Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace
This book presents a framework to reconceptualize internet governance and better manage cyber attacks. It examines the potential of polycentric regulation to increase accountability through bottom-up action. It also provides a synthesis of the current state of cybersecurity research, bringing featur...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2014
|
Schlagworte: | |
Online-Zugang: | BSB01 UBG01 UPA01 Volltext |
Zusammenfassung: | This book presents a framework to reconceptualize internet governance and better manage cyber attacks. It examines the potential of polycentric regulation to increase accountability through bottom-up action. It also provides a synthesis of the current state of cybersecurity research, bringing features of cyber attacks to light and comparing and contrasting the threat to all relevant stakeholders. Throughout the book, cybersecurity is treated holistically, covering issues in law, science, economics and politics. This interdisciplinary approach is an exemplar of how strategies from different disciplines as well as the private and public sectors may cross-pollinate to enhance cybersecurity. Case studies and examples illustrate what is at stake and identify best practices. The book discusses technical issues of Internet governance and cybersecurity while presenting the material in an informal, straightforward manner. The book is designed to inform readers about the interplay of Internet governance and cybersecurity and the potential of polycentric regulation to help foster cyber peace |
Beschreibung: | Title from publisher's bibliographic system (viewed on 12 Feb 2016) |
Beschreibung: | 1 online resource (434 pages) |
ISBN: | 9781107004375 9781139021838 |
DOI: | 10.1017/CBO9781139021838 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043542165 | ||
003 | DE-604 | ||
005 | 20190429 | ||
007 | cr|uuu---uuuuu | ||
008 | 160506s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781107004375 |9 978-1-107-00437-5 | ||
020 | |a 9781139021838 |c Online |9 978-1-139-02183-8 | ||
024 | 7 | |a 10.1017/CBO9781139021838 |2 doi | |
035 | |a (ZDB-20-CBO)CR9781139021838 | ||
035 | |a (OCoLC)949925647 | ||
035 | |a (DE-599)BVBBV043542165 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-473 |a DE-739 | ||
082 | 0 | |a 343.09/99 |2 23 | |
084 | |a PZ 4800 |0 (DE-625)141183: |2 rvk | ||
100 | 1 | |a Shackelford, Scott J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Managing Cyber Attacks in International Law, Business, and Relations |b In Search of Cyber Peace |c Scott J. Shackelford |
246 | 1 | 3 | |a Managing Cyber Attacks in International Law, Business, & Relations |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2014 | |
300 | |a 1 online resource (434 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 12 Feb 2016) | ||
520 | |a This book presents a framework to reconceptualize internet governance and better manage cyber attacks. It examines the potential of polycentric regulation to increase accountability through bottom-up action. It also provides a synthesis of the current state of cybersecurity research, bringing features of cyber attacks to light and comparing and contrasting the threat to all relevant stakeholders. Throughout the book, cybersecurity is treated holistically, covering issues in law, science, economics and politics. This interdisciplinary approach is an exemplar of how strategies from different disciplines as well as the private and public sectors may cross-pollinate to enhance cybersecurity. Case studies and examples illustrate what is at stake and identify best practices. The book discusses technical issues of Internet governance and cybersecurity while presenting the material in an informal, straightforward manner. The book is designed to inform readers about the interplay of Internet governance and cybersecurity and the potential of polycentric regulation to help foster cyber peace | ||
650 | 4 | |a Information warfare (International law) | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Computer crimes | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Auslandsbeziehungen |0 (DE-588)4272415-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internationales Recht |0 (DE-588)4027447-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wirtschaft |0 (DE-588)4066399-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 2 | |a Internationales Recht |0 (DE-588)4027447-0 |D s |
689 | 0 | 3 | |a Wirtschaft |0 (DE-588)4066399-1 |D s |
689 | 0 | 4 | |a Auslandsbeziehungen |0 (DE-588)4272415-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-107-00437-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-316-60012-2 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9781139021838 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028957611 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1017/CBO9781139021838 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9781139021838 |l UBG01 |p ZDB-20-CBO |q UBG_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9781139021838 |l UPA01 |p ZDB-20-CBO |q UPA_PDA_CBO_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176200162082816 |
---|---|
any_adam_object | |
author | Shackelford, Scott J. |
author_facet | Shackelford, Scott J. |
author_role | aut |
author_sort | Shackelford, Scott J. |
author_variant | s j s sj sjs |
building | Verbundindex |
bvnumber | BV043542165 |
classification_rvk | PZ 4800 |
collection | ZDB-20-CBO |
ctrlnum | (ZDB-20-CBO)CR9781139021838 (OCoLC)949925647 (DE-599)BVBBV043542165 |
dewey-full | 343.09/99 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.09/99 |
dewey-search | 343.09/99 |
dewey-sort | 3343.09 299 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
doi_str_mv | 10.1017/CBO9781139021838 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03777nmm a2200613zc 4500</leader><controlfield tag="001">BV043542165</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190429 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160506s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781107004375</subfield><subfield code="9">978-1-107-00437-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139021838</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-139-02183-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9781139021838</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9781139021838</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)949925647</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043542165</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.09/99</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4800</subfield><subfield code="0">(DE-625)141183:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shackelford, Scott J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing Cyber Attacks in International Law, Business, and Relations</subfield><subfield code="b">In Search of Cyber Peace</subfield><subfield code="c">Scott J. Shackelford</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Managing Cyber Attacks in International Law, Business, & Relations</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (434 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 12 Feb 2016)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents a framework to reconceptualize internet governance and better manage cyber attacks. It examines the potential of polycentric regulation to increase accountability through bottom-up action. It also provides a synthesis of the current state of cybersecurity research, bringing features of cyber attacks to light and comparing and contrasting the threat to all relevant stakeholders. Throughout the book, cybersecurity is treated holistically, covering issues in law, science, economics and politics. This interdisciplinary approach is an exemplar of how strategies from different disciplines as well as the private and public sectors may cross-pollinate to enhance cybersecurity. Case studies and examples illustrate what is at stake and identify best practices. The book discusses technical issues of Internet governance and cybersecurity while presenting the material in an informal, straightforward manner. The book is designed to inform readers about the interplay of Internet governance and cybersecurity and the potential of polycentric regulation to help foster cyber peace</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare (International law)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Auslandsbeziehungen</subfield><subfield code="0">(DE-588)4272415-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationales Recht</subfield><subfield code="0">(DE-588)4027447-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wirtschaft</subfield><subfield code="0">(DE-588)4066399-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Internationales Recht</subfield><subfield code="0">(DE-588)4027447-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Wirtschaft</subfield><subfield code="0">(DE-588)4066399-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Auslandsbeziehungen</subfield><subfield code="0">(DE-588)4272415-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-107-00437-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-316-60012-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9781139021838</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028957611</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139021838</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139021838</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBG_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139021838</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UPA_PDA_CBO_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043542165 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:28:24Z |
institution | BVB |
isbn | 9781107004375 9781139021838 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028957611 |
oclc_num | 949925647 |
open_access_boolean | |
owner | DE-12 DE-473 DE-BY-UBG DE-739 |
owner_facet | DE-12 DE-473 DE-BY-UBG DE-739 |
physical | 1 online resource (434 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO UBG_PDA_CBO ZDB-20-CBO UPA_PDA_CBO_Kauf |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Shackelford, Scott J. Verfasser aut Managing Cyber Attacks in International Law, Business, and Relations In Search of Cyber Peace Scott J. Shackelford Managing Cyber Attacks in International Law, Business, & Relations Cambridge Cambridge University Press 2014 1 online resource (434 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 12 Feb 2016) This book presents a framework to reconceptualize internet governance and better manage cyber attacks. It examines the potential of polycentric regulation to increase accountability through bottom-up action. It also provides a synthesis of the current state of cybersecurity research, bringing features of cyber attacks to light and comparing and contrasting the threat to all relevant stakeholders. Throughout the book, cybersecurity is treated holistically, covering issues in law, science, economics and politics. This interdisciplinary approach is an exemplar of how strategies from different disciplines as well as the private and public sectors may cross-pollinate to enhance cybersecurity. Case studies and examples illustrate what is at stake and identify best practices. The book discusses technical issues of Internet governance and cybersecurity while presenting the material in an informal, straightforward manner. The book is designed to inform readers about the interplay of Internet governance and cybersecurity and the potential of polycentric regulation to help foster cyber peace Information warfare (International law) Cyberterrorism Computer crimes Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Auslandsbeziehungen (DE-588)4272415-6 gnd rswk-swf Internationales Recht (DE-588)4027447-0 gnd rswk-swf Wirtschaft (DE-588)4066399-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s Kryptoanalyse (DE-588)4830502-9 s Internationales Recht (DE-588)4027447-0 s Wirtschaft (DE-588)4066399-1 s Auslandsbeziehungen (DE-588)4272415-6 s 1\p DE-604 Erscheint auch als Druckausgabe 978-1-107-00437-5 Erscheint auch als Druckausgabe 978-1-316-60012-2 https://doi.org/10.1017/CBO9781139021838 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Shackelford, Scott J. Managing Cyber Attacks in International Law, Business, and Relations In Search of Cyber Peace Information warfare (International law) Cyberterrorism Computer crimes Internetkriminalität (DE-588)7864395-8 gnd Auslandsbeziehungen (DE-588)4272415-6 gnd Internationales Recht (DE-588)4027447-0 gnd Wirtschaft (DE-588)4066399-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
subject_GND | (DE-588)7864395-8 (DE-588)4272415-6 (DE-588)4027447-0 (DE-588)4066399-1 (DE-588)4830502-9 |
title | Managing Cyber Attacks in International Law, Business, and Relations In Search of Cyber Peace |
title_alt | Managing Cyber Attacks in International Law, Business, & Relations |
title_auth | Managing Cyber Attacks in International Law, Business, and Relations In Search of Cyber Peace |
title_exact_search | Managing Cyber Attacks in International Law, Business, and Relations In Search of Cyber Peace |
title_full | Managing Cyber Attacks in International Law, Business, and Relations In Search of Cyber Peace Scott J. Shackelford |
title_fullStr | Managing Cyber Attacks in International Law, Business, and Relations In Search of Cyber Peace Scott J. Shackelford |
title_full_unstemmed | Managing Cyber Attacks in International Law, Business, and Relations In Search of Cyber Peace Scott J. Shackelford |
title_short | Managing Cyber Attacks in International Law, Business, and Relations |
title_sort | managing cyber attacks in international law business and relations in search of cyber peace |
title_sub | In Search of Cyber Peace |
topic | Information warfare (International law) Cyberterrorism Computer crimes Internetkriminalität (DE-588)7864395-8 gnd Auslandsbeziehungen (DE-588)4272415-6 gnd Internationales Recht (DE-588)4027447-0 gnd Wirtschaft (DE-588)4066399-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
topic_facet | Information warfare (International law) Cyberterrorism Computer crimes Internetkriminalität Auslandsbeziehungen Internationales Recht Wirtschaft Kryptoanalyse |
url | https://doi.org/10.1017/CBO9781139021838 |
work_keys_str_mv | AT shackelfordscottj managingcyberattacksininternationallawbusinessandrelationsinsearchofcyberpeace AT shackelfordscottj managingcyberattacksininternationallawbusinessrelations |