Cyber
Author(s)
Bibliographic Information
Cyber
(Critical themes in contemporary security)
Routledge, 2020
- : set
- v. 1
- v. 2
- Other Title
-
Cyber : critical themes in contemporary security
Available at 4 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes index
Description and Table of Contents
Description
Over the past several years, rising cyber power has comprehensively and profoundly affected international security. Key areas include military operations, terrorism, critical infrastructure, corporate security, individual privacy and financial security, and political processes. The burgeoning development of information technology did not always seem especially daunting from a strategic perspective. For instance, as recently as the Arab 'spring', which began less than a decade ago, social media seemed to power political liberalisation, casting the digital revolution as an engine of social progress. It may yet prove to be that, but for the time being less salutary aspects of the technological march have arguably overtaken the sunnier ones. The articles in this collection reflect this arc.
Table of Contents
Volume 1
Introduction
Part 1: Cyber Terrorism
Kevin Soo Hoo, Seymour Goodman & Lawrence Greenberg, 'Information Technology and the Terrorist Threat', Survival, 39, 03, 1997, pp.135-155.
Simon Chesterman, 'Privacy and Surveillance in the Age of Terror', Survival, 52, 5, 2010, pp.31-46.
James Farwell, 'Jihadi Video in the 'War of Ideas'', Survival, 52, 6, 2010, pp.127-150.
James Farwell, 'The Media Strategy of ISIS', Survival, 56, 6, 2014, pp.49-55.
Aaron Brantly, 'Innovation an Adaption in Jihadist Digital Security', Survival, 59, 1, 2017, pp. 79-102.
Part 2: Cyber Policy
Gregory Grove, Seymour Goodman & Stephen Lukasik, 'Cyber Attacks and International Law', Survival, 42, 3, 2000, pp. 89-104.
Yoichi Funabashi, 'Asia's Digital Challenge', Survival, 44, 1, 2002, pp. 135-144.
Nigel Inkster, 'Chinese Intelligence in the Cyber Age', Survival, 55, 1, 2013, pp. 45-66.
Paul Cornish, 'Governing Cyberspace through Constructive Ambiguity', Survival, 57, 3, 2015, pp. 153-176.
Daniel Moore & Thomas Rid, 'Cryptopolitik and the Darknet', Survival, 58, 1, 2016, pp. 7-38.
Ben Buchanan, 'Cryptography and Sovereignty', Survival, 58, 5, 2016, pp. 95-122.
Nigel Inkster, 'Measuring Military Cyber Power', Survival, 59, 4, 2017, pp. 27-34.
Travis Sharp, 'Hiding in Plain Sight: Political Effects of Cyber Operations', Survival, 60, 6, 2018, pp. 45 - 22.
Marcus Willett, 'Assessing Cyber Power', Survival, 61, 1, 2019, pp. 85-90.
Alex Grigsby, 'The End of Cyber Norms', Survival, 59, 6, 2017, pp. 109-122.
Volume 2
Part 3: Cyber Security
Christopher Hughes, 'Google and the Great Firewall', Survival, 52, 2, 2010, pp. 19-26.
Nigel Inkster, 'China in Cyberspace', Survival, 52, 4, 2010, pp. 55-66.
Francois Heisbourg, 'Leaks and Lessons', Survival, 53, 1, 2011, pp. 207-215.
Eneken Tikk-Ringas, 'Ten Rules for Cyber Security', Survival, 53, 3, 2011, pp. 119-132.
W. Alexander Vacca, 'Military Culture and Cyber Security', Survival, 53, 6, 2011, pp. 159-176.
Christopher Bronk, Cody Monk & John Villasenor, 'The Dark Side of Cyber Finance', Survival, 54, 2, 2012, pp. 129-142.
Christopher Bronk & Eneken Tikk-Ringas, 'The Cyber Attack on Saudi Aramco', Survival, 55, 2, 2013, pp. 81-96.
Nigel Inkster, 'Cyber Attacks in La-La Land', Survival, 57, 1, 2015, pp. 105-116.
Ben Buchanan, 'The Life Cycles of Cyber Threats', Survival, 58, 1, 2016, pp. 39-58.
Nigel Inkster, 'Information Warfare and the US Presidential Election', Survival, 58, 5, 2016, pp. 23-32.
Yu-Min Joo & Teck-Boon Tan, 'Smart Cities: A New Age of Digital Insecurity', Survival, 60, 2, 2018, pp. 91-2016.
Part 4: Cyber Warfare
James Farwell & Rafal Rohozinski, 'Stuxnet and the Future of Cyber War', Survival, 53, 1, 2011, pp. 23-40.
Alexander Klimburg, 'Mobilising Cyber Power', Survival, 53, 1, 2011, pp. 41-60.
James Farwell & Rafal Rohozinski, 'The New Reality of Cyber War', Survival, 54, 4, 2012, pp. 107-120.
David Gompert & Martin Libicki, 'Cyber Warfare and Sino-American Crisis Instability', Survival, 56, 4, 2014, pp. 7-22.
Lawrence Cavaiola, David Gompert & Martin Libicki, 'Cyber House Rules: On War, Retaliation and Escalation', Survival, 57, 1, 2015, pp. 81-104.
David Gompert & Martin Libicki, 'Waging Cyber War the American Way', Survival, 57, 4, 2015, pp. 7-28.
Elinor Sloan, 'Robotics at War', Survival, 57, 5, 2015, pp. 107-120.
Michael Fischerkeller, 'Incorporating Offensive Cyber Operations into Conventional Deterrence Strategies', Survival, 59, 1, 2017, pp. 103-134.
Jurgen Altmann & Frank Sauer, 'Autonomous Weapon Systems and Strategic Stability', Survival, 59, 5, 2017, pp. 117-142.
Sergei Boeke and Dennis Broeders, 'The Demilitarisation of Cyber conflict', Survival, 60, 6, 2018, pp. 73-89.
Index
by "Nielsen BookData"