Cyber -

Cyber

Iiss (Herausgeber)

Media-Kombination
509 Seiten
2019
Routledge
978-0-367-34689-8 (ISBN)
256,55 inkl. MwSt
This new 2 volume collection, featuring the key articles on cyber power from the journal Survival, explores its development, looking at areas such as military operations, terrorism and political processes.
Over the past several years, rising cyber power has comprehensively and profoundly affected international security. Key areas include military operations, terrorism, critical infrastructure, corporate security, individual privacy and financial security, and political processes. The burgeoning development of information technology did not always seem especially daunting from a strategic perspective. For instance, as recently as the Arab ‘spring’, which began less than a decade ago, social media seemed to power political liberalisation, casting the digital revolution as an engine of social progress. It may yet prove to be that, but for the time being less salutary aspects of the technological march have arguably overtaken the sunnier ones. The articles in this collection reflect this arc.

Edited by the International Institute of Strategic Studies

Volume 1

Introduction

Part 1: Cyber Terrorism






Kevin Soo Hoo, Seymour Goodman & Lawrence Greenberg, ‘Information Technology and the Terrorist Threat’, Survival, 39, 03, 1997, pp.135-155.



Simon Chesterman, ‘Privacy and Surveillance in the Age of Terror’, Survival, 52, 5, 2010, pp.31-46.



James Farwell, ‘Jihadi Video in the ‘War of Ideas’’, Survival, 52, 6, 2010, pp.127-150.



James Farwell, ‘The Media Strategy of ISIS’, Survival, 56, 6, 2014, pp.49-55.



Aaron Brantly, ‘Innovation an Adaption in Jihadist Digital Security’, Survival, 59, 1, 2017, pp. 79-102.
Part 2: Cyber Policy




Gregory Grove, Seymour Goodman & Stephen Lukasik, ‘Cyber Attacks and International Law’, Survival, 42, 3, 2000, pp. 89-104.



Yoichi Funabashi, ‘Asia's Digital Challenge’, Survival, 44, 1, 2002, pp. 135-144.



Nigel Inkster, ‘Chinese Intelligence in the Cyber Age’, Survival, 55, 1, 2013, pp. 45-66.



Paul Cornish, ‘Governing Cyberspace through Constructive Ambiguity’, Survival, 57, 3, 2015, pp. 153-176.



Daniel Moore & Thomas Rid, ‘Cryptopolitik and the Darknet’, Survival, 58, 1, 2016, pp. 7-38.



Ben Buchanan, ‘Cryptography and Sovereignty’, Survival, 58, 5, 2016, pp. 95-122.



Nigel Inkster, ‘Measuring Military Cyber Power’, Survival, 59, 4, 2017, pp. 27-34.



Travis Sharp, ‘Hiding in Plain Sight: Political Effects of Cyber Operations’, Survival, 60, 6, 2018, pp. 45 – 22.



Marcus Willett, ‘Assessing Cyber Power’, Survival, 61, 1, 2019, pp. 85-90.



Alex Grigsby, ‘The End of Cyber Norms’, Survival, 59, 6, 2017, pp. 109-122.
Volume 2

Part 3: Cyber Security




Christopher Hughes, ‘Google and the Great Firewall’, Survival, 52, 2, 2010, pp. 19-26.



Nigel Inkster, ‘China in Cyberspace’, Survival, 52, 4, 2010, pp. 55-66.



François Heisbourg, ‘Leaks and Lessons’, Survival, 53, 1, 2011, pp. 207-215.



Eneken Tikk-Ringas, ‘Ten Rules for Cyber Security’, Survival, 53, 3, 2011, pp. 119-132.



W. Alexander Vacca, ‘Military Culture and Cyber Security’, Survival, 53, 6, 2011, pp. 159-176.



Christopher Bronk, Cody Monk & John Villasenor, ‘The Dark Side of Cyber Finance’, Survival, 54, 2, 2012, pp. 129-142.



Christopher Bronk & Eneken Tikk-Ringas, ‘The Cyber Attack on Saudi Aramco’, Survival, 55, 2, 2013, pp. 81-96.



Nigel Inkster, ‘Cyber Attacks in La-La Land’, Survival, 57, 1, 2015, pp. 105-116.



Ben Buchanan, ‘The Life Cycles of Cyber Threats’, Survival, 58, 1, 2016, pp. 39-58.



Nigel Inkster, ‘Information Warfare and the US Presidential Election’, Survival, 58, 5, 2016, pp. 23-32.



Yu-Min Joo & Teck-Boon Tan, ‘Smart Cities: A New Age of Digital Insecurity’, Survival, 60, 2, 2018, pp. 91-2016.
Part 4: Cyber Warfare




James Farwell & Rafal Rohozinski, ‘Stuxnet and the Future of Cyber War’, Survival, 53, 1, 2011, pp. 23-40.



Alexander Klimburg, ‘Mobilising Cyber Power’, Survival, 53, 1, 2011, pp. 41-60.



James Farwell & Rafal Rohozinski, ‘The New Reality of Cyber War’, Survival, 54, 4, 2012, pp. 107-120.



David Gompert & Martin Libicki, ‘Cyber Warfare and Sino-American Crisis Instability’, Survival, 56, 4, 2014, pp. 7-22.



Lawrence Cavaiola, David Gompert & Martin Libicki, ‘Cyber House Rules: On War, Retaliation and Escalation’, Survival, 57, 1, 2015, pp. 81-104.



David Gompert & Martin Libicki, ‘Waging Cyber War the American Way’, Survival, 57, 4, 2015, pp. 7-28.



Elinor Sloan, ‘Robotics at War’, Survival, 57, 5, 2015, pp. 107-120.



Michael Fischerkeller, ‘Incorporating Offensive Cyber Operations into Conventional Deterrence Strategies’, Survival, 59, 1, 2017, pp. 103-134.



Jürgen Altmann & Frank Sauer, ‘Autonomous Weapon Systems and Strategic Stability’, Survival, 59, 5, 2017, pp. 117-142.



Sergei Boeke and Dennis Broeders, ‘The Demilitarisation of Cyber conflict’, Survival, 60, 6, 2018, pp. 73-89.

Index

Reihe/Serie Critical Themes in Contemporary Security
Zusatzinfo 4 Tables, black and white; 7 Halftones, black and white
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Gewicht 453 g
Themenwelt Sozialwissenschaften Politik / Verwaltung Europäische / Internationale Politik
Sozialwissenschaften Politik / Verwaltung Politische Systeme
Sozialwissenschaften Politik / Verwaltung Staat / Verwaltung
ISBN-10 0-367-34689-3 / 0367346893
ISBN-13 978-0-367-34689-8 / 9780367346898
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konturen der Macht. Die ungleiche Allianz China – Russland

von DGO

Druckwerk (2023)
Berliner Wissenschafts-Verlag
28,00