Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization /
"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society...
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2012.
|
Subjects: | |
Online Access: | Chapter PDFs via platform: |
Table of Contents:
- The security practitioners' perspective
- Economic, political and social threats in the information age
- Critical information infrastructure and cyber-terrorism
- Attackers: internal and external
- Threats, vulnerability, uncertainty and information risk
- ICT and security governance: doing the right things the right way (and well enough)
- Concerns about what will happen next: should these things keep you awake at night?
- To define or not to define: law and policy conundrums for the cybercrime, national security, international law and military law communities
- Anonymity, actual incidents, cyber attacks and digital immobilization
- Culture clashes: freedom, privacy, and government surveillance issues arising in relation to national security and internet use
- What is cyberterrorism and how real is the threat?: a review of the academic literature, 1996-2009
- Cyber-search and cyber-seizure: policy considerations of cyber operations and fourth amendment implications
- Terrorism and the internet: do we need an international solution?
- Case study: India - terrorism and terrorist use of the internet/technology
- China's cyber tool: striving to attain electronic shi?
- The United Kingdom's centre for the protection of national infrastructure: an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructures.