000 03729nam a22005535i 4500
001 978-1-4939-0962-9
003 DE-He213
005 20200421112052.0
007 cr nn 008mamaa
008 140624s2014 xxu| s |||| 0|eng d
020 _a9781493909629
_9978-1-4939-0962-9
024 7 _a10.1007/978-1-4939-0962-9
_2doi
050 4 _aQA75.5-76.95
072 7 _aUT
_2bicssc
072 7 _aCOM069000
_2bisacsh
072 7 _aCOM032000
_2bisacsh
082 0 4 _a005.7
_223
245 1 0 _aCyberterrorism
_h[electronic resource] :
_bUnderstanding, Assessment, and Response /
_cedited by Thomas M. Chen, Lee Jarvis, Stuart Macdonald.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2014.
300 _aXXIII, 215 p. 5 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aWhat is 'Cyberterrorism'? Computer and Internet Technology in Legal Definitions of Terrorism -- Understanding, Locating and Constructing 'Cyberterrorism' -- Rethinking the Threat of Cyberterrorism -- Putting the 'Cyber' into Cyberterrorism: Re-reading Technological Risk in a Hyperconnected World -- Dr. Strangeweb: Or How they Stopped Worrying and Learned to Love Cyber War -- Reality Check: Assessing the (Un)Likelihood of Cyberterrorism -- Cyber Threats to Critical Information Infrastructure -- The Citadel and its Sentinels: State Strategies for Contesting Cyberterrorism in the UK -- The Criminalisation of Terrorists' Online Preparatory Acts -- Adaptive Responses to Cyberterrorism.
520 _aThis is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aComputers.
650 0 _aApplication software.
650 0 _aCriminal law.
650 1 4 _aComputer Science.
650 2 4 _aInformation Systems and Communication Service.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCriminal Law.
650 2 4 _aComputer Appl. in Social and Behavioral Sciences.
650 2 4 _aSystems and Data Security.
700 1 _aChen, Thomas M.
_eeditor.
700 1 _aJarvis, Lee.
_eeditor.
700 1 _aMacdonald, Stuart.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781493909612
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4939-0962-9
912 _aZDB-2-SCS
942 _cEBK
999 _c57265
_d57265