Cyberspace: malevolent actors, criminal opportunities, and strategic competition:
"This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, h...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Carlisle, PA
Strategic Studies Institute and U.S. Army War College Press
[2016]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities -- for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand"--Publisher's web site |
Beschreibung: | "August 2016." |
Beschreibung: | 1 Online-Ressource color illustrations, color maps |
ISBN: | 9781584877264 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV043977479 | ||
003 | DE-604 | ||
005 | 20170102 | ||
007 | cr|uuu---uuuuu | ||
008 | 161223s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781584877264 |9 978-1-58487-726-4 | ||
020 | |z 158487726X |c Online |9 158487726X | ||
020 | |z 9781584877264 |9 9781584877264 | ||
035 | |a (OCoLC)968689913 | ||
035 | |a (DE-599)BVBBV043977479 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
245 | 1 | 0 | |a Cyberspace: malevolent actors, criminal opportunities, and strategic competition |c Phil Williams, Dighton Fiddner, eds. |
264 | 1 | |a Carlisle, PA |b Strategic Studies Institute and U.S. Army War College Press |c [2016] | |
300 | |a 1 Online-Ressource |b color illustrations, color maps | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "August 2016." | ||
505 | 8 | |a Includes bibliographical references | |
505 | 8 | |a Introduction / Phil Williams and Dighton Fiddner -- Part I. Concepts and trends in cyberspace. Defining a framework for decision-making in cyberspace / Dighton Fiddner -- Emerging trends in cyberspace : dimensions and dilemmas / Nazli Choucri -- Technologies that will change your world / Rick Hutley -- Big data challenges, failed cities, and the rise of the new net / Jeff Boleng and Colin P. Clarke -- Part II. Challenges and threats in cyberspace. Cyberterrorism in a post-Stuxnet world / Michael Kenney -- China's reconnaissance and system sabotage activities : supporting information deterrence / Timothy L. Thomas -- Information warfare a la Russe / Stephen J. Blank -- The adaptive nature of crime : co-opting the internet / Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten -- Digitally armed and dangerous : humanitarian intervention in the wired world / Ronald J. Deibert and John Scott-Railton -- The threat from inside ... your automobile / Isaac R. Porche III -- Part III. Responding to threats in cyberspace. Reflections on cyberdeterrence / Martin Libicki -- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates / Davis B. Bobrow -- Identifying the real and absolute enemy / Rob van Kranenburg -- Could the United States benefit from cyber-arms-control agreements? / Benoît Morel -- Transnational organized crime and digilantes in the cybercommons / Kelsey Ida -- From cybercrime to cyberwar : indicators and warnings / Timothy J. Shimeall -- Crisis management in cyberspace and in a "cybered" world / Phil Williams -- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology / Chris C. Demchak -- Conclusion / Dighton Fiddner | |
520 | |a "This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities -- for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand"--Publisher's web site | ||
650 | 4 | |a Cyberspace | |
650 | 4 | |a Cyberspace / Government policy | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Information warfare | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Cyberspace |2 fast | |
650 | 7 | |a Cyberspace / Government policy |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 4 | |a Politik | |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Williams, Phillip G. |4 edt | |
700 | 1 | |a Fiddner, Dighton |4 edt | |
856 | 4 | 0 | |u http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1319 |z URL des Erstveröffentlichers |3 Volltext |
999 | |a oai:aleph.bib-bvb.de:BVB01-029385937 |
Datensatz im Suchindex
_version_ | 1804176942112440320 |
---|---|
any_adam_object | |
author2 | Williams, Phillip G. Fiddner, Dighton |
author2_role | edt edt |
author2_variant | p g w pg pgw d f df |
author_facet | Williams, Phillip G. Fiddner, Dighton |
building | Verbundindex |
bvnumber | BV043977479 |
contents | Includes bibliographical references Introduction / Phil Williams and Dighton Fiddner -- Part I. Concepts and trends in cyberspace. Defining a framework for decision-making in cyberspace / Dighton Fiddner -- Emerging trends in cyberspace : dimensions and dilemmas / Nazli Choucri -- Technologies that will change your world / Rick Hutley -- Big data challenges, failed cities, and the rise of the new net / Jeff Boleng and Colin P. Clarke -- Part II. Challenges and threats in cyberspace. Cyberterrorism in a post-Stuxnet world / Michael Kenney -- China's reconnaissance and system sabotage activities : supporting information deterrence / Timothy L. Thomas -- Information warfare a la Russe / Stephen J. Blank -- The adaptive nature of crime : co-opting the internet / Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten -- Digitally armed and dangerous : humanitarian intervention in the wired world / Ronald J. Deibert and John Scott-Railton -- The threat from inside ... your automobile / Isaac R. Porche III -- Part III. Responding to threats in cyberspace. Reflections on cyberdeterrence / Martin Libicki -- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates / Davis B. Bobrow -- Identifying the real and absolute enemy / Rob van Kranenburg -- Could the United States benefit from cyber-arms-control agreements? / Benoît Morel -- Transnational organized crime and digilantes in the cybercommons / Kelsey Ida -- From cybercrime to cyberwar : indicators and warnings / Timothy J. Shimeall -- Crisis management in cyberspace and in a "cybered" world / Phil Williams -- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology / Chris C. Demchak -- Conclusion / Dighton Fiddner |
ctrlnum | (OCoLC)968689913 (DE-599)BVBBV043977479 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04460nmm a2200517 c 4500</leader><controlfield tag="001">BV043977479</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170102 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161223s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781584877264</subfield><subfield code="9">978-1-58487-726-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">158487726X</subfield><subfield code="c">Online</subfield><subfield code="9">158487726X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781584877264</subfield><subfield code="9">9781584877264</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)968689913</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043977479</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberspace: malevolent actors, criminal opportunities, and strategic competition</subfield><subfield code="c">Phil Williams, Dighton Fiddner, eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Carlisle, PA</subfield><subfield code="b">Strategic Studies Institute and U.S. Army War College Press</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">color illustrations, color maps</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"August 2016."</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Introduction / Phil Williams and Dighton Fiddner -- Part I. Concepts and trends in cyberspace. Defining a framework for decision-making in cyberspace / Dighton Fiddner -- Emerging trends in cyberspace : dimensions and dilemmas / Nazli Choucri -- Technologies that will change your world / Rick Hutley -- Big data challenges, failed cities, and the rise of the new net / Jeff Boleng and Colin P. Clarke -- Part II. Challenges and threats in cyberspace. Cyberterrorism in a post-Stuxnet world / Michael Kenney -- China's reconnaissance and system sabotage activities : supporting information deterrence / Timothy L. Thomas -- Information warfare a la Russe / Stephen J. Blank -- The adaptive nature of crime : co-opting the internet / Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten -- Digitally armed and dangerous : humanitarian intervention in the wired world / Ronald J. Deibert and John Scott-Railton -- The threat from inside ... your automobile / Isaac R. Porche III -- Part III. Responding to threats in cyberspace. Reflections on cyberdeterrence / Martin Libicki -- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates / Davis B. Bobrow -- Identifying the real and absolute enemy / Rob van Kranenburg -- Could the United States benefit from cyber-arms-control agreements? / Benoît Morel -- Transnational organized crime and digilantes in the cybercommons / Kelsey Ida -- From cybercrime to cyberwar : indicators and warnings / Timothy J. Shimeall -- Crisis management in cyberspace and in a "cybered" world / Phil Williams -- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology / Chris C. Demchak -- Conclusion / Dighton Fiddner</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities -- for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand"--Publisher's web site</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Government policy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace / Government policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Phillip G.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fiddner, Dighton</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1319</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029385937</subfield></datafield></record></collection> |
id | DE-604.BV043977479 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:40:11Z |
institution | BVB |
isbn | 9781584877264 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029385937 |
oclc_num | 968689913 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource color illustrations, color maps |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Strategic Studies Institute and U.S. Army War College Press |
record_format | marc |
spelling | Cyberspace: malevolent actors, criminal opportunities, and strategic competition Phil Williams, Dighton Fiddner, eds. Carlisle, PA Strategic Studies Institute and U.S. Army War College Press [2016] 1 Online-Ressource color illustrations, color maps txt rdacontent c rdamedia cr rdacarrier "August 2016." Includes bibliographical references Introduction / Phil Williams and Dighton Fiddner -- Part I. Concepts and trends in cyberspace. Defining a framework for decision-making in cyberspace / Dighton Fiddner -- Emerging trends in cyberspace : dimensions and dilemmas / Nazli Choucri -- Technologies that will change your world / Rick Hutley -- Big data challenges, failed cities, and the rise of the new net / Jeff Boleng and Colin P. Clarke -- Part II. Challenges and threats in cyberspace. Cyberterrorism in a post-Stuxnet world / Michael Kenney -- China's reconnaissance and system sabotage activities : supporting information deterrence / Timothy L. Thomas -- Information warfare a la Russe / Stephen J. Blank -- The adaptive nature of crime : co-opting the internet / Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten -- Digitally armed and dangerous : humanitarian intervention in the wired world / Ronald J. Deibert and John Scott-Railton -- The threat from inside ... your automobile / Isaac R. Porche III -- Part III. Responding to threats in cyberspace. Reflections on cyberdeterrence / Martin Libicki -- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates / Davis B. Bobrow -- Identifying the real and absolute enemy / Rob van Kranenburg -- Could the United States benefit from cyber-arms-control agreements? / Benoît Morel -- Transnational organized crime and digilantes in the cybercommons / Kelsey Ida -- From cybercrime to cyberwar : indicators and warnings / Timothy J. Shimeall -- Crisis management in cyberspace and in a "cybered" world / Phil Williams -- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology / Chris C. Demchak -- Conclusion / Dighton Fiddner "This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities -- for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand"--Publisher's web site Cyberspace Cyberspace / Government policy Cyberterrorism Computer crimes Information warfare Computer crimes fast Cyberspace fast Cyberspace / Government policy fast Cyberterrorism fast Information warfare fast Politik Cyberspace (DE-588)4266146-8 gnd rswk-swf Cyberspace (DE-588)4266146-8 s DE-604 Williams, Phillip G. edt Fiddner, Dighton edt http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1319 URL des Erstveröffentlichers Volltext |
spellingShingle | Cyberspace: malevolent actors, criminal opportunities, and strategic competition Includes bibliographical references Introduction / Phil Williams and Dighton Fiddner -- Part I. Concepts and trends in cyberspace. Defining a framework for decision-making in cyberspace / Dighton Fiddner -- Emerging trends in cyberspace : dimensions and dilemmas / Nazli Choucri -- Technologies that will change your world / Rick Hutley -- Big data challenges, failed cities, and the rise of the new net / Jeff Boleng and Colin P. Clarke -- Part II. Challenges and threats in cyberspace. Cyberterrorism in a post-Stuxnet world / Michael Kenney -- China's reconnaissance and system sabotage activities : supporting information deterrence / Timothy L. Thomas -- Information warfare a la Russe / Stephen J. Blank -- The adaptive nature of crime : co-opting the internet / Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten -- Digitally armed and dangerous : humanitarian intervention in the wired world / Ronald J. Deibert and John Scott-Railton -- The threat from inside ... your automobile / Isaac R. Porche III -- Part III. Responding to threats in cyberspace. Reflections on cyberdeterrence / Martin Libicki -- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates / Davis B. Bobrow -- Identifying the real and absolute enemy / Rob van Kranenburg -- Could the United States benefit from cyber-arms-control agreements? / Benoît Morel -- Transnational organized crime and digilantes in the cybercommons / Kelsey Ida -- From cybercrime to cyberwar : indicators and warnings / Timothy J. Shimeall -- Crisis management in cyberspace and in a "cybered" world / Phil Williams -- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology / Chris C. Demchak -- Conclusion / Dighton Fiddner Cyberspace Cyberspace / Government policy Cyberterrorism Computer crimes Information warfare Computer crimes fast Cyberspace fast Cyberspace / Government policy fast Cyberterrorism fast Information warfare fast Politik Cyberspace (DE-588)4266146-8 gnd |
subject_GND | (DE-588)4266146-8 |
title | Cyberspace: malevolent actors, criminal opportunities, and strategic competition |
title_auth | Cyberspace: malevolent actors, criminal opportunities, and strategic competition |
title_exact_search | Cyberspace: malevolent actors, criminal opportunities, and strategic competition |
title_full | Cyberspace: malevolent actors, criminal opportunities, and strategic competition Phil Williams, Dighton Fiddner, eds. |
title_fullStr | Cyberspace: malevolent actors, criminal opportunities, and strategic competition Phil Williams, Dighton Fiddner, eds. |
title_full_unstemmed | Cyberspace: malevolent actors, criminal opportunities, and strategic competition Phil Williams, Dighton Fiddner, eds. |
title_short | Cyberspace: malevolent actors, criminal opportunities, and strategic competition |
title_sort | cyberspace malevolent actors criminal opportunities and strategic competition |
topic | Cyberspace Cyberspace / Government policy Cyberterrorism Computer crimes Information warfare Computer crimes fast Cyberspace fast Cyberspace / Government policy fast Cyberterrorism fast Information warfare fast Politik Cyberspace (DE-588)4266146-8 gnd |
topic_facet | Cyberspace Cyberspace / Government policy Cyberterrorism Computer crimes Information warfare Politik |
url | http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1319 |
work_keys_str_mv | AT williamsphillipg cyberspacemalevolentactorscriminalopportunitiesandstrategiccompetition AT fiddnerdighton cyberspacemalevolentactorscriminalopportunitiesandstrategiccompetition |