Atnaujinkite slapukų nuostatas

El. knyga: Cyber-Security and Threat Politics: US Efforts to Secure the Information Age

3.60/5 (10 ratings by Goodreads)
(ETH Zurich, Switzerland)
Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US.

Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.

 



This book explores how cyber-threats are constructed and propelled onto the political agenda, with a specific focus on the United States.

List of illustrations vi
Acknowledgements vii
List of abbreviations viii
Introduction 1(11)
1 The information age and cyber-threats: shifting meanings and interpretations 12(12)
2 Politics and threat construction: theoretical underpinnings 24(17)
3 The hostile intelligence threat, data security, and encryption set the stage 41(25)
4 Asymmetric vulnerabilities and the double-edged sword of information warfare: developments in the military domain 66(25)
5 Critical infrastructures and homeland security 91(31)
6 Securing the information age: Failed securitisation or a new logic of security? 122(16)
7 Cyber-threats and security in the information age: issues and implications 138(7)
Bibliography 145(29)
Index 174
Myriam Dunn Cavelty is lecturer and head of the new risks research unit at the Center for Security Studies (CSS), ETH Zurich.