Linked e-resources

Details

Preface and Acknowledgments; Contents; About the Author; Abbreviation; List of Figures; List of Tables; Chapter 1: Global Cybersecurity: Key Issues and Concepts; 1.1 Introduction; 1.2 Gulf Between Hype and Reality; 1.3 Definitions of Major Terms; 1.3.1 Cybersecurity; 1.3.2 Cybersecurity Strategy; 1.3.3 Cybercrime; 1.3.4 Cyber Power; 1.3.5 Institutionalization; 1.3.6 Cloud Computing; 1.3.7 Strategic Asymmetry; 1.3.8 Trade and Investment Barriers; 1.3.9 Big Data; 1.3.10 Opportunistic and Targeted Cyber-Attacks; 1.4 The Nature of Cyber-Threats and Some Key Challenges.

1.4.1 Difficulty of Dominance in the Cyberspace1.4.2 Difficulty of Attribution; 1.4.3 Vulnerability of Critical and Sensitive Sectors; 1.5 Elements of National CS Strategies; 1.5.1 Strengths; 1.5.2 Weaknesses; 1.5.3 Opportunities; 1.5.4 Cyber-Threats: Sources, Nature and Characteristics; 1.5.4.1 Military Security Threats; 1.5.4.2 Political Security Threats; 1.5.4.3 Economic Security Threats; 1.5.4.4 Societal, Socio-Cultural or Cultural Security Threats; 1.5.5 National Cultural Value; 1.5.6 National Political System and Context; 1.5.7 International Responsibilities and Obligations.

1.5.8 Implementation of Strategy1.6 The Roles of the Private Sector; 1.7 Discussion and Concluding Remarks; References; Chapter 2: The Evolution of Rules and Institutions in Cybersecurity: Cloud Computing and Big Data; 2.1 Introduction; 2.2 CS Issues in Cloud Computing, and Big Data; 2.2.1 The Cloud; 2.2.2 Big Data; 2.2.2.1 Volume; 2.2.2.2 Velocity; 2.2.2.3 Variety; 2.2.2.4 Variability; 2.2.2.5 Complexity; 2.3 The Theoretical Framework: Rules and Institutions; 2.3.1 Regulative Institutions; 2.3.1.1 Laws Governing BD and the Cloud; 2.3.1.2 International Harmonization of Regulative Institutions.

2.3.2 Normative Institutions2.3.2.1 Trade Associations and Other Interest Groups Representing, and Advocating for, Users; 2.3.2.2 Inter-organizational Bodies Representing Technology Vendors; 2.3.3 Cultural-Cognitive Institutions; 2.3.3.1 Perception of Vendorś Integrity and Capability; 2.3.3.2 Users ́and Technology Providers ́Inertia Effects; 2.4 Forces and Nature of Institutional Changes; 2.4.1 Institutional Field Around BD and the Cloud; 2.4.2 The Driving Forces and Mechanisms of Institutional Changes; 2.4.3 Development of Dense Networks and Relationships; 2.4.4 The Power Dynamics.

2.4.5 Contradictions Associated with BD and the Cloud2.5 Discussion and Concluding Remarks; References; Chapter 3: Cybersecurity in National Security and International Relations; 3.1 Introduction; 3.2 Cyber-Warfare Concerns; 3.3 International Legal Regimes and Institutional Frameworks Related to CS; 3.4 Critical Issues and Current Sources of Disagreement Among Nations; 3.4.1 Outdated Legislative Framework and the Lack of Law Enforcement System Capacity; 3.4.2 Concerns Regarding the Fairness of the Procedures and Outcomes of Formal Frameworks.

Browse Subjects

Show more subjects...

Statistics

from
to
Export