The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
|
Author(s)/Editor(s): Pauline C. Reich (Waseda University, Japan)and Eduardo Gelbstein (Webster University, Switzerland)
Copyright: ©2012
DOI: 10.4018/978-1-61520-831-9
ISBN13: 9781615208319
ISBN10: 1615208313
EISBN13: 9781615208326
Purchase
|
DescriptionIn the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
Table of Contents
-
#1. The Security Practitioners’ Perspective
-
#2. Economic, Political and Social Threats in the Information Age
-
#3. Critical Information Infrastructure and Cyber-Terrorism
-
#4. Attackers: Internal and External
-
#5. Threats, Vulnerability, Uncertainty and Information Risk
-
#6. ICT and Security Governance: Doing the Right Things the Right Way (and Well Enough)
-
#7. Concerns About What Will Happen Next: Should These Things Keep You Awake at Night?
-
#8. To Define or Not to Define: Law and Policy Conundrums for the Cybercrime, National Security, International Law and Military Law Communities
-
#9. Anonymity, Actual Incidents, Cyber Attacks and Digital Immobilization
-
#10. Culture Clashes: Freedom, Privacy, and Government Surveillance Issues Arising in Relation to National Security and Internet Use
-
#11. What is Cyberterrorism and How Real is the Threat?: A Review of the Academic Literature, 1996 – 2009
-
#12. Cyber-Search and Cyber-Seizure: Policy Considerations of Cyber Operations and Fourth Amendment Implications
-
#13. Terrorism and the Internet: Do We Need an International Solution?
-
#14. Case Study: India - Terrorism and Terrorist Use of the Internet/Technology
-
#15. China’s Cyber Tool: Striving to Attain Electronic Shi?
-
#16. The United Kingdom’s Centre for the Protection of National Infrastructure: An Evaluation of the UK Government’s Response Mechanism to Cyber Attacks on Critical Infrastructures
Reviews and Testimonials
Reich (Waseda U., Japan) and Gelbstein (Webster U., Switzerland) compile 16 chapters by law, security, and information professionals from Europe, the US, and Asia, who examine issues in cyber and information security; initiatives in law, policy, and information security to address them; and how to address gaps in these areas. They consider the nature of the problem, the parties that have an interest in disrupting technology infrastructures and computer systems, how attacks take place and how organizations can prepare for them, and when, where, and why they occur. They discuss the main challenges facing security practitioners; the economic, political, and social consequences of information security disruption; the relationship between critical information infrastructure and cyberterrorism; managing risks associated with information assets; standards and best practices; key vulnerabilities; the application of law and policy to actual incidents; the academic literature on cyberterrorism; the nature of cyber threats to government and private computer systems; whether an international solution to cyberterrorism is needed; and case studies from India, China, and the UK.
– Annotation ©2013 Book News Inc. Portland, OR
Recommended - This 2012 book is an excellent source of information and references covering the broad and complex field of cyber security. The two authors/editors address the two major perspectives - information and communications technology and legal. This balance between the two major components of any serious study of cyber security is most welcome. [...] Anyone interested in developing or influencing policy on cyber security should consider this book a must read. What they have to tell us about cyber security is worth reading.
– Ken Krechmer. University of Colorado, USA
It is not a surprise that the “softer” issues around Internet-based cyber-crime, cyber-terrorism, and information warfare are both unclear and constantly evolving. […] Throughout the volume, the dominating concerns are surveillance and intelligence collection, with associated limits and related litigation or legislation. This volume goes beyond raising awareness.
– L.F. Pau, Computing Reviews
These essays address contemporary problems posed by widespread internet use and the role, if any, it has in increasing the likelihood, frequency, or lethality of cyber attacks, especially of cyber terror acts. In this area, definitions are unsettled, laws are often inadequately formulated, and the nature of the threats and identity of the culprits is often doubtful. [...] Law, Policy and Technology realistically and rather comprehensively presents main challenges associated with internet use and suggests ways for exploring how to address them without succumbing to the dramatic excesses of all-too-common ungrounded fear or to the tempting quietism of baseless denial.
– A. Pablo Iannone, Central Connecticut State University
Author's/Editor's Biography
Pauline C. Reich (Ed.)
Professor Pauline Reich, American lawyer and professor, writer, arbitrator/mediator, consultant. Director, Asia-Pacific Cyberlaw, Cybercrime and Internet Security Institute, Tokyo, Japan, conducting research, producing publications, providing technical assistance and training for lawyers, judges, prosecutors, police, legislators, businesses, governments in the Asia-Pacific region and worldwide.
Speaker at conferences in the United States, Europe and Asia, e.g. APEC Symposium on Information Privacy in E-Government and E-commerce, CSI 2008, RAISE (Regional Asia Information Security Exchange), Business Software Alliance, Cybersecurity Malaysia, Asian Institute of Technology, ITU regional Asia workshop on framework for Cybersecurity and CIIP, BILETA 2010.
Eduardo Gelbstein (Ed.)
Dr. Eduardo Gelbstein, Adjunct Professor, Webster University Geneva, former advisor to the United Nations Board of (external) Auditors, former Director, United Nations International Computing Centre and I.T. Strategy Manager, British Railways Network South East. Author of numerous articles and publications on Information Security and auditing and frequent speaker at international conferences on security and governance in Europe, the Middle East and Africa.
|
|