Cyberwars in the Middle East /:
Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New Brunswick :
Rutgers University Press,
[2021]
|
Schriftenreihe: | War culture.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz's structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists' political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks. |
Beschreibung: | Description based upon print version of record. |
Beschreibung: | 1 online resource (193 p.). |
ISBN: | 1978810148 9781978810143 1978810121 9781978810129 |
Internformat
MARC
LEADER | 00000cam a2200000Mu 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1259591222 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210710s2021 nju o 000 0 eng d | ||
010 | |a 2020052863 | ||
040 | |a EBLCP |b eng |c EBLCP |d YDX |d N$T |d OCLCO |d OCLCF |d VRC |d OCLCO |d DEGRU |d BRX |d OCLCO |d UKAHL |d QGK |d OCLCL | ||
019 | |a 1268403173 |a 1280167334 |a 1396894840 |a 1396916858 | ||
020 | |a 1978810148 | ||
020 | |a 9781978810143 |q (electronic bk.) | ||
020 | |a 1978810121 | ||
020 | |a 9781978810129 | ||
024 | 7 | |a 10.36019/9781978810143 |2 doi | |
035 | |a (OCoLC)1259591222 |z (OCoLC)1268403173 |z (OCoLC)1280167334 |z (OCoLC)1396894840 |z (OCoLC)1396916858 | ||
043 | |a aw----- | ||
050 | 4 | |a U163 |b .A37 2021 | |
072 | 7 | |a HIS000000 |2 bisacsh | |
082 | 7 | |a 355.4 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Al-Rawi, Ahmed K., |e author. |0 http://id.loc.gov/authorities/names/no2012121509 | |
245 | 1 | 0 | |a Cyberwars in the Middle East / |c Ahmed Al-Rawi. |
264 | 1 | |a New Brunswick : |b Rutgers University Press, |c [2021] | |
300 | |a 1 online resource (193 p.). | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a War Culture Ser. | |
500 | |a Description based upon print version of record. | ||
505 | 0 | |a Cover -- Series Page -- Title Page -- Copyright -- Dedication -- Contents -- Preface and Acknowledgments -- Introduction -- 1. Toward a Theoretical Framework of Cyberwars -- 2. Cyberwars and International Politics -- 3. U.S. Cyberoperations in the Middle East -- 4. Russian Trolls, Islam, and the Middle East -- 5. Cyberwars and Regional Politics -- 6. Arab Hackers and Electronic Armies -- Conclusion -- Appendix: Selected List of Arab Hacking Groups -- Notes -- References -- Index -- About the Author | |
520 | |a Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz's structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists' political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks. | ||
546 | |a In English. | ||
650 | 0 | |a Information warfare |z Middle East. | |
650 | 0 | |a Cyberspace |x Political aspects |z Middle East. | |
650 | 0 | |a Hacking |z Middle East. | |
650 | 7 | |a HISTORY / General. |2 bisacsh | |
650 | 7 | |a Cyberspace |x Political aspects. |2 fast |0 (OCoLC)fst00885798 | |
650 | 7 | |a Hacking. |2 fast |0 (OCoLC)fst01909643 | |
650 | 7 | |a Information warfare. |2 fast |0 (OCoLC)fst00973186 | |
651 | 7 | |a Middle East. |2 fast |0 (OCoLC)fst01241586 | |
653 | |a middle east, cybersecurity, hacking, hackers, communication, politics, policies, influence, structural realism theory, political disruption, Algeria, Algerian hackers, horizontal leadership, surveillance, internal politics, opposition, ideology, government, cyber-attacks, regional politics, Arab, Russia, trolls, Islam, international, international politics. | ||
758 | |i has work: |a Cyberwars in the Middle East (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFY9Jhj6KdWTvxm3ph7pdP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Al-Rawi, Ahmed |t Cyberwars in the Middle East |d New Brunswick : Rutgers University Press,c2021 |z 9781978810112 |
830 | 0 | |a War culture. |0 http://id.loc.gov/authorities/names/no2015014758 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2636830 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH39801187 | ||
938 | |a De Gruyter |b DEGR |n 9781978810143 | ||
938 | |a YBP Library Services |b YANK |n 17278558 | ||
938 | |a YBP Library Services |b YANK |n 302323710 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6661535 | ||
938 | |a EBSCOhost |b EBSC |n 2636830 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1259591222 |
---|---|
_version_ | 1816882546869272576 |
adam_text | |
any_adam_object | |
author | Al-Rawi, Ahmed K. |
author_GND | http://id.loc.gov/authorities/names/no2012121509 |
author_facet | Al-Rawi, Ahmed K. |
author_role | aut |
author_sort | Al-Rawi, Ahmed K. |
author_variant | a k a r aka akar |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 .A37 2021 |
callnumber-search | U163 .A37 2021 |
callnumber-sort | U 3163 A37 42021 |
callnumber-subject | U - General Military Science |
collection | ZDB-4-EBA |
contents | Cover -- Series Page -- Title Page -- Copyright -- Dedication -- Contents -- Preface and Acknowledgments -- Introduction -- 1. Toward a Theoretical Framework of Cyberwars -- 2. Cyberwars and International Politics -- 3. U.S. Cyberoperations in the Middle East -- 4. Russian Trolls, Islam, and the Middle East -- 5. Cyberwars and Regional Politics -- 6. Arab Hackers and Electronic Armies -- Conclusion -- Appendix: Selected List of Arab Hacking Groups -- Notes -- References -- Index -- About the Author |
ctrlnum | (OCoLC)1259591222 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05592cam a2200661Mu 4500</leader><controlfield tag="001">ZDB-4-EBA-on1259591222</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">210710s2021 nju o 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2020052863</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="c">EBLCP</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VRC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEGRU</subfield><subfield code="d">BRX</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UKAHL</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1268403173</subfield><subfield code="a">1280167334</subfield><subfield code="a">1396894840</subfield><subfield code="a">1396916858</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1978810148</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781978810143</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1978810121</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781978810129</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.36019/9781978810143</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1259591222</subfield><subfield code="z">(OCoLC)1268403173</subfield><subfield code="z">(OCoLC)1280167334</subfield><subfield code="z">(OCoLC)1396894840</subfield><subfield code="z">(OCoLC)1396916858</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">aw-----</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U163</subfield><subfield code="b">.A37 2021</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">355.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Al-Rawi, Ahmed K.,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2012121509</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberwars in the Middle East /</subfield><subfield code="c">Ahmed Al-Rawi.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Brunswick :</subfield><subfield code="b">Rutgers University Press,</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (193 p.).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">War Culture Ser.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Series Page -- Title Page -- Copyright -- Dedication -- Contents -- Preface and Acknowledgments -- Introduction -- 1. Toward a Theoretical Framework of Cyberwars -- 2. Cyberwars and International Politics -- 3. U.S. Cyberoperations in the Middle East -- 4. Russian Trolls, Islam, and the Middle East -- 5. Cyberwars and Regional Politics -- 6. Arab Hackers and Electronic Armies -- Conclusion -- Appendix: Selected List of Arab Hacking Groups -- Notes -- References -- Index -- About the Author</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz's structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists' political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">Middle East.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Political aspects</subfield><subfield code="z">Middle East.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield><subfield code="z">Middle East.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="x">Political aspects.</subfield><subfield code="2">fast</subfield><subfield code="0">(OCoLC)fst00885798</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hacking.</subfield><subfield code="2">fast</subfield><subfield code="0">(OCoLC)fst01909643</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare.</subfield><subfield code="2">fast</subfield><subfield code="0">(OCoLC)fst00973186</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Middle East.</subfield><subfield code="2">fast</subfield><subfield code="0">(OCoLC)fst01241586</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">middle east, cybersecurity, hacking, hackers, communication, politics, policies, influence, structural realism theory, political disruption, Algeria, Algerian hackers, horizontal leadership, surveillance, internal politics, opposition, ideology, government, cyber-attacks, regional politics, Arab, Russia, trolls, Islam, international, international politics.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyberwars in the Middle East (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFY9Jhj6KdWTvxm3ph7pdP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Al-Rawi, Ahmed</subfield><subfield code="t">Cyberwars in the Middle East</subfield><subfield code="d">New Brunswick : Rutgers University Press,c2021</subfield><subfield code="z">9781978810112</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">War culture.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015014758</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2636830</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH39801187</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9781978810143</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">17278558</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">302323710</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6661535</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2636830</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | Middle East. fast (OCoLC)fst01241586 |
geographic_facet | Middle East. |
id | ZDB-4-EBA-on1259591222 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:20Z |
institution | BVB |
isbn | 1978810148 9781978810143 1978810121 9781978810129 |
language | English |
lccn | 2020052863 |
oclc_num | 1259591222 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (193 p.). |
psigel | ZDB-4-EBA |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Rutgers University Press, |
record_format | marc |
series | War culture. |
series2 | War Culture Ser. |
spelling | Al-Rawi, Ahmed K., author. http://id.loc.gov/authorities/names/no2012121509 Cyberwars in the Middle East / Ahmed Al-Rawi. New Brunswick : Rutgers University Press, [2021] 1 online resource (193 p.). text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda War Culture Ser. Description based upon print version of record. Cover -- Series Page -- Title Page -- Copyright -- Dedication -- Contents -- Preface and Acknowledgments -- Introduction -- 1. Toward a Theoretical Framework of Cyberwars -- 2. Cyberwars and International Politics -- 3. U.S. Cyberoperations in the Middle East -- 4. Russian Trolls, Islam, and the Middle East -- 5. Cyberwars and Regional Politics -- 6. Arab Hackers and Electronic Armies -- Conclusion -- Appendix: Selected List of Arab Hacking Groups -- Notes -- References -- Index -- About the Author Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz's structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists' political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks. In English. Information warfare Middle East. Cyberspace Political aspects Middle East. Hacking Middle East. HISTORY / General. bisacsh Cyberspace Political aspects. fast (OCoLC)fst00885798 Hacking. fast (OCoLC)fst01909643 Information warfare. fast (OCoLC)fst00973186 Middle East. fast (OCoLC)fst01241586 middle east, cybersecurity, hacking, hackers, communication, politics, policies, influence, structural realism theory, political disruption, Algeria, Algerian hackers, horizontal leadership, surveillance, internal politics, opposition, ideology, government, cyber-attacks, regional politics, Arab, Russia, trolls, Islam, international, international politics. has work: Cyberwars in the Middle East (Text) https://id.oclc.org/worldcat/entity/E39PCFY9Jhj6KdWTvxm3ph7pdP https://id.oclc.org/worldcat/ontology/hasWork Print version: Al-Rawi, Ahmed Cyberwars in the Middle East New Brunswick : Rutgers University Press,c2021 9781978810112 War culture. http://id.loc.gov/authorities/names/no2015014758 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2636830 Volltext |
spellingShingle | Al-Rawi, Ahmed K. Cyberwars in the Middle East / War culture. Cover -- Series Page -- Title Page -- Copyright -- Dedication -- Contents -- Preface and Acknowledgments -- Introduction -- 1. Toward a Theoretical Framework of Cyberwars -- 2. Cyberwars and International Politics -- 3. U.S. Cyberoperations in the Middle East -- 4. Russian Trolls, Islam, and the Middle East -- 5. Cyberwars and Regional Politics -- 6. Arab Hackers and Electronic Armies -- Conclusion -- Appendix: Selected List of Arab Hacking Groups -- Notes -- References -- Index -- About the Author Information warfare Middle East. Cyberspace Political aspects Middle East. Hacking Middle East. HISTORY / General. bisacsh Cyberspace Political aspects. fast (OCoLC)fst00885798 Hacking. fast (OCoLC)fst01909643 Information warfare. fast (OCoLC)fst00973186 |
subject_GND | (OCoLC)fst00885798 (OCoLC)fst01909643 (OCoLC)fst00973186 (OCoLC)fst01241586 |
title | Cyberwars in the Middle East / |
title_auth | Cyberwars in the Middle East / |
title_exact_search | Cyberwars in the Middle East / |
title_full | Cyberwars in the Middle East / Ahmed Al-Rawi. |
title_fullStr | Cyberwars in the Middle East / Ahmed Al-Rawi. |
title_full_unstemmed | Cyberwars in the Middle East / Ahmed Al-Rawi. |
title_short | Cyberwars in the Middle East / |
title_sort | cyberwars in the middle east |
topic | Information warfare Middle East. Cyberspace Political aspects Middle East. Hacking Middle East. HISTORY / General. bisacsh Cyberspace Political aspects. fast (OCoLC)fst00885798 Hacking. fast (OCoLC)fst01909643 Information warfare. fast (OCoLC)fst00973186 |
topic_facet | Information warfare Middle East. Cyberspace Political aspects Middle East. Hacking Middle East. HISTORY / General. Cyberspace Political aspects. Hacking. Information warfare. Middle East. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2636830 |
work_keys_str_mv | AT alrawiahmedk cyberwarsinthemiddleeast |