Reinterpreting the end of the Cold War : issues, interpretations, periodizations
Author(s)
Bibliographic Information
Reinterpreting the end of the Cold War : issues, interpretations, periodizations
(Cass series : Cold War history / series editor, Odd Arne Westad, 6)
Frank Cass, 2005
- : hbk
- : pbk
Available at / 7 libraries
-
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references and index
Description and Table of Contents
Description
As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing concern. Political, economic and military leaders must manage and reduce the level of risk associated with threats from hostile states, malevolent nonstate actors such as organized terrorist groups or individual hackers, and high-tech accidents. The impact of the information technology revolution on warfare, global stability, governance, and even the meaning of existing security constructs like deterrence is significant. These essays examine the ways in which the information technology revolution has affected the logic of deterrence and crisis management, definitions of peace and war, democratic constraints on conflict, the conduct of and military organization for war, and the growing role of the private sector in providing security. This book was previously published as a special issue of the journal Contemporary Security Policy.
Table of Contents
1. Introduction: Security in the Information Technology Age Part 1: Managing Conflict in the Information Age 2. Integrated Security: A strategic response to anonymity and the problem of the few 3. Revolution's End: Information technology and crisis management Part 2: Organization and Conduct of Warfare in the Information Age 4. Wars of Disruption: International competition and information technology-driven military organizations 5. The Strategy and Tactics of Information Warfare 6. Part 3: Governance in the Information Age 7.Information Warfare and Democratic Accountability 8. Information Warfare and Domestic Threats to American Security Part 4: Private Sector Incentives for Managing Security 10. Rewarding IT Security in the Marketplace Part 5: Concluding Reflections 11. Thinking About New Security Paradigms
by "Nielsen BookData"