Law, policy, and technology: cyberterrorism, information warfare, and Internet immobilization
"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2012.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher. |
Beschreibung: | electronic texts (446 p.) : digital files. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781615208326 (ebook) |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00041762 | ||
003 | IGIG | ||
005 | 20121117141621.0 | ||
006 | m e d | ||
007 | cr bn||||m|||a | ||
008 | 121114s2012 pau fob 000 0 eng d | ||
010 | |z 2012004590 | ||
020 | |a 9781615208326 (ebook) | ||
020 | |z 9781615208319 (hbk.) | ||
024 | 7 | |a 10.4018/978-1-61520-831-9 |2 doi | |
035 | |a (CaBNVSL)gtp00553971 | ||
035 | |a (OCoLC)818587628 | ||
040 | |a CaBNVSL |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HV6773.15.C97 |b L39 2012e | |
082 | 7 | |a 363.325 |2 23 | |
245 | 0 | 0 | |a Law, policy, and technology |h [electronic resource] |b cyberterrorism, information warfare, and Internet immobilization |c Pauline C. Reich and Eduardo Gelbstein, editors. |
260 | |a Hershey, Pa. : |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), |c c2012. | ||
300 | |a electronic texts (446 p.) : |b digital files. | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a The security practitioners' perspective -- Economic, political and social threats in the information age -- Critical information infrastructure and cyber-terrorism -- Attackers: internal and external -- Threats, vulnerability, uncertainty and information risk -- ICT and security governance: doing the right things the right way (and well enough) -- Concerns about what will happen next: should these things keep you awake at night? -- To define or not to define: law and policy conundrums for the cybercrime, national security, international law and military law communities -- Anonymity, actual incidents, cyber attacks and digital immobilization -- Culture clashes: freedom, privacy, and government surveillance issues arising in relation to national security and internet use -- What is cyberterrorism and how real is the threat?: a review of the academic literature, 1996-2009 -- Cyber-search and cyber-seizure: policy considerations of cyber operations and fourth amendment implications -- Terrorism and the internet: do we need an international solution? -- Case study: India - terrorism and terrorist use of the internet/technology -- China's cyber tool: striving to attain electronic shi? -- The United Kingdom's centre for the protection of national infrastructure: an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructures. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed November 15, 2012). | ||
650 | 0 | |a Computer crimes. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Cyberspace. | |
650 | 0 | |a Cyberterrorism. | |
650 | 0 | |a Data protection. | |
653 | |a Critical information infrastructure | ||
653 | |a Cyber attacks | ||
653 | |a Cyber-deterrence | ||
653 | |a Cyber-search and cyber-seizure | ||
653 | |a Cyberterrorism | ||
653 | |a Economic, political and social threats in the information age | ||
653 | |a ICT and security governance | ||
653 | |a Law and policy perspective | ||
653 | |a Policy considerations of cyber operations | ||
653 | |a Threats, vulnerability, uncertainty and information risk | ||
700 | 1 | |a Gelbstein, Eduardo. | |
700 | 1 | |a Reich, Pauline C. | |
710 | 2 | |a IGI Global. | |
776 | 0 | |c (Original) |w (DLC)2012004590 | |
776 | 0 | 8 | |i Print version: |z 1615208313 |z 9781615208319 |w (DLC) 2012004590 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-831-9 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00041762 |
---|---|
_version_ | 1816797074788712450 |
adam_text | |
any_adam_object | |
author2 | Gelbstein, Eduardo Reich, Pauline C. |
author2_role | |
author2_variant | e g eg p c r pc pcr |
author_corporate | IGI Global |
author_corporate_role | |
author_facet | Gelbstein, Eduardo Reich, Pauline C. IGI Global |
author_sort | Gelbstein, Eduardo |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 L39 2012e |
callnumber-search | HV6773.15.C97 L39 2012e |
callnumber-sort | HV 46773.15 C97 L39 42012E |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB |
contents | The security practitioners' perspective -- Economic, political and social threats in the information age -- Critical information infrastructure and cyber-terrorism -- Attackers: internal and external -- Threats, vulnerability, uncertainty and information risk -- ICT and security governance: doing the right things the right way (and well enough) -- Concerns about what will happen next: should these things keep you awake at night? -- To define or not to define: law and policy conundrums for the cybercrime, national security, international law and military law communities -- Anonymity, actual incidents, cyber attacks and digital immobilization -- Culture clashes: freedom, privacy, and government surveillance issues arising in relation to national security and internet use -- What is cyberterrorism and how real is the threat?: a review of the academic literature, 1996-2009 -- Cyber-search and cyber-seizure: policy considerations of cyber operations and fourth amendment implications -- Terrorism and the internet: do we need an international solution? -- Case study: India - terrorism and terrorist use of the internet/technology -- China's cyber tool: striving to attain electronic shi? -- The United Kingdom's centre for the protection of national infrastructure: an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructures. |
ctrlnum | (CaBNVSL)gtp00553971 (OCoLC)818587628 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04002nam a2200577 a 4500</leader><controlfield tag="001">ZDB-98-IGB-00041762</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20121117141621.0</controlfield><controlfield tag="006">m e d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">121114s2012 pau fob 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2012004590</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781615208326 (ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781615208319 (hbk.)</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-61520-831-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00553971</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)818587628</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773.15.C97</subfield><subfield code="b">L39 2012e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Law, policy, and technology</subfield><subfield code="h">[electronic resource] </subfield><subfield code="b">cyberterrorism, information warfare, and Internet immobilization </subfield><subfield code="c">Pauline C. Reich and Eduardo Gelbstein, editors.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hershey, Pa. :</subfield><subfield code="b">IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),</subfield><subfield code="c">c2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">electronic texts (446 p.) :</subfield><subfield code="b">digital files.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">The security practitioners' perspective -- Economic, political and social threats in the information age -- Critical information infrastructure and cyber-terrorism -- Attackers: internal and external -- Threats, vulnerability, uncertainty and information risk -- ICT and security governance: doing the right things the right way (and well enough) -- Concerns about what will happen next: should these things keep you awake at night? -- To define or not to define: law and policy conundrums for the cybercrime, national security, international law and military law communities -- Anonymity, actual incidents, cyber attacks and digital immobilization -- Culture clashes: freedom, privacy, and government surveillance issues arising in relation to national security and internet use -- What is cyberterrorism and how real is the threat?: a review of the academic literature, 1996-2009 -- Cyber-search and cyber-seizure: policy considerations of cyber operations and fourth amendment implications -- Terrorism and the internet: do we need an international solution? -- Case study: India - terrorism and terrorist use of the internet/technology -- China's cyber tool: striving to attain electronic shi? -- The United Kingdom's centre for the protection of national infrastructure: an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructures.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed November 15, 2012).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Critical information infrastructure</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber-deterrence</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber-search and cyber-seizure</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyberterrorism </subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Economic, political and social threats in the information age</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ICT and security governance</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Law and policy perspective</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Policy considerations of cyber operations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Threats, vulnerability, uncertainty and information risk</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gelbstein, Eduardo.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reich, Pauline C.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2012004590</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1615208313</subfield><subfield code="z">9781615208319</subfield><subfield code="w">(DLC) 2012004590</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-831-9</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00041762 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:48Z |
institution | BVB |
isbn | 9781615208326 (ebook) |
language | English |
oclc_num | 818587628 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | electronic texts (446 p.) : digital files. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), |
record_format | marc |
spelling | Law, policy, and technology [electronic resource] cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich and Eduardo Gelbstein, editors. Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2012. electronic texts (446 p.) : digital files. Includes bibliographical references. The security practitioners' perspective -- Economic, political and social threats in the information age -- Critical information infrastructure and cyber-terrorism -- Attackers: internal and external -- Threats, vulnerability, uncertainty and information risk -- ICT and security governance: doing the right things the right way (and well enough) -- Concerns about what will happen next: should these things keep you awake at night? -- To define or not to define: law and policy conundrums for the cybercrime, national security, international law and military law communities -- Anonymity, actual incidents, cyber attacks and digital immobilization -- Culture clashes: freedom, privacy, and government surveillance issues arising in relation to national security and internet use -- What is cyberterrorism and how real is the threat?: a review of the academic literature, 1996-2009 -- Cyber-search and cyber-seizure: policy considerations of cyber operations and fourth amendment implications -- Terrorism and the internet: do we need an international solution? -- Case study: India - terrorism and terrorist use of the internet/technology -- China's cyber tool: striving to attain electronic shi? -- The United Kingdom's centre for the protection of national infrastructure: an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructures. Restricted to subscribers or individual electronic text purchasers. "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed November 15, 2012). Computer crimes. Computer security. Cyberspace. Cyberterrorism. Data protection. Critical information infrastructure Cyber attacks Cyber-deterrence Cyber-search and cyber-seizure Cyberterrorism Economic, political and social threats in the information age ICT and security governance Law and policy perspective Policy considerations of cyber operations Threats, vulnerability, uncertainty and information risk Gelbstein, Eduardo. Reich, Pauline C. IGI Global. (Original) (DLC)2012004590 Print version: 1615208313 9781615208319 (DLC) 2012004590 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-831-9 Volltext |
spellingShingle | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization The security practitioners' perspective -- Economic, political and social threats in the information age -- Critical information infrastructure and cyber-terrorism -- Attackers: internal and external -- Threats, vulnerability, uncertainty and information risk -- ICT and security governance: doing the right things the right way (and well enough) -- Concerns about what will happen next: should these things keep you awake at night? -- To define or not to define: law and policy conundrums for the cybercrime, national security, international law and military law communities -- Anonymity, actual incidents, cyber attacks and digital immobilization -- Culture clashes: freedom, privacy, and government surveillance issues arising in relation to national security and internet use -- What is cyberterrorism and how real is the threat?: a review of the academic literature, 1996-2009 -- Cyber-search and cyber-seizure: policy considerations of cyber operations and fourth amendment implications -- Terrorism and the internet: do we need an international solution? -- Case study: India - terrorism and terrorist use of the internet/technology -- China's cyber tool: striving to attain electronic shi? -- The United Kingdom's centre for the protection of national infrastructure: an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructures. Computer crimes. Computer security. Cyberspace. Cyberterrorism. Data protection. |
title | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization |
title_auth | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization |
title_exact_search | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization |
title_full | Law, policy, and technology [electronic resource] cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich and Eduardo Gelbstein, editors. |
title_fullStr | Law, policy, and technology [electronic resource] cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich and Eduardo Gelbstein, editors. |
title_full_unstemmed | Law, policy, and technology [electronic resource] cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich and Eduardo Gelbstein, editors. |
title_short | Law, policy, and technology |
title_sort | law policy and technology cyberterrorism information warfare and internet immobilization |
title_sub | cyberterrorism, information warfare, and Internet immobilization |
topic | Computer crimes. Computer security. Cyberspace. Cyberterrorism. Data protection. |
topic_facet | Computer crimes. Computer security. Cyberspace. Cyberterrorism. Data protection. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-831-9 |
work_keys_str_mv | AT gelbsteineduardo lawpolicyandtechnologycyberterrorisminformationwarfareandinternetimmobilization AT reichpaulinec lawpolicyandtechnologycyberterrorisminformationwarfareandinternetimmobilization AT igiglobal lawpolicyandtechnologycyberterrorisminformationwarfareandinternetimmobilization |