Cyber warfare: Issues and challenges

M Robinson, K Jones, H Janicke - Computers & security, 2015 - Elsevier
The topic of cyber warfare is a vast one, with numerous sub topics receiving attention from
the research community. We first examine the most basic question of what cyber warfare is …

The information revolution, security, and international relations:(IR) relevant theory?

J Eriksson, G Giacomello - International political science …, 2006 - journals.sagepub.com
The purpose of this article is twofold: to analyze the impact of the information revolution on
security and to clarify what existing international relations theory can say about this …

[图书][B] Cyberspace and the State: Towards a Strategy for Cyber-power

DJ Betz - 2017 - books.google.com
The major aim of Cyberspace and the State is to provide conceptual orientation on the new
strategic environment of the Information Age. It seeks to restore the equilibrium of policy …

[图书][B] Cyber strategy: The evolving character of power and coercion

B Valeriano, BM Jensen, RC Maness - 2018 - books.google.com
Some pundits claim cyber weaponry is the most important military innovation in decades, a
transformative new technology that promises a paralyzing first-strike advantage difficult for …

[图书][B] Borderities and the politics of contemporary mobile borders

ALA Szary, F Giraut - 2015 - Springer
This book explores the emerging forms and functions of contemporary mobile borders. It
deals with issues of security, technology, migration and cooperation while addressing the …

Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion

CM Angst, R Agarwal - MIS quarterly, 2009 - JSTOR
Within the emerging context of the digitization of health care, electronic health records
(EHRs) constitute a significant technological advance in the way medical information is …

Digital disaster, cyber security, and the Copenhagen School

L Hansen, H Nissenbaum - International studies quarterly, 2009 - academic.oup.com
This article is devoted to an analysis of cyber security, a concept that arrived on the post-
Cold War agenda in response to a mixture of technological innovations and changing …

Cybercrime and society

M Yar, KF Steinmetz - 2023 - torrossa.com
The previous chapters explored cybercriminal activities associated with computer intrusion
and manipulation, which are generally labelled as hacking. This chapter critically explores …

When territory deborders territoriality

S Sassen - Territory, politics, governance, 2013 - Taylor & Francis
The focus is on the misalignment between territory and the legal construct encasing the
sovereign authority of the state over its territory—territoriality. The aim is to make visible that …

The Novelty of 'Cybercrime' An Assessment in Light of Routine Activity Theory

M Yar - European Journal of Criminology, 2005 - journals.sagepub.com
Recent discussions of 'cybercrime'focus upon the apparent novelty or otherwise of the
phenomenon. Some authors claim that such crime is not qualitatively different from …