Cyber war and cyber peace: digital conflict in the Middle East
"The Middle East is the region in which the first act of cyber warfare took place. Since then, cyber warfare has escalated and has completely altered the course of the MENA region's geopolitics. With a foreword by top national security and cyber expert, Richard A. Clarke, this is the first...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Bloomsbury Publishing
2022
|
Schriftenreihe: | Middle East Institute policy series
|
Schlagworte: | |
Online-Zugang: | BSB01 UBY01 Volltext |
Zusammenfassung: | "The Middle East is the region in which the first act of cyber warfare took place. Since then, cyber warfare has escalated and has completely altered the course of the MENA region's geopolitics. With a foreword by top national security and cyber expert, Richard A. Clarke, this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas: privacy and civil society; the types of cyber conflict; information and influence operations; and methods of countering extremism online. The book highlights the real threat of hacktivism and informational warfare between state actors and the specific issues affecting the MENA region. These include digital authoritarianism and malware attacks in the Middle East, analysis of how ISIS and the Syrian electronic army use the internet, and the impact of disinformation and cybercrime in the Gulf. The book captures the flashpoints and developments in cyber conflict in the past 10 years and offers a snapshot of the region's still-early cyber history. It also clarifies how cyber warfare may develop in the near- to medium-term future and provides ideas of how its greatest risks can be avoided" |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xi, 211 Seiten) |
ISBN: | 9780755646036 9780755646012 |
DOI: | 10.5040/9780755646036 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV048298828 | ||
003 | DE-604 | ||
005 | 20230202 | ||
007 | cr|uuu---uuuuu | ||
008 | 220624s2022 xxk|||| o||u| ||||||eng d | ||
020 | |a 9780755646036 |9 978-0-7556-4603-6 | ||
020 | |a 9780755646012 |9 978-0-7556-4601-2 | ||
024 | 7 | |a 10.5040/9780755646036 |2 doi | |
035 | |a (ZDB-162-BMD)978-0-7556-4603-6 | ||
035 | |a (OCoLC)1334040186 | ||
035 | |a (DE-599)KEP078717434 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxk |c XA-GB | ||
049 | |a DE-706 |a DE-12 | ||
050 | 0 | |a HV6773.I5.C97 | |
084 | |a MH 60950 |0 (DE-625)122909:12227 |2 rvk | ||
245 | 1 | 0 | |a Cyber war and cyber peace |b digital conflict in the Middle East |c edited by Michael Sexton, Eliza E. Campbell |
264 | 1 | |a London |b Bloomsbury Publishing |c 2022 | |
300 | |a 1 Online-Ressource (xi, 211 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Middle East Institute policy series | |
500 | |a Includes bibliographical references and index | ||
505 | 8 | |a 1. Conduct of Code: A Historical Overview of Cyberspace in MENA, Paul Kurtz, TruSTAR Technology, USA; & Aaron Ach, Good Harbor Security Risk Management, USA -- 2. Cyber Insurance as Cyber Diplomacy, Asaf Lubin, Indiana University Bloomington, USA -- 3. Industrial Cyber Attacks in the Middle East and International Consequences, Selena Larson, Dragos, USA & Sergio Caltagirone, Dragos, USA -- 4. Influence Operations in the Middle East and the Prohibition on Intervention, Ido Kilovaty, Yale Law School, USA -- 5. State-Sanctioned Hacktivism: The Syrian Electronic Army, Evan Kohlmann, Flashpoint, USA & Alex Kobray, Flashpoint, USA -- 6. Disinformation in the Gulf, James Shires, Leiden University, The Netherlands -- 7. Operation Glowing Symphony: The Missing Piece in the U.S. Online Counter-ISIS Campaign, Michael Martelle, National Security Archive, USA & Audrey Alexander, West Point's Combating Terrorism Center, USA -- 8. The Rise of Digital Authoritarianism in the Middle East, Mohammed Soliman, Middle East Institute, USA -- 9. A Battle of Two Pandemics: Coronavirus and Digital Authoritarianism in the Arab World, Sahar Khamis, University of Maryland, College Park & Middle East Institute, USA -- 10. Toward a Safer Regional Cyberspace, Mike Sexton, Middle East Institute, USA & Eliza Campbell, Middle East Institute, USA. | |
520 | 3 | |a "The Middle East is the region in which the first act of cyber warfare took place. Since then, cyber warfare has escalated and has completely altered the course of the MENA region's geopolitics. With a foreword by top national security and cyber expert, Richard A. Clarke, this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas: privacy and civil society; the types of cyber conflict; information and influence operations; and methods of countering extremism online. The book highlights the real threat of hacktivism and informational warfare between state actors and the specific issues affecting the MENA region. These include digital authoritarianism and malware attacks in the Middle East, analysis of how ISIS and the Syrian electronic army use the internet, and the impact of disinformation and cybercrime in the Gulf. The book captures the flashpoints and developments in cyber conflict in the past 10 years and offers a snapshot of the region's still-early cyber history. It also clarifies how cyber warfare may develop in the near- to medium-term future and provides ideas of how its greatest risks can be avoided" | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information |0 (DE-588)4026899-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Fehlinformation |0 (DE-588)4113529-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Autoritarismus |0 (DE-588)4232076-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Radikalismus |0 (DE-588)4048171-2 |2 gnd |9 rswk-swf |
651 | 7 | |a Nordafrika |0 (DE-588)4042482-0 |2 gnd |9 rswk-swf | |
651 | 7 | |a Mittlerer Osten |0 (DE-588)4039755-5 |2 gnd |9 rswk-swf | |
651 | 7 | |a Naher Osten |0 (DE-588)4068878-1 |2 gnd |9 rswk-swf | |
653 | 0 | |a Cyberterrorism / Middle East | |
653 | 0 | |a Information warfare / Middle East | |
653 | 0 | |a Computer security / Middle East | |
653 | 0 | |a Computer crimes / Political aspects / Middle East | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Naher Osten |0 (DE-588)4068878-1 |D g |
689 | 0 | 1 | |a Mittlerer Osten |0 (DE-588)4039755-5 |D g |
689 | 0 | 2 | |a Nordafrika |0 (DE-588)4042482-0 |D g |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Information |0 (DE-588)4026899-8 |D s |
689 | 0 | 5 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 6 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 7 | |a Autoritarismus |0 (DE-588)4232076-8 |D s |
689 | 0 | 8 | |a Fehlinformation |0 (DE-588)4113529-5 |D s |
689 | 0 | 9 | |a Radikalismus |0 (DE-588)4048171-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sexton, Michael |0 (DE-588)1276153848 |4 edt | |
700 | 1 | |a Campbell, Eliza E. |0 (DE-588)1227698062 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hbk |z 978-0-7556-4604-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, pbk |z 978-0-7556-4600-5 |
856 | 4 | 0 | |u https://doi.org/10.5040/9780755646036?locatt=label:secondary_bloomsburyCollections |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-162-BMD | ||
940 | 1 | |q ZDB-162-BMD22 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-033678643 | ||
966 | e | |u https://doi.org/10.5040/9780755646036?locatt=label:secondary_bloomsburyCollections |l BSB01 |p ZDB-162-BMD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.5040/9780755646036?locatt=label:secondary_bloomsburyCollections |l UBY01 |p ZDB-162-BMD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184138519937024 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Sexton, Michael Campbell, Eliza E. |
author2_role | edt edt |
author2_variant | m s ms e e c ee eec |
author_GND | (DE-588)1276153848 (DE-588)1227698062 |
author_facet | Sexton, Michael Campbell, Eliza E. |
building | Verbundindex |
bvnumber | BV048298828 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.I5.C97 |
callnumber-search | HV6773.I5.C97 |
callnumber-sort | HV 46773 I5 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | MH 60950 |
collection | ZDB-162-BMD |
contents | 1. Conduct of Code: A Historical Overview of Cyberspace in MENA, Paul Kurtz, TruSTAR Technology, USA; & Aaron Ach, Good Harbor Security Risk Management, USA -- 2. Cyber Insurance as Cyber Diplomacy, Asaf Lubin, Indiana University Bloomington, USA -- 3. Industrial Cyber Attacks in the Middle East and International Consequences, Selena Larson, Dragos, USA & Sergio Caltagirone, Dragos, USA -- 4. Influence Operations in the Middle East and the Prohibition on Intervention, Ido Kilovaty, Yale Law School, USA -- 5. State-Sanctioned Hacktivism: The Syrian Electronic Army, Evan Kohlmann, Flashpoint, USA & Alex Kobray, Flashpoint, USA -- 6. Disinformation in the Gulf, James Shires, Leiden University, The Netherlands -- 7. Operation Glowing Symphony: The Missing Piece in the U.S. Online Counter-ISIS Campaign, Michael Martelle, National Security Archive, USA & Audrey Alexander, West Point's Combating Terrorism Center, USA -- 8. The Rise of Digital Authoritarianism in the Middle East, Mohammed Soliman, Middle East Institute, USA -- 9. A Battle of Two Pandemics: Coronavirus and Digital Authoritarianism in the Arab World, Sahar Khamis, University of Maryland, College Park & Middle East Institute, USA -- 10. Toward a Safer Regional Cyberspace, Mike Sexton, Middle East Institute, USA & Eliza Campbell, Middle East Institute, USA. |
ctrlnum | (ZDB-162-BMD)978-0-7556-4603-6 (OCoLC)1334040186 (DE-599)KEP078717434 |
discipline | Politologie |
discipline_str_mv | Politologie |
doi_str_mv | 10.5040/9780755646036 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06023nmm a22007811c 4500</leader><controlfield tag="001">BV048298828</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230202 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220624s2022 xxk|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780755646036</subfield><subfield code="9">978-0-7556-4603-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780755646012</subfield><subfield code="9">978-0-7556-4601-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.5040/9780755646036</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-162-BMD)978-0-7556-4603-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1334040186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP078717434</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">XA-GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.I5.C97</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MH 60950</subfield><subfield code="0">(DE-625)122909:12227</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber war and cyber peace</subfield><subfield code="b">digital conflict in the Middle East</subfield><subfield code="c">edited by Michael Sexton, Eliza E. Campbell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Bloomsbury Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 211 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Middle East Institute policy series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Conduct of Code: A Historical Overview of Cyberspace in MENA, Paul Kurtz, TruSTAR Technology, USA; & Aaron Ach, Good Harbor Security Risk Management, USA -- 2. Cyber Insurance as Cyber Diplomacy, Asaf Lubin, Indiana University Bloomington, USA -- 3. Industrial Cyber Attacks in the Middle East and International Consequences, Selena Larson, Dragos, USA & Sergio Caltagirone, Dragos, USA -- 4. Influence Operations in the Middle East and the Prohibition on Intervention, Ido Kilovaty, Yale Law School, USA -- 5. State-Sanctioned Hacktivism: The Syrian Electronic Army, Evan Kohlmann, Flashpoint, USA & Alex Kobray, Flashpoint, USA -- 6. Disinformation in the Gulf, James Shires, Leiden University, The Netherlands -- 7. Operation Glowing Symphony: The Missing Piece in the U.S. Online Counter-ISIS Campaign, Michael Martelle, National Security Archive, USA & Audrey Alexander, West Point's Combating Terrorism Center, USA -- 8. The Rise of Digital Authoritarianism in the Middle East, Mohammed Soliman, Middle East Institute, USA -- 9. A Battle of Two Pandemics: Coronavirus and Digital Authoritarianism in the Arab World, Sahar Khamis, University of Maryland, College Park & Middle East Institute, USA -- 10. Toward a Safer Regional Cyberspace, Mike Sexton, Middle East Institute, USA & Eliza Campbell, Middle East Institute, USA.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"The Middle East is the region in which the first act of cyber warfare took place. Since then, cyber warfare has escalated and has completely altered the course of the MENA region's geopolitics. With a foreword by top national security and cyber expert, Richard A. Clarke, this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas: privacy and civil society; the types of cyber conflict; information and influence operations; and methods of countering extremism online. The book highlights the real threat of hacktivism and informational warfare between state actors and the specific issues affecting the MENA region. These include digital authoritarianism and malware attacks in the Middle East, analysis of how ISIS and the Syrian electronic army use the internet, and the impact of disinformation and cybercrime in the Gulf. The book captures the flashpoints and developments in cyber conflict in the past 10 years and offers a snapshot of the region's still-early cyber history. It also clarifies how cyber warfare may develop in the near- to medium-term future and provides ideas of how its greatest risks can be avoided"</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information</subfield><subfield code="0">(DE-588)4026899-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Fehlinformation</subfield><subfield code="0">(DE-588)4113529-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Autoritarismus</subfield><subfield code="0">(DE-588)4232076-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Radikalismus</subfield><subfield code="0">(DE-588)4048171-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Nordafrika</subfield><subfield code="0">(DE-588)4042482-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Mittlerer Osten</subfield><subfield code="0">(DE-588)4039755-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Naher Osten</subfield><subfield code="0">(DE-588)4068878-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism / Middle East</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information warfare / Middle East</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Middle East</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes / Political aspects / Middle East</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Naher Osten</subfield><subfield code="0">(DE-588)4068878-1</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Mittlerer Osten</subfield><subfield code="0">(DE-588)4039755-5</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Nordafrika</subfield><subfield code="0">(DE-588)4042482-0</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Information</subfield><subfield code="0">(DE-588)4026899-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Autoritarismus</subfield><subfield code="0">(DE-588)4232076-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="8"><subfield code="a">Fehlinformation</subfield><subfield code="0">(DE-588)4113529-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="9"><subfield code="a">Radikalismus</subfield><subfield code="0">(DE-588)4048171-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sexton, Michael</subfield><subfield code="0">(DE-588)1276153848</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Campbell, Eliza E.</subfield><subfield code="0">(DE-588)1227698062</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hbk</subfield><subfield code="z">978-0-7556-4604-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, pbk</subfield><subfield code="z">978-0-7556-4600-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.5040/9780755646036?locatt=label:secondary_bloomsburyCollections</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-162-BMD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-162-BMD22</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033678643</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.5040/9780755646036?locatt=label:secondary_bloomsburyCollections</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-162-BMD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.5040/9780755646036?locatt=label:secondary_bloomsburyCollections</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-162-BMD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
geographic | Nordafrika (DE-588)4042482-0 gnd Mittlerer Osten (DE-588)4039755-5 gnd Naher Osten (DE-588)4068878-1 gnd |
geographic_facet | Nordafrika Mittlerer Osten Naher Osten |
id | DE-604.BV048298828 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:06:09Z |
indexdate | 2024-07-10T09:34:34Z |
institution | BVB |
isbn | 9780755646036 9780755646012 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033678643 |
oclc_num | 1334040186 |
open_access_boolean | |
owner | DE-706 DE-12 |
owner_facet | DE-706 DE-12 |
physical | 1 Online-Ressource (xi, 211 Seiten) |
psigel | ZDB-162-BMD ZDB-162-BMD22 |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Bloomsbury Publishing |
record_format | marc |
series2 | Middle East Institute policy series |
spelling | Cyber war and cyber peace digital conflict in the Middle East edited by Michael Sexton, Eliza E. Campbell London Bloomsbury Publishing 2022 1 Online-Ressource (xi, 211 Seiten) txt rdacontent c rdamedia cr rdacarrier Middle East Institute policy series Includes bibliographical references and index 1. Conduct of Code: A Historical Overview of Cyberspace in MENA, Paul Kurtz, TruSTAR Technology, USA; & Aaron Ach, Good Harbor Security Risk Management, USA -- 2. Cyber Insurance as Cyber Diplomacy, Asaf Lubin, Indiana University Bloomington, USA -- 3. Industrial Cyber Attacks in the Middle East and International Consequences, Selena Larson, Dragos, USA & Sergio Caltagirone, Dragos, USA -- 4. Influence Operations in the Middle East and the Prohibition on Intervention, Ido Kilovaty, Yale Law School, USA -- 5. State-Sanctioned Hacktivism: The Syrian Electronic Army, Evan Kohlmann, Flashpoint, USA & Alex Kobray, Flashpoint, USA -- 6. Disinformation in the Gulf, James Shires, Leiden University, The Netherlands -- 7. Operation Glowing Symphony: The Missing Piece in the U.S. Online Counter-ISIS Campaign, Michael Martelle, National Security Archive, USA & Audrey Alexander, West Point's Combating Terrorism Center, USA -- 8. The Rise of Digital Authoritarianism in the Middle East, Mohammed Soliman, Middle East Institute, USA -- 9. A Battle of Two Pandemics: Coronavirus and Digital Authoritarianism in the Arab World, Sahar Khamis, University of Maryland, College Park & Middle East Institute, USA -- 10. Toward a Safer Regional Cyberspace, Mike Sexton, Middle East Institute, USA & Eliza Campbell, Middle East Institute, USA. "The Middle East is the region in which the first act of cyber warfare took place. Since then, cyber warfare has escalated and has completely altered the course of the MENA region's geopolitics. With a foreword by top national security and cyber expert, Richard A. Clarke, this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas: privacy and civil society; the types of cyber conflict; information and influence operations; and methods of countering extremism online. The book highlights the real threat of hacktivism and informational warfare between state actors and the specific issues affecting the MENA region. These include digital authoritarianism and malware attacks in the Middle East, analysis of how ISIS and the Syrian electronic army use the internet, and the impact of disinformation and cybercrime in the Gulf. The book captures the flashpoints and developments in cyber conflict in the past 10 years and offers a snapshot of the region's still-early cyber history. It also clarifies how cyber warfare may develop in the near- to medium-term future and provides ideas of how its greatest risks can be avoided" Datensicherung (DE-588)4011144-1 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Information (DE-588)4026899-8 gnd rswk-swf Fehlinformation (DE-588)4113529-5 gnd rswk-swf Autoritarismus (DE-588)4232076-8 gnd rswk-swf Radikalismus (DE-588)4048171-2 gnd rswk-swf Nordafrika (DE-588)4042482-0 gnd rswk-swf Mittlerer Osten (DE-588)4039755-5 gnd rswk-swf Naher Osten (DE-588)4068878-1 gnd rswk-swf Cyberterrorism / Middle East Information warfare / Middle East Computer security / Middle East Computer crimes / Political aspects / Middle East (DE-588)4143413-4 Aufsatzsammlung gnd-content Naher Osten (DE-588)4068878-1 g Mittlerer Osten (DE-588)4039755-5 g Nordafrika (DE-588)4042482-0 g Datensicherung (DE-588)4011144-1 s Information (DE-588)4026899-8 s Sicherheit (DE-588)4054790-5 s Internet (DE-588)4308416-3 s Autoritarismus (DE-588)4232076-8 s Fehlinformation (DE-588)4113529-5 s Radikalismus (DE-588)4048171-2 s DE-604 Sexton, Michael (DE-588)1276153848 edt Campbell, Eliza E. (DE-588)1227698062 edt Erscheint auch als Druck-Ausgabe, hbk 978-0-7556-4604-3 Erscheint auch als Druck-Ausgabe, pbk 978-0-7556-4600-5 https://doi.org/10.5040/9780755646036?locatt=label:secondary_bloomsburyCollections Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cyber war and cyber peace digital conflict in the Middle East 1. Conduct of Code: A Historical Overview of Cyberspace in MENA, Paul Kurtz, TruSTAR Technology, USA; & Aaron Ach, Good Harbor Security Risk Management, USA -- 2. Cyber Insurance as Cyber Diplomacy, Asaf Lubin, Indiana University Bloomington, USA -- 3. Industrial Cyber Attacks in the Middle East and International Consequences, Selena Larson, Dragos, USA & Sergio Caltagirone, Dragos, USA -- 4. Influence Operations in the Middle East and the Prohibition on Intervention, Ido Kilovaty, Yale Law School, USA -- 5. State-Sanctioned Hacktivism: The Syrian Electronic Army, Evan Kohlmann, Flashpoint, USA & Alex Kobray, Flashpoint, USA -- 6. Disinformation in the Gulf, James Shires, Leiden University, The Netherlands -- 7. Operation Glowing Symphony: The Missing Piece in the U.S. Online Counter-ISIS Campaign, Michael Martelle, National Security Archive, USA & Audrey Alexander, West Point's Combating Terrorism Center, USA -- 8. The Rise of Digital Authoritarianism in the Middle East, Mohammed Soliman, Middle East Institute, USA -- 9. A Battle of Two Pandemics: Coronavirus and Digital Authoritarianism in the Arab World, Sahar Khamis, University of Maryland, College Park & Middle East Institute, USA -- 10. Toward a Safer Regional Cyberspace, Mike Sexton, Middle East Institute, USA & Eliza Campbell, Middle East Institute, USA. Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd Sicherheit (DE-588)4054790-5 gnd Information (DE-588)4026899-8 gnd Fehlinformation (DE-588)4113529-5 gnd Autoritarismus (DE-588)4232076-8 gnd Radikalismus (DE-588)4048171-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4308416-3 (DE-588)4054790-5 (DE-588)4026899-8 (DE-588)4113529-5 (DE-588)4232076-8 (DE-588)4048171-2 (DE-588)4042482-0 (DE-588)4039755-5 (DE-588)4068878-1 (DE-588)4143413-4 |
title | Cyber war and cyber peace digital conflict in the Middle East |
title_auth | Cyber war and cyber peace digital conflict in the Middle East |
title_exact_search | Cyber war and cyber peace digital conflict in the Middle East |
title_exact_search_txtP | Cyber war and cyber peace digital conflict in the Middle East |
title_full | Cyber war and cyber peace digital conflict in the Middle East edited by Michael Sexton, Eliza E. Campbell |
title_fullStr | Cyber war and cyber peace digital conflict in the Middle East edited by Michael Sexton, Eliza E. Campbell |
title_full_unstemmed | Cyber war and cyber peace digital conflict in the Middle East edited by Michael Sexton, Eliza E. Campbell |
title_short | Cyber war and cyber peace |
title_sort | cyber war and cyber peace digital conflict in the middle east |
title_sub | digital conflict in the Middle East |
topic | Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd Sicherheit (DE-588)4054790-5 gnd Information (DE-588)4026899-8 gnd Fehlinformation (DE-588)4113529-5 gnd Autoritarismus (DE-588)4232076-8 gnd Radikalismus (DE-588)4048171-2 gnd |
topic_facet | Datensicherung Internet Sicherheit Information Fehlinformation Autoritarismus Radikalismus Nordafrika Mittlerer Osten Naher Osten Aufsatzsammlung |
url | https://doi.org/10.5040/9780755646036?locatt=label:secondary_bloomsburyCollections |
work_keys_str_mv | AT sextonmichael cyberwarandcyberpeacedigitalconflictinthemiddleeast AT campbellelizae cyberwarandcyberpeacedigitalconflictinthemiddleeast |