000772238 000__ 04696cam\a2200481Ma\4500 000772238 001__ 772238 000772238 005__ 20230306142532.0 000772238 006__ m\\\\\o\\d\\\\\\\\ 000772238 007__ cr\un\nnnunnun 000772238 008__ 160805s2016\\\\sz\\\\\\o\\\\\000\0\eng\d 000772238 019__ $$a966194262$$a966563916 000772238 020__ $$a3319405543$$q(electronic book) 000772238 020__ $$a9783319405544$$q(electronic book) 000772238 020__ $$z9783319405537 000772238 020__ $$z3319405535 000772238 035__ $$aSP(OCoLC)ocn955138096 000772238 035__ $$aSP(OCoLC)955138096$$z(OCoLC)966194262$$z(OCoLC)966563916 000772238 040__ $$aIDEBK$$beng$$epn$$cIDEBK$$dYDXCP$$dOCLCO$$dEBLCP$$dN$T$$dCOO$$dOCLCF$$dUIU$$dOCLCQ$$dYDX$$dDEBBG$$dTJC$$dJG0$$dUAB 000772238 049__ $$aISEA 000772238 050_4 $$aHB71-74 000772238 08204 $$a330$$223 000772238 1001_ $$aKshetri, Nir. 000772238 24514 $$aThe Quest to Cyber Superiority :$$bCybersecurity Regulations, Frameworks, and Strategies of Major Economies. 000772238 260__ $$aCham, Switzerland :$$bSpringer,$$c2016. 000772238 300__ $$a1 online resource (260 pages) 000772238 336__ $$atext$$btxt$$2rdacontent 000772238 337__ $$acomputer$$bc$$2rdamedia 000772238 338__ $$aonline resource$$bcr$$2rdacarrier 000772238 504__ $$aIncludes bibliographical references. 000772238 5050_ $$aPreface and Acknowledgments; Contents; About the Author; Abbreviation; List of Figures; List of Tables; Chapter 1: Global Cybersecurity: Key Issues and Concepts; 1.1 Introduction; 1.2 Gulf Between Hype and Reality; 1.3 Definitions of Major Terms; 1.3.1 Cybersecurity; 1.3.2 Cybersecurity Strategy; 1.3.3 Cybercrime; 1.3.4 Cyber Power; 1.3.5 Institutionalization; 1.3.6 Cloud Computing; 1.3.7 Strategic Asymmetry; 1.3.8 Trade and Investment Barriers; 1.3.9 Big Data; 1.3.10 Opportunistic and Targeted Cyber-Attacks; 1.4 The Nature of Cyber-Threats and Some Key Challenges. 000772238 5058_ $$a1.4.1 Difficulty of Dominance in the Cyberspace1.4.2 Difficulty of Attribution; 1.4.3 Vulnerability of Critical and Sensitive Sectors; 1.5 Elements of National CS Strategies; 1.5.1 Strengths; 1.5.2 Weaknesses; 1.5.3 Opportunities; 1.5.4 Cyber-Threats: Sources, Nature and Characteristics; 1.5.4.1 Military Security Threats; 1.5.4.2 Political Security Threats; 1.5.4.3 Economic Security Threats; 1.5.4.4 Societal, Socio-Cultural or Cultural Security Threats; 1.5.5 National Cultural Value; 1.5.6 National Political System and Context; 1.5.7 International Responsibilities and Obligations. 000772238 5058_ $$a1.5.8 Implementation of Strategy1.6 The Roles of the Private Sector; 1.7 Discussion and Concluding Remarks; References; Chapter 2: The Evolution of Rules and Institutions in Cybersecurity: Cloud Computing and Big Data; 2.1 Introduction; 2.2 CS Issues in Cloud Computing, and Big Data; 2.2.1 The Cloud; 2.2.2 Big Data; 2.2.2.1 Volume; 2.2.2.2 Velocity; 2.2.2.3 Variety; 2.2.2.4 Variability; 2.2.2.5 Complexity; 2.3 The Theoretical Framework: Rules and Institutions; 2.3.1 Regulative Institutions; 2.3.1.1 Laws Governing BD and the Cloud; 2.3.1.2 International Harmonization of Regulative Institutions. 000772238 5058_ $$a2.3.2 Normative Institutions2.3.2.1 Trade Associations and Other Interest Groups Representing, and Advocating for, Users; 2.3.2.2 Inter-organizational Bodies Representing Technology Vendors; 2.3.3 Cultural-Cognitive Institutions; 2.3.3.1 Perception of Vendorś Integrity and Capability; 2.3.3.2 Users ́and Technology Providers ́Inertia Effects; 2.4 Forces and Nature of Institutional Changes; 2.4.1 Institutional Field Around BD and the Cloud; 2.4.2 The Driving Forces and Mechanisms of Institutional Changes; 2.4.3 Development of Dense Networks and Relationships; 2.4.4 The Power Dynamics. 000772238 5058_ $$a2.4.5 Contradictions Associated with BD and the Cloud2.5 Discussion and Concluding Remarks; References; Chapter 3: Cybersecurity in National Security and International Relations; 3.1 Introduction; 3.2 Cyber-Warfare Concerns; 3.3 International Legal Regimes and Institutional Frameworks Related to CS; 3.4 Critical Issues and Current Sources of Disagreement Among Nations; 3.4.1 Outdated Legislative Framework and the Lack of Law Enforcement System Capacity; 3.4.2 Concerns Regarding the Fairness of the Procedures and Outcomes of Formal Frameworks. 000772238 506__ $$aAccess limited to authorized users. 000772238 588__ $$aDescription based on print version record. 000772238 650_0 $$aComputer security$$xGovernment policy. 000772238 650_0 $$aComputer networks$$xSecurity measures$$xGovernment policy. 000772238 77608 $$iErscheint auch als:$$nDruck-Ausgabe$$aKshetri, Nir. The Quest to Cyber Superiority .$$tCybersecurity Regulations, Frameworks, and Strategies of Major Economies 000772238 852__ $$bebk 000772238 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-40554-4$$zOnline Access$$91397441.1 000772238 909CO $$ooai:library.usi.edu:772238$$pGLOBAL_SET 000772238 980__ $$aEBOOK 000772238 980__ $$aBIB 000772238 982__ $$aEbook 000772238 983__ $$aOnline 000772238 994__ $$a92$$bISE