Managing cyber attacks in international law, business, and relations: in search of cyber peace
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2014
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Hier auch später erschienene, unveränderte Nachdrucke |
Beschreibung: | xxxix, 393 Seiten Illustrationen, Karten 23 cm |
ISBN: | 9781107004375 9781316600122 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042067678 | ||
003 | DE-604 | ||
005 | 20190226 | ||
007 | t | ||
008 | 140910s2014 a||| |||| 00||| eng d | ||
020 | |a 9781107004375 |c hbk. |9 978-1-107-00437-5 | ||
020 | |a 9781316600122 |c pbk |9 978-1-316-60012-2 | ||
035 | |a (OCoLC)891589242 | ||
035 | |a (DE-599)BSZ384925898 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-M382 |a DE-706 |a DE-210 | ||
082 | 0 | |a 343.09/99 |2 23 | |
084 | |a HIST |q DE-210 |2 fid | ||
084 | |a PZ 4800 |0 (DE-625)141183: |2 rvk | ||
100 | 1 | |a Shackelford, Scott J. |d ca. 20./21. Jh. |e Verfasser |0 (DE-588)1059380935 |4 aut | |
245 | 1 | 0 | |a Managing cyber attacks in international law, business, and relations |b in search of cyber peace |c Scott J. Shackelford, JD, PHD, Kelley School of Business, Indiana University |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2014 | |
300 | |a xxxix, 393 Seiten |b Illustrationen, Karten |c 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wirtschaft |0 (DE-588)4066399-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Auslandsbeziehungen |0 (DE-588)4272415-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internationales Recht |0 (DE-588)4027447-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 2 | |a Internationales Recht |0 (DE-588)4027447-0 |D s |
689 | 0 | 3 | |a Wirtschaft |0 (DE-588)4066399-1 |D s |
689 | 0 | 4 | |a Auslandsbeziehungen |0 (DE-588)4272415-6 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Managing Cyber Attacks in International Law, Business, and Relations |
856 | 4 | 2 | |m Digitalisierung Deutsches Museum |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027508418&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027508418 |
Datensatz im Suchindex
_version_ | 1804152510201462784 |
---|---|
adam_text | CONTENTS
TABLES
AND
FIGURES
FOREWORD
BY
DR. HAMADOUN
I.
TOURE
PREFACE
CYBER WAR
AND
PEACE
KEY
TERMS
ACKNOWLEDGMENTS
ABBREVIATIONS
PART I:
FOUNDATIONS
OF POLYCENTRIC
GOVERNANCE
IN
CYBERSPACE
DEFINING
THE
CYBER
THREAT IN INTERNET
GOVERNANCE
UNDERSTANDING
THE
CYBER
THREAT
FRACTURED
INTERNET
GOVERNANCE
AND
ITS
SECURITY
IMPLICATIONS
BOTTOM-UP
GOVERNANCE
AND
THE
INFORMAL IETF
NETWORKED, FLAT,
AND
CROWDED: THE
EVOLUTION
OF
INTERNET
GOVERNANCE
SUMMARY
Z
WHO
CONTROLS
CYBERSPACE?
ANALYZING CYBER
REGULATION
THROUGH
POLYCENTRIC
GOVERNANCE
WHAT IS
CYBERSPACE?
INTRODUCING
THE
GLOBAL COMMONS
THE CYBER PSEUDO
COMMONS
THE
ROLE
OF
THE
PRIVATE
SECTOR
IN
MANAGING
CYBERSPACE
SOVEREIGNTY
IN
THE
CYBER
PSEUDO
COMMONS
V11
$IBLIOTHEK
B6
I
DEUTSCHES
MUSEUM
..
PAGE
XI
XIII
XV
XXIV
XXXI
XXXV
XXXVII
3
5
IQ
38
45
49
52
55
57
61
79
84
VIII
CONTENTS
POLYCENTRIC REGULATION
IN CYBERSPACE: A
FRAMEWORK
FOR
ANALYZING
CYBERSECURITY
CHALLENGES
88
SUMMARY
ROB
PART II: MANAGING
VULNERABILITIES
3
4
HACKING
THE
PLANET,
THE
DALAI
LAMA,
AND
YOU:
MANAGING
TECHNICAL VULNERABILITIES
IN
THE
INTERNET
U1
REGULATING
THROUGH
NETWORK ARCHITECTURE
TO
ENHANCE
CYBERSECURITY
114
CYBERSECURITY
101:
UNDERSTANDING
THE
WEAPONS
136
CYBERSECURITY
102:
USING
THE
WEAPONS
141
FROM
THE
FOOTHILLS
OF
THE
HIMALAYAS
TO
THE
FRONTIERS
OF
CYBERSPACE:
CYBER
WEAPONS, STATES,
AND
THE
PROBLEM
OF
ATTRIBUTION
144
UNDERSTANDING
THE
CYBER
THREAT
ECOSYSTEM
WITHIN
A
POLYCENTRIC
FRAMEWORK
148
THE NEW
CYBER
WARFARE: SECURING
CRITICAL NATIONAL
INFRASTRUCTURE
IN
THE
DIGITAL
AGE
151
DEFINING
THE
NEW CYBER WARFARE
152
NATIONAL
CYBERSECURITY STRATEGIES
OF
THE
CYBER
POWERS
174
A POLYCENTRIC
APPROACH
TO
SECURING CRITICAL NATIONAL
INFRASTRUCTURE
194
5
RISKY
BUSINESS: ENHANCING PRIVATE-SECTOR CYBERSECURITY
197
DEFINING
THE
CYBER
THREAT
TO
THE
PRIVATE
SECTOR
200
ENHANCING
CYBERSECURITY
THROUGH THE
COMPETITIVE MARKET
217
MANAGING MARKET IMPERFECTIONS
THROUGH
MARKET-BASED
INCENTIVES
AND
REGULATORY
INTERVENTION
234
SUMMARY
257
PART
III: THE LAW, POLITICS, AND
PROMISE OF CYBER PEACE
6
AN
INTRODUCTION
TO
THE
LAW
OF
CYBER WAR
AND
PEACE
THE LAW
OF
CYBER
PEACE
THE
LAW
OF
CYBER
WAR
SUMMARY
263
269
285
306
7
CYBER
PEACE
312
CYBER
POWER
AND
POLITICS
IN
THE
INFORMATION AGE
314
THE FUTURE
OF
INTERNET
GOVERNANCE
325
CYBERSECURITY
BEST
PRACTICES
TOWARD
CYBER
PEACE
CONCLUSION
APPENDIX
INDEX
CONTENTS IX
347
356
367
371
387
|
any_adam_object | 1 |
author | Shackelford, Scott J. ca. 20./21. Jh |
author_GND | (DE-588)1059380935 |
author_facet | Shackelford, Scott J. ca. 20./21. Jh |
author_role | aut |
author_sort | Shackelford, Scott J. ca. 20./21. Jh |
author_variant | s j s sj sjs |
building | Verbundindex |
bvnumber | BV042067678 |
classification_rvk | PZ 4800 |
ctrlnum | (OCoLC)891589242 (DE-599)BSZ384925898 |
dewey-full | 343.09/99 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.09/99 |
dewey-search | 343.09/99 |
dewey-sort | 3343.09 299 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02196nam a2200469 c 4500</leader><controlfield tag="001">BV042067678</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190226 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140910s2014 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781107004375</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-1-107-00437-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781316600122</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-316-60012-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)891589242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ384925898</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-M382</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-210</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.09/99</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">HIST</subfield><subfield code="q">DE-210</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4800</subfield><subfield code="0">(DE-625)141183:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shackelford, Scott J.</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1059380935</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing cyber attacks in international law, business, and relations</subfield><subfield code="b">in search of cyber peace</subfield><subfield code="c">Scott J. Shackelford, JD, PHD, Kelley School of Business, Indiana University</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxxix, 393 Seiten</subfield><subfield code="b">Illustrationen, Karten</subfield><subfield code="c">23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wirtschaft</subfield><subfield code="0">(DE-588)4066399-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Auslandsbeziehungen</subfield><subfield code="0">(DE-588)4272415-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationales Recht</subfield><subfield code="0">(DE-588)4027447-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Internationales Recht</subfield><subfield code="0">(DE-588)4027447-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Wirtschaft</subfield><subfield code="0">(DE-588)4066399-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Auslandsbeziehungen</subfield><subfield code="0">(DE-588)4272415-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Managing Cyber Attacks in International Law, Business, and Relations</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung Deutsches Museum</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027508418&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027508418</subfield></datafield></record></collection> |
id | DE-604.BV042067678 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:11:51Z |
institution | BVB |
isbn | 9781107004375 9781316600122 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027508418 |
oclc_num | 891589242 |
open_access_boolean | |
owner | DE-12 DE-M382 DE-706 DE-210 |
owner_facet | DE-12 DE-M382 DE-706 DE-210 |
physical | xxxix, 393 Seiten Illustrationen, Karten 23 cm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Shackelford, Scott J. ca. 20./21. Jh. Verfasser (DE-588)1059380935 aut Managing cyber attacks in international law, business, and relations in search of cyber peace Scott J. Shackelford, JD, PHD, Kelley School of Business, Indiana University Cambridge Cambridge University Press 2014 xxxix, 393 Seiten Illustrationen, Karten 23 cm txt rdacontent n rdamedia nc rdacarrier Hier auch später erschienene, unveränderte Nachdrucke Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Wirtschaft (DE-588)4066399-1 gnd rswk-swf Auslandsbeziehungen (DE-588)4272415-6 gnd rswk-swf Internationales Recht (DE-588)4027447-0 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s Kryptoanalyse (DE-588)4830502-9 s Internationales Recht (DE-588)4027447-0 s Wirtschaft (DE-588)4066399-1 s Auslandsbeziehungen (DE-588)4272415-6 s DE-604 Erscheint auch als Online-Ausgabe Managing Cyber Attacks in International Law, Business, and Relations Digitalisierung Deutsches Museum application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027508418&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Shackelford, Scott J. ca. 20./21. Jh Managing cyber attacks in international law, business, and relations in search of cyber peace Kryptoanalyse (DE-588)4830502-9 gnd Internetkriminalität (DE-588)7864395-8 gnd Wirtschaft (DE-588)4066399-1 gnd Auslandsbeziehungen (DE-588)4272415-6 gnd Internationales Recht (DE-588)4027447-0 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)7864395-8 (DE-588)4066399-1 (DE-588)4272415-6 (DE-588)4027447-0 |
title | Managing cyber attacks in international law, business, and relations in search of cyber peace |
title_auth | Managing cyber attacks in international law, business, and relations in search of cyber peace |
title_exact_search | Managing cyber attacks in international law, business, and relations in search of cyber peace |
title_full | Managing cyber attacks in international law, business, and relations in search of cyber peace Scott J. Shackelford, JD, PHD, Kelley School of Business, Indiana University |
title_fullStr | Managing cyber attacks in international law, business, and relations in search of cyber peace Scott J. Shackelford, JD, PHD, Kelley School of Business, Indiana University |
title_full_unstemmed | Managing cyber attacks in international law, business, and relations in search of cyber peace Scott J. Shackelford, JD, PHD, Kelley School of Business, Indiana University |
title_short | Managing cyber attacks in international law, business, and relations |
title_sort | managing cyber attacks in international law business and relations in search of cyber peace |
title_sub | in search of cyber peace |
topic | Kryptoanalyse (DE-588)4830502-9 gnd Internetkriminalität (DE-588)7864395-8 gnd Wirtschaft (DE-588)4066399-1 gnd Auslandsbeziehungen (DE-588)4272415-6 gnd Internationales Recht (DE-588)4027447-0 gnd |
topic_facet | Kryptoanalyse Internetkriminalität Wirtschaft Auslandsbeziehungen Internationales Recht |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027508418&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT shackelfordscottj managingcyberattacksininternationallawbusinessandrelationsinsearchofcyberpeace |