You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book analyzes cyberdefense from a novel and interdisciplinary perspective, offering solutions for problems that have long impeded a more efficient defense. It explains why cyberdefense organized and performed by humans is too slow, too cumbersome, and too ineffective. Combining the analytical capabilities of experts in operations research and management, international security studies, economics, risk analysis, and defense management, the volume addresses these problems of current cyberdefense. The authors present suggestions for the next generation of cyberdefense, explaining why the future defense must focus on speeding up responses, why a single response may not be enough, and why effectiveness requires foresight. This makes the book a must-read for scholars, researchers, intelligence analysts, homeland security staff, and professionals who are interested in learning more about the issues of current cyberdefense, as well as solutions for the next generation of cyberdefense.
This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38 most relevant encryption and data protection technologies, analyze their expected evolution until 2025, and derive implications for the military, civil society, and economy sectors. Fifty experts from academia, government, and industry have contributed to this study and provided their viewpoints on the different technologies and trends. This comprehensive collection of factsheets provides a refer...
New Space technologies, Earth observation and satellite navigation in particular, have proven to be invaluable drivers of sustainable development, thus contributing to the protection of several human rights (the “Good”). At the same time, however, New Space technologies raise concerns for the right to privacy (the “Bad”), and face a number of challenges posed by hostile cyber operations (the “Ugly”). Dr. Arianna Vettorel analyzes the relevant international, European and domestic legal frameworks and highlights the need for several innovative approaches and reforms, in a transnational and bottom-up perspective, in order to maximize the Good, and minimize the Bad and the Ugly, of New Space technologies.
Examines the governance challenges of cybersecurity through twelve, real-world case studies Through twelve detailed case studies, this superb collection provides an overview of the ways in which government officials and corporate leaders across the globe are responding to the challenges of cybersecurity. Drawing perspectives from industry, government, and academia, the book incisively analyzes the actual issues, and provides a guide to the continually evolving cybersecurity ecosystem. It charts the role that corporations, policymakers, and technologists are playing in defining the contours of our digital world. Rewired: Cybersecurity Governance places great emphasis on the interconnection of...
"Digital transformation" sounds harmless, given that the explosion in data volumes, processing power and Artificial Intelligence has driven humanity and the entire world to a point of no return. We will surely see a new civilization, but we are at a crossroads. The future needs to be re-invented, decisions must be taken. After the automation of factories and the creation of self-driving cars, the automation of society is on its way. But there are two kinds of automation: a centralized top-down control of the world and a distributed control approach, supporting local self-organization. Using the power of today’s information systems, governments and big tech companies seem to engage in the f...
In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy,...
This book discusses the risks of information concealment in the context of major natural or industrial disasters – offering detailed descriptions and analyses of some 25 historical cases (Three Mile Island nuclear accident, Bhopal disaster, Challenger Space Shuttle explosion, Chernobyl nuclear disaster, Deepwater Horizon oil spill, Fukushima-Daiichi nuclear disaster, Enron’s bankruptcy, Subprime mortgage crisis, Worldwide Spanish flu and SARS outbreaks, etc.) and applying these insights to selected on-going cases where such information concealment is suspected. Some successful examples of preventive anti-concealment practice are also presented. In the book, the term ‘concealment’ is ...
This new collection of essays follows in the footsteps of the successful volume Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society, published at a time when our societies were on a path to technological totalitarianism, as exemplified by mass surveillance reported by Edward Snowden and others. Meanwhile the threats have diversified and tech companies have gathered enough data to create detailed profiles about almost everyone living in the modern world - profiles that can predict our behavior better than our friends, families, or even partners. This is not only used to manipulate peoples’ opinions and voting behaviors, but more generally to influence c...
This book constitutes the refereed proceedings of the 10th International Conference on Passive and Active Measurement, PAM 2009, held in Seoul, Korea, in April 2009. The 22 revised full papers and 2 revised demo papers presented were carefully reviewed and selected from 77 submissions. The papers focus on research and practical applications of routing and forwarding, topology and delay, methods for large-scale measurements, wireless, management tools, audio and video traffic, peer-to-peer, traffic measurements, and measurements of anomalous and unwanted traffic.
This book explores the major differences between the kinds of risk encountered in different sectors of industry - production (including agriculture) and services - and identifies the main features of accidents within different industries. Because of these differences, unique risk-mitigation measures will need to be implemented in one industry that cannot be implemented in another, leading to large managerial differences between these broad economic sectors. Based on the analysis of more than 500 disasters, accidents and incidents - around 230 cases from the production sector and around 280 cases from the service sector - the authors compare the risk response actions appropriate within differ...