DE-Frei85 
LOK |0 852 1  |m p  |9 00 
LOK |0 938   |k p 
ORI |a SA-MARC-krimdoka001.raw 
SIG |a UB: KB 20 A 8012