Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization /

"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society...

Full description

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Gelbstein, Eduardo., Reich, Pauline C.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2012.
Subjects:
Online Access:Chapter PDFs via platform:
LEADER 04088nam a2200589 a 4500
001 19121
003 IGIG
005 20121117141621.0
006 m e d
007 cr bn||||m|||a
008 121114s2012 pau fob 000 0 eng d
010 # # |z 2012004590 
020 # # |a 9781615208326 (ebook) 
020 # # |z 9781615208319 (hbk.) 
024 7 # |a 10.4018/978-1-61520-831-9  |2 doi 
035 # # |a (CaBNVSL)gtp00553971 
035 # # |a (OCoLC)818587628 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a HV6773.15.C97  |b L39 2012e 
082 0 4 |a 363.325  |2 23 
245 0 0 |a Law, policy, and technology  |b cyberterrorism, information warfare, and Internet immobilization /  |c Pauline C. Reich and Eduardo Gelbstein, editors.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2012. 
300 # # |a electronic texts (446 p.) :  |b digital files. 
504 # # |a Includes bibliographical references. 
505 0 # |a The security practitioners' perspective -- Economic, political and social threats in the information age -- Critical information infrastructure and cyber-terrorism -- Attackers: internal and external -- Threats, vulnerability, uncertainty and information risk -- ICT and security governance: doing the right things the right way (and well enough) -- Concerns about what will happen next: should these things keep you awake at night? -- To define or not to define: law and policy conundrums for the cybercrime, national security, international law and military law communities -- Anonymity, actual incidents, cyber attacks and digital immobilization -- Culture clashes: freedom, privacy, and government surveillance issues arising in relation to national security and internet use -- What is cyberterrorism and how real is the threat?: a review of the academic literature, 1996-2009 -- Cyber-search and cyber-seizure: policy considerations of cyber operations and fourth amendment implications -- Terrorism and the internet: do we need an international solution? -- Case study: India - terrorism and terrorist use of the internet/technology -- China's cyber tool: striving to attain electronic shi? -- The United Kingdom's centre for the protection of national infrastructure: an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructures. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Description based on title screen (IGI Global, viewed November 15, 2012). 
650 # 0 |a Cyberterrorism. 
650 # 0 |a Computer crimes. 
650 # 0 |a Computer security. 
650 # 0 |a Cyberspace. 
650 # 0 |a Data protection. 
653 # # |a Critical information infrastructure 
653 # # |a Cyber attacks 
653 # # |a Cyber-deterrence 
653 # # |a Cyber-search and cyber-seizure 
653 # # |a Cyberterrorism 
653 # # |a Economic, political and social threats in the information age 
653 # # |a ICT and security governance 
653 # # |a Law and policy perspective 
653 # # |a Policy considerations of cyber operations 
653 # # |a Threats, vulnerability, uncertainty and information risk 
700 1 # |a Gelbstein, Eduardo. 
700 1 # |a Reich, Pauline C. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC)2012004590 
776 0 8 |i Print version:  |w (DLC) 2012004590  |z 9781615208319  |z 1615208313 
856 4 1 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-831-9  |3 Chapter PDFs via platform: