Browse Results

Showing 28,101 through 28,125 of 100,000 results

Cybersecurity in Poland: Legal Aspects

by Katarzyna Chałubińska-Jentkiewicz Filip Radoniewicz Tadeusz Zieliński

This open access book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by the NCSA (National Cybersecurity System Act – this act was the first attempt to create a legal regulation of cybersecurity and, in addition, has implemented the provisions of the NIS Directive) but may discuss a number of other issues. The book presents international and EU regulations in the field of cybersecurity and issues pertinent to combating cybercrime and cyberterrorism. Moreover, regulations concerning cybercrime in a few select European countries are presented in addition to the problem of collision of state actions in ensuring cybersecurity and human rights. The advantages of the book include a comprehensive and synthetic approach to the issues related to the cybersecurity system of the Republic of Poland, a research perspective that takes as the basic level of analysis issues related to the security of the state and citizens, and the analysis of additional issues related to cybersecurity, such as cybercrime, cyberterrorism, and the problem of collision between states ensuring security cybernetics and human rights. The book targets a wide range of readers, especially scientists and researchers, members of legislative bodies, practitioners (especially judges, prosecutors, lawyers, law enforcement officials), experts in the field of IT security, and officials of public authorities. Most authors are scholars and researchers at the War Studies University in Warsaw. Some of them work at the Academic Centre for Cybersecurity Policy – a thinktank created by the Ministry of National Defence of the Republic of Poland.

Cybersecurity in Switzerland (SpringerBriefs in Cybersecurity)

by Myriam Dunn Cavelty

Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leading up to these strategy documents.The peculiarities of the Swiss political system, which influence the way cyber-security can be designed and practiced in Switzerland are considered, as well as the bigger, global influences and driving factors that shaped the Swiss approach to cyber-security. It shows that throughout the years, the most important influence on the Swiss policy-approach was the international level, or rather the developments of a cyber-security policy in other states. Even though many of the basic ideas about information-sharing and public-private partnerships were influenced by (amongst others) the US approach to critical infrastructure protection, the peculiarities of the Swiss political system has led to a particular “Swiss solution”, which is based on the federalist structures and subsidiary principles, characterized by stability and resilience to external shocks in the form of cyber-incidents.Cybersecurity in Switzerland will be a stimulating read for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers. It contains not only specific material on an interesting case, but also a wealth of background information on different variations of cyber-security, as well as on information-sharing and public-private partnerships.

Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022 (Advanced Sciences and Technologies for Security Applications)

by Hamid Jahankhani

This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. The ongoing pandemic has created a new level of threats which presents new challenges around privacy, data protection, malicious application, unprotected networks or networks with basic protection that are being used as a gateway to larger infrastructure with complicated architecture, and unintentional misuse such as those associated with algorithmic bias. All these have increased the number of attack vectors that can be used to attack such networks. Drawing on 13 years of successful events on information security, digital forensics and cyber-crime, the 14th ICGS3-22 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. This volume presents new materials and contribute to knowledge through the technological advances that are being made across artificial intelligence (AI), machine learning, blockchain and quantum computing. These technologies driven by a digital revolution are expected to be disruptive and provide major digital transformation in the way societies operate today. As result, although these advances provide social and economic benefits, but, also, provide new challenges that security industry need to raise their game to combat them.

Cybersecurity Policy in the EU and South Korea from Consultation to Action: Theoretical and Comparative Perspectives (New Security Challenges)

by Gertjan Boulet Michael Reiterer Ramon Pacheco Pardo

This book offers a very interesting deep-dive into EU and South Korean approaches to cybersecurity issues. In a unique approach, the editors and authors focus on the potential for strategic partnership and shared lessons learned given common commitments to democracy, human rights, the free market, and a rules-based international order of the two regions. Essential reading for students and researchers in political science, international relations, international law, strategic and defence studies, computer science, and cognitive science.

Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Advanced Sciences and Technologies for Security Applications)

by Hamid Jahankhani Arshad Jamal Shaun Lawson

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.

Cybersexism: Sex, Gender and Power on the Internet

by Laurie Penny

'The Internet was supposed to be for everyone... Millions found their voices in this brave new online world; it gave unheard masses the space to speak to each other without limits, across borders, both physical and social. It was supposed to liberate us from gender. But as more and more of our daily lives migrated on line, it seemed it did matter if you were a boy or a girl.' It's a tough time to be a woman on the internet. Over the past two generations, the political map of human relations has been redrawn by feminism and by changes in technology. Together they pose questions about the nature and organisation of society that are deeply challenging to those in power, and in both cases, the backlash is on. In this brave new world, old-style sexism is making itself felt in new and frightening ways. In Cybersexism, Laurie Penny goes to the dark heart of the matter and asks why threats of rape and violence are being used to try to silence female voices, analyses the structure of online misogyny, and makes a case for real freedom of speech – for everyone. Laurie Penny's forthcoming book, Unspeakable Things: Sex, Lies and Revolution, will be published in 2014.

Cyberspace: Risks and Benefits for Society, Security and Development (Advanced Sciences and Technologies for Security Applications)

by J. Martín Ramírez Luis A. García-Segura

This book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production. Cyberspace is analyzed from quite different and interdisciplinary perspectives, such as: conceptual and legal, military and socio-civil, psychological, commercial, cyber delinquency, cyber intelligence applied to public and private institutions, as well as the nuclear governance.

Cyberspace Crime

by D. S. Wall

This book was published in 2003.This book is a collection of key texts that have contributed towards, or have reflected, the various debates that have taken place over crime and the internet during that past decade. The texts are organised into three parts. The first contains a number of viewpoints and perspectives that facilitate our broader understanding of cyberspace crime/ cybercrimes. The second part addresses each of the major types of cybercrime - trespass/ hacking/cracking, thefts/ deceptions, obscenities/ pornography, violence - and illustrate their associated problems of definition and resolution. The third and final part contains a selection of texts that each deal with the impact of cyberspace crime upon specific criminal justice processes: the police and the trial process.

Cyberspace Crime

by David S. Wall

This book was published in 2003.This book is a collection of key texts that have contributed towards, or have reflected, the various debates that have taken place over crime and the internet during that past decade. The texts are organised into three parts. The first contains a number of viewpoints and perspectives that facilitate our broader understanding of cyberspace crime/ cybercrimes. The second part addresses each of the major types of cybercrime - trespass/ hacking/cracking, thefts/ deceptions, obscenities/ pornography, violence - and illustrate their associated problems of definition and resolution. The third and final part contains a selection of texts that each deal with the impact of cyberspace crime upon specific criminal justice processes: the police and the trial process.

Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (Advanced Sciences and Technologies for Security Applications)

by Reza Montasari

This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications.The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content.Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it.Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security.Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book’s exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies.Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI’s transformative role in shaping the future of national and international security.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the in

Cyberspace, Data Analytics, and Policing

by David Skillicorn

Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad – collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.

Cyberspace, Data Analytics, and Policing

by David Skillicorn

Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad – collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.

The Cyberspace Handbook

by Jason Whittaker

The Cyberspace Handbook is a comprehensive guide to all aspects of new media, information technologies and the internet. It gives an overview of the economic, political, social and cultural contexts of cyberspace, and provides practical advice on using new technologies for research, communication and publication. The Cyberspace Handbook includes: *a glossary of over eighty key terms*a list of over ninety web resources for news and entertainment, new media and web development, education and reference, and internet and web information* specialist chapters on web design and journalism and writing on the web*Over thirty illustrations of internet material and software applications.Jason Whittaker explores how cyberspace has been constructed, how it is used and extends into areas as different as providing us immediate news or immersive games and virtual technologies for areas such as copyright and cybercrime, as well as key skills in employing the internet for research or writing and designing for the Web.

The Cyberspace Handbook

by Jason Whittaker

The Cyberspace Handbook is a comprehensive guide to all aspects of new media, information technologies and the internet. It gives an overview of the economic, political, social and cultural contexts of cyberspace, and provides practical advice on using new technologies for research, communication and publication. The Cyberspace Handbook includes: *a glossary of over eighty key terms*a list of over ninety web resources for news and entertainment, new media and web development, education and reference, and internet and web information* specialist chapters on web design and journalism and writing on the web*Over thirty illustrations of internet material and software applications.Jason Whittaker explores how cyberspace has been constructed, how it is used and extends into areas as different as providing us immediate news or immersive games and virtual technologies for areas such as copyright and cybercrime, as well as key skills in employing the internet for research or writing and designing for the Web.

Cyberstalking und Cybercrime: Kriminalsoziologische Untersuchung zum Cyberstalking-Verhalten der Österreicher

by Edith Huber

Mit Ausweitung der Telekommunikationstechnologien hat sich das Kommunikationsverhalten der Menschen geändert und damit ist auch der Missbrauch gestiegen. Die Bandbreite reicht von Cyberstalking, -mobbing bis hin zur Computerkriminalität. Edith Huber stellt zum einen die Frage, ob durch das Aufkommen der neuen Telekommunikationstechnologien ein sozialer Wandel vollzogen wurde, der kriminelles bzw. missbräuchliches Verhalten fördert. Zum anderen geht sie der Frage nach, was in unserer Gesellschaft als „computerkriminell“ zu werten ist. Werden wir alle zu Tätern?

Cybertext Poetics: The Critical Landscape of New Media Literary Theory (International Texts in Critical Media Aesthetics)

by Markku Eskelinen

Equally interested in what is and what could be, Cybertext Poetics combines ludology and cybertext theory to solve persistent problems and introduce paradigm changes in the fields of literary theory, narratology, game studies, and digital media. The book first integrates theories of print and digital literature within a more comprehensive theory capable of coming to terms with the ever-widening media varieties of literary expression, and then expands narratology far beyond its current confines resulting in multiple new possibilities for both interactive and non-interactive narratives. By focusing on a cultural mode of expression that is formally, cognitively, affectively, socially, aesthetically, ethically and rhetorically different from narratives and stories, Cybertext Poetics constructs a ludological basis for comparative game studies, shows the importance of game studies to the understanding of digital media, and argues for a plurality of transmedial ecologies.

Cybertext Poetics: The Critical Landscape of New Media Literary Theory (International Texts in Critical Media Aesthetics #2)

by Markku Eskelinen

Equally interested in what is and what could be, Cybertext Poetics combines ludology and cybertext theory to solve persistent problems and introduce paradigm changes in the fields of literary theory, narratology, game studies, and digital media. The book first integrates theories of print and digital literature within a more comprehensive theory capable of coming to terms with the ever-widening media varieties of literary expression, and then expands narratology far beyond its current confines resulting in multiple new possibilities for both interactive and non-interactive narratives. By focusing on a cultural mode of expression that is formally, cognitively, affectively, socially, aesthetically, ethically and rhetorically different from narratives and stories, Cybertext Poetics constructs a ludological basis for comparative game studies, shows the importance of game studies to the understanding of digital media, and argues for a plurality of transmedial ecologies.

Cyberthreats and the Decline of the Nation-State (Routledge Research in Information Technology and E-Commerce Law)

by Susan W. Brenner

This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.

Cyberthreats and the Decline of the Nation-State (Routledge Research in Information Technology and E-Commerce Law)

by Susan W. Brenner

This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.

Cybertypes: Race, Ethnicity, and Identity on the Internet

by Lisa Nakamura

First published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.

Cybertypes: Race, Ethnicity, and Identity on the Internet

by Lisa Nakamura

First published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.

CyberUnion: Empowering Labor Through Computer Technology

by Arthur B Shostack

Key players in organized labour in the USA and abroad are busy modernizing their communications and making creative and effective use of computers and other technology. The author of this book argues that the road to CyberUnion has begun and that those unions are ensuring a future strength.

CyberUnion: Empowering Labor Through Computer Technology

by Arthur B Shostack

Key players in organized labour in the USA and abroad are busy modernizing their communications and making creative and effective use of computers and other technology. The author of this book argues that the road to CyberUnion has begun and that those unions are ensuring a future strength.

Cyberwarfare: Threats to Critical Infrastructure (Palgrave Studies in Cybercrime and Cybersecurity)

by Kristan Stoddart

This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ‘cyberwar’. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members).

Cyborg Babies: From Techno-Sex to Techno-Tots

by Robbie Davis-Floyd Joseph Dumit

First Published in 1998. Routledge is an imprint of Taylor & Francis, an informa company.

Refine Search

Showing 28,101 through 28,125 of 100,000 results