Amazon cover image
Image from Amazon.com

Law, policy, and technology [electronic resource] : cyberterrorism, information warfare, and Internet immobilization / Pauline C. Reich and Eduardo Gelbstein, editors.

Contributor(s): Publication details: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2012.Description: electronic texts (446 p.) : digital filesISBN:
  • 9781615208326 (ebook)
Subject(s): Genre/Form: Additional physical formats: No title; Print version:: No titleDDC classification:
  • 363.325 23
LOC classification:
  • HV6773.15.C97 L39 2012e
Online resources: Available additional physical forms:
  • Also available in print.
Contents:
The security practitioners' perspective -- Economic, political and social threats in the information age -- Critical information infrastructure and cyber-terrorism -- Attackers: internal and external -- Threats, vulnerability, uncertainty and information risk -- ICT and security governance: doing the right things the right way (and well enough) -- Concerns about what will happen next: should these things keep you awake at night? -- To define or not to define: law and policy conundrums for the cybercrime, national security, international law and military law communities -- Anonymity, actual incidents, cyber attacks and digital immobilization -- Culture clashes: freedom, privacy, and government surveillance issues arising in relation to national security and internet use -- What is cyberterrorism and how real is the threat?: a review of the academic literature, 1996-2009 -- Cyber-search and cyber-seizure: policy considerations of cyber operations and fourth amendment implications -- Terrorism and the internet: do we need an international solution? -- Case study: India - terrorism and terrorist use of the internet/technology -- China's cyber tool: striving to attain electronic shi? -- The United Kingdom's centre for the protection of national infrastructure: an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructures.
Abstract: "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references.

The security practitioners' perspective -- Economic, political and social threats in the information age -- Critical information infrastructure and cyber-terrorism -- Attackers: internal and external -- Threats, vulnerability, uncertainty and information risk -- ICT and security governance: doing the right things the right way (and well enough) -- Concerns about what will happen next: should these things keep you awake at night? -- To define or not to define: law and policy conundrums for the cybercrime, national security, international law and military law communities -- Anonymity, actual incidents, cyber attacks and digital immobilization -- Culture clashes: freedom, privacy, and government surveillance issues arising in relation to national security and internet use -- What is cyberterrorism and how real is the threat?: a review of the academic literature, 1996-2009 -- Cyber-search and cyber-seizure: policy considerations of cyber operations and fourth amendment implications -- Terrorism and the internet: do we need an international solution? -- Case study: India - terrorism and terrorist use of the internet/technology -- China's cyber tool: striving to attain electronic shi? -- The United Kingdom's centre for the protection of national infrastructure: an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructures.

Restricted to subscribers or individual electronic text purchasers.

"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher.

Also available in print.

Mode of access: World Wide Web.

Description based on title screen (IGI Global, viewed November 15, 2012).

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu