Law, policy, and technology: cyberterrorism, information warfare, and Internet immobilization
"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA
Information Science Reference
[2012]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-12 DE-706 DE-1049 DE-898 DE-1050 DE-83 URL des Erstveröffentlichers |
Zusammenfassung: | "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact" - Provided by publisher |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xv, 496 Seiten) |
ISBN: | 9781615208326 |
DOI: | 10.4018/978-1-61520-831-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043850968 | ||
003 | DE-604 | ||
005 | 20171102 | ||
007 | cr|uuu---uuuuu | ||
008 | 161028s2012 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781615208326 |9 978-1-61520-832-6 | ||
024 | 7 | |a 10.4018/978-1-61520-831-9 |2 doi | |
035 | |a (ZDB-98-IGB)00041762 | ||
035 | |a (OCoLC)852516702 | ||
035 | |a (DE-599)BVBBV043850968 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 363.325 | |
245 | 1 | 0 | |a Law, policy, and technology |b cyberterrorism, information warfare, and Internet immobilization |c Pauline C. Reich (Waseda University, Japan), Eduardo Gelbstein (Webster University, Switzerland) |
264 | 1 | |a Hershey PA |b Information Science Reference |c [2012] | |
264 | 4 | |c © 2012 | |
300 | |a 1 Online-Ressource (xv, 496 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references and index | ||
520 | |a "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact" - Provided by publisher | ||
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cyberspace | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Politik |0 (DE-588)4046514-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 2 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 3 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 4 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 0 | 5 | |a Politik |0 (DE-588)4046514-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Reich, Pauline |4 edt | |
700 | 1 | |a Gelbstein, Eduardo |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61520-831-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-61520-831-3 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-61520-831-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
942 | 1 | 1 | |c 302.2 |e 22/bsb |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029261280 | |
966 | e | |u https://doi.org/10.4018/978-1-61520-831-9 |l DE-12 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-831-9 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61520-831-9 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61520-831-9 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61520-831-9 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61520-831-9 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138439124582400 |
---|---|
adam_text | |
any_adam_object | |
author2 | Reich, Pauline Gelbstein, Eduardo |
author2_role | edt edt |
author2_variant | p r pr e g eg |
author_facet | Reich, Pauline Gelbstein, Eduardo |
building | Verbundindex |
bvnumber | BV043850968 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-98-IGB)00041762 (OCoLC)852516702 (DE-599)BVBBV043850968 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
doi_str_mv | 10.4018/978-1-61520-831-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV043850968</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171102</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161028s2012 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781615208326</subfield><subfield code="9">978-1-61520-832-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-61520-831-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00041762</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)852516702</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043850968</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Law, policy, and technology</subfield><subfield code="b">cyberterrorism, information warfare, and Internet immobilization</subfield><subfield code="c">Pauline C. Reich (Waseda University, Japan), Eduardo Gelbstein (Webster University, Switzerland)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2012]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 496 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Politik</subfield><subfield code="0">(DE-588)4046514-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Politik</subfield><subfield code="0">(DE-588)4046514-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reich, Pauline</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gelbstein, Eduardo</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61520-831-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-61520-831-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-61520-831-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029261280</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61520-831-9</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-831-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61520-831-9</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61520-831-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61520-831-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61520-831-9</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043850968 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:06:29Z |
institution | BVB |
isbn | 9781615208326 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029261280 |
oclc_num | 852516702 |
open_access_boolean | |
owner | DE-12 DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-12 DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xv, 496 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich (Waseda University, Japan), Eduardo Gelbstein (Webster University, Switzerland) Hershey PA Information Science Reference [2012] © 2012 1 Online-Ressource (xv, 496 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references and index "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact" - Provided by publisher Cyberterrorism Computer crimes Computer security Cyberspace Data protection Recht (DE-588)4048737-4 gnd rswk-swf Politik (DE-588)4046514-7 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Internet (DE-588)4308416-3 s Terrorismus (DE-588)4059534-1 s Information warfare (DE-588)4461975-3 s Internetkriminalität (DE-588)7864395-8 s Recht (DE-588)4048737-4 s Politik (DE-588)4046514-7 s DE-604 Reich, Pauline edt Gelbstein, Eduardo edt Erscheint auch als Druck-Ausgabe 978-1-61520-831-9 Erscheint auch als Druck-Ausgabe 1-61520-831-3 https://doi.org/10.4018/978-1-61520-831-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization Cyberterrorism Computer crimes Computer security Cyberspace Data protection Recht (DE-588)4048737-4 gnd Politik (DE-588)4046514-7 gnd Information warfare (DE-588)4461975-3 gnd Internet (DE-588)4308416-3 gnd Internetkriminalität (DE-588)7864395-8 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4048737-4 (DE-588)4046514-7 (DE-588)4461975-3 (DE-588)4308416-3 (DE-588)7864395-8 (DE-588)4059534-1 (DE-588)4143413-4 |
title | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization |
title_auth | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization |
title_exact_search | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization |
title_full | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich (Waseda University, Japan), Eduardo Gelbstein (Webster University, Switzerland) |
title_fullStr | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich (Waseda University, Japan), Eduardo Gelbstein (Webster University, Switzerland) |
title_full_unstemmed | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich (Waseda University, Japan), Eduardo Gelbstein (Webster University, Switzerland) |
title_short | Law, policy, and technology |
title_sort | law policy and technology cyberterrorism information warfare and internet immobilization |
title_sub | cyberterrorism, information warfare, and Internet immobilization |
topic | Cyberterrorism Computer crimes Computer security Cyberspace Data protection Recht (DE-588)4048737-4 gnd Politik (DE-588)4046514-7 gnd Information warfare (DE-588)4461975-3 gnd Internet (DE-588)4308416-3 gnd Internetkriminalität (DE-588)7864395-8 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | Cyberterrorism Computer crimes Computer security Cyberspace Data protection Recht Politik Information warfare Internet Internetkriminalität Terrorismus Aufsatzsammlung |
url | https://doi.org/10.4018/978-1-61520-831-9 |
work_keys_str_mv | AT reichpauline lawpolicyandtechnologycyberterrorisminformationwarfareandinternetimmobilization AT gelbsteineduardo lawpolicyandtechnologycyberterrorisminformationwarfareandinternetimmobilization |