Internet governance in an age of cyber insecurity:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Council on Foreign Relations
2010
|
Schriftenreihe: | CSR (New York, N.Y.)
no. 56 |
Schlagworte: | |
Beschreibung: | "September 2010." Print version record |
Beschreibung: | 1 online resource (x, 43 pages) |
ISBN: | 9780876094914 0876094914 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045349622 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2010 |||| o||u| ||||||eng d | ||
020 | |a 9780876094914 |9 978-0-87609-491-4 | ||
020 | |a 0876094914 |9 0-87609-491-4 | ||
035 | |a (ZDB-4-ITC)ocn792730690 | ||
035 | |a (OCoLC)792730690 | ||
035 | |a (DE-599)BVBBV045349622 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 004 |2 22 | |
100 | 1 | |a Knake, Robert K. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Internet governance in an age of cyber insecurity |c Robert K. Knake |
264 | 1 | |a New York, NY |b Council on Foreign Relations |c 2010 | |
300 | |a 1 online resource (x, 43 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a CSR (New York, N.Y.) |v no. 56 | |
500 | |a "September 2010." | ||
500 | |a Print version record | ||
505 | 8 | |a The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than | |
505 | 8 | |a Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. | |
505 | 8 | |a Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes | |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Internet governance |2 fast | |
650 | 7 | |a Internet in espionage |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Internet |x Security measures |z United States |a Internet governance |z United States |a Computer crimes |z United States |x Prevention |a Internet in espionage |z United States |a Cyberterrorism |x Prevention |x International cooperation | |
710 | 2 | |a Council on Foreign Relations |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Knake, Robert K. |t Internet governance in an age of cyber insecurity |d New York, NY : Council on Foreign Relations, 2010 |z 9780876094815 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736276 |
Datensatz im Suchindex
_version_ | 1804179173660426240 |
---|---|
any_adam_object | |
author | Knake, Robert K. |
author_facet | Knake, Robert K. |
author_role | aut |
author_sort | Knake, Robert K. |
author_variant | r k k rk rkk |
building | Verbundindex |
bvnumber | BV045349622 |
collection | ZDB-4-ITC |
contents | The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes |
ctrlnum | (ZDB-4-ITC)ocn792730690 (OCoLC)792730690 (DE-599)BVBBV045349622 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03441nmm a2200529zcb4500</leader><controlfield tag="001">BV045349622</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780876094914</subfield><subfield code="9">978-0-87609-491-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0876094914</subfield><subfield code="9">0-87609-491-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn792730690</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)792730690</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349622</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Knake, Robert K.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet governance in an age of cyber insecurity</subfield><subfield code="c">Robert K. Knake</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Council on Foreign Relations</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 43 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">CSR (New York, N.Y.)</subfield><subfield code="v">no. 56</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"September 2010."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet governance</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet in espionage</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield><subfield code="a">Internet governance</subfield><subfield code="z">United States</subfield><subfield code="a">Computer crimes</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield><subfield code="a">Internet in espionage</subfield><subfield code="z">United States</subfield><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield><subfield code="x">International cooperation</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Council on Foreign Relations</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Knake, Robert K.</subfield><subfield code="t">Internet governance in an age of cyber insecurity</subfield><subfield code="d">New York, NY : Council on Foreign Relations, 2010</subfield><subfield code="z">9780876094815</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736276</subfield></datafield></record></collection> |
id | DE-604.BV045349622 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:40Z |
institution | BVB |
isbn | 9780876094914 0876094914 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736276 |
oclc_num | 792730690 |
open_access_boolean | |
physical | 1 online resource (x, 43 pages) |
psigel | ZDB-4-ITC |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Council on Foreign Relations |
record_format | marc |
series2 | CSR (New York, N.Y.) |
spelling | Knake, Robert K. Verfasser aut Internet governance in an age of cyber insecurity Robert K. Knake New York, NY Council on Foreign Relations 2010 1 online resource (x, 43 pages) txt rdacontent c rdamedia cr rdacarrier CSR (New York, N.Y.) no. 56 "September 2010." Print version record The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer crimes / Prevention fast Internet governance fast Internet in espionage fast Internet / Security measures fast Internet Security measures United States Internet governance United States Computer crimes United States Prevention Internet in espionage United States Cyberterrorism Prevention International cooperation Council on Foreign Relations Sonstige oth Erscheint auch als Druck-Ausgabe Knake, Robert K. Internet governance in an age of cyber insecurity New York, NY : Council on Foreign Relations, 2010 9780876094815 |
spellingShingle | Knake, Robert K. Internet governance in an age of cyber insecurity The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer crimes / Prevention fast Internet governance fast Internet in espionage fast Internet / Security measures fast Internet Security measures United States Internet governance United States Computer crimes United States Prevention Internet in espionage United States Cyberterrorism Prevention International cooperation |
title | Internet governance in an age of cyber insecurity |
title_auth | Internet governance in an age of cyber insecurity |
title_exact_search | Internet governance in an age of cyber insecurity |
title_full | Internet governance in an age of cyber insecurity Robert K. Knake |
title_fullStr | Internet governance in an age of cyber insecurity Robert K. Knake |
title_full_unstemmed | Internet governance in an age of cyber insecurity Robert K. Knake |
title_short | Internet governance in an age of cyber insecurity |
title_sort | internet governance in an age of cyber insecurity |
topic | COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer crimes / Prevention fast Internet governance fast Internet in espionage fast Internet / Security measures fast Internet Security measures United States Internet governance United States Computer crimes United States Prevention Internet in espionage United States Cyberterrorism Prevention International cooperation |
topic_facet | COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Computer crimes / Prevention Internet governance Internet in espionage Internet / Security measures Internet Security measures United States Internet governance United States Computer crimes United States Prevention Internet in espionage United States Cyberterrorism Prevention International cooperation |
work_keys_str_mv | AT knakerobertk internetgovernanceinanageofcyberinsecurity AT councilonforeignrelations internetgovernanceinanageofcyberinsecurity |