Conflicts, Crimes and Regulations in Cyberspace

Здесь есть возможность читать онлайн «Conflicts, Crimes and Regulations in Cyberspace» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Conflicts, Crimes and Regulations in Cyberspace: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Conflicts, Crimes and Regulations in Cyberspace»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. <i>Conflicts, Crimes and Regulations in Cyberspace</i> contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies.<br /><br />This book presents cyberspace as a socio-technical system on an international level. It focuses on state and non-state actors, as well as the study of strategic concepts and norms. Unlike global studies, the socio-technical approach and “meso” scale facilitate the analysis of cyberspace in international relations. This is an area of both collaboration and conflict for which specific modes of regulation have appeared.

Conflicts, Crimes and Regulations in Cyberspace — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Conflicts, Crimes and Regulations in Cyberspace», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Table of Contents

1 Cover

2 Title Page Cybersecurity Set coordinated by Daniel Ventre Volume 2

3 Copyright First published 2021 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address: ISTE Ltd 27-37 St George’s Road London SW19 4EU UK www.iste.co.uk John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030 USA www.wiley.com © ISTE Ltd 2021 The rights of Sébastien-Yves Laurent to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Library of Congress Control Number: 2021945731 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 978-1-78630-686-9

4 Introduction References

5 1 The United States, States and the False Claims of the End of the Global Internet1.1. Introduction 1.2. The creation of the internet and the development of cyberspace by the United States 1.3. Cyberspace transformed by the arrival in force of states 1.4. Praxis of state coercion in cyberspace 1.5. The fragmentation of the global internet and the digital sovereignty of states 1.6. The strong constraint of interstate cooperation for all states 1.7. Conclusion 1.8. References

6 2 Cybersecurity in America: The US National Security Apparatus and Cyber Conflict Management2.1. Introduction 2.2. Societal and institutional dynamics 2.3. Organizational and bureaucratic dynamics 2.4. Individual dynamics 2.5. Conclusion 2.6. References

7 3 Separation of Offensive and Defensive Functions: The Originality of the French Cyberdefense Model Called into Question?3.1. Introduction 3.2. A model designed and developed in response to the threats and challenges of the early 2010s 3.3. A strict separation of offensive and defensive functions and missions: an obstacle to better defense? 3.4. Conclusion 3.5. References

8 4 The Boundary Between Cybercrime and Cyberwar: An Uncertain No-Man’s Land4.1. Introduction 4.2. The field of cybercrime up to the limits of the glass ceiling 4.3. War in cyberspace, cyber in war 4.4. Conclusion 4.5. References

9 5 Cyberdefense, the Digital Dimension of National Security5.1. Introduction 5.2. Cyberdefense in the political and legal framework of digital security 5.3. The emergence of a coherent legal regime for cyberdefense 5.4. Conclusion 5.5. References

10 6 Omnipresence Without Omnipotence: The US Campaign Against Huawei in the 5G Era6.1. Introduction 6.2. The unilateral American offensive against Huawei: a disruptive campaign causing significant collateral damage 6.3. The American diplomatic offensive: the limits of American rhetorical coercion of their partners and allies 6.4. The anti-Huawei offensive: a barometer of American power? 6.5. References

11 7 The Issue of Personal and Sovereign Data in the Light of an Emerging “International Law of Intelligence” 7.1. Introduction 7.2. The legal rules invoked in the collection of personal and sovereign data 7.3. Data localization in the light of international intelligence law 7.4. Conclusion 7.5. Appendix: the quadrants of intelligence law 7.6. Sources and references

12 8 International Cybersecurity Cooperation 8.1. Current attack trends 8.2. The multiple paths of international cooperation 8.3. The issue of attack attribution

13 9 Cyberdefense and Cybersecurity Regulations in the United States: From the Failure of the “Comprehensive Policy” to the Success of the Sectoral Approach9.1. Introduction 9.2. The identification of a new threat and the impact of cyber on how US security and defense policies are designed 9.3. From the impact of cyber on policy to the impact of politics on cyber 9.4. From a comprehensive cyber policy to a sectoral approach: the success of an undeclared regulatory policy 9.5. Conclusion 9.6. References

14 List of Authors

15 Index

16 End User License Agreement

List of Illustrations

1 Chapter 1 Figure 1.1. Number of engineers of different nationalities between 1986 and 2020... Figure 1.2. Number of authors publishing with different engineering companies be... Figure 1.3. Principal components of cyberspace Figure 1.4. The annual distribution of digital texts (1974–2019) Figure 1.5. The various forms of state coercion in cyberspace. For a color versi... Figure 1.6. Internet penetration rates (2020)...

2 Chapter 3Figure 3.1. The six missions of French cyberdefense...Figure 3.2. Cyberdefense organization in France in 2018...

3 Chapter 7 Figure 7.1. The quadrants of intelligence law

List of Tables

1 Chapter 1 Table 1.1. Themes of digital texts (1974–2019)... Table 1.2. United Nations General Assembly resolutions on cybersecurity Table 1.3. List of GGE reports Table 1.4. Geographic origin of internet users (2020)...

2 Chapter 2 Table 2.1. The various drivers of dysfunction within the US national cybersecuri...

Guide

1 Cover

2 Table of Contents

3 Title Page Cybersecurity Set coordinated by Daniel Ventre Volume 2

4 Copyright First published 2021 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address: ISTE Ltd 27-37 St George’s Road London SW19 4EU UK www.iste.co.uk John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030 USA www.wiley.com © ISTE Ltd 2021 The rights of Sébastien-Yves Laurent to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Library of Congress Control Number: 2021945731 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 978-1-78630-686-9

5 Introduction

6 Begin Reading

7 List of Authors

8 Index

9 End User License Agreement

Pages

1 v

2 iii

3 iv

4 xi

5 xii

6 xiii

7 xiv

8 1

9 2

10 3

11 4

12 5

13 6

14 7

15 8

16 9

17 10

18 11

19 12

20 13

21 14

22 15

23 16

24 17

25 18

26 19

27 20

28 21

29 22

30 23

31 24

32 25

33 26

34 27

35 28

36 29

37 30

38 31

39 32

40 33

41 34

42 35

43 36

44 37

45 38

46 39

47 40

48 41

49 42

50 43

51 44

52 45

53 46

54 47

55 48

56 49

57 50

58 51

59 52

60 53

61 54

62 55

63 56

64 57

65 58

66 59

67 60

68 61

69 62

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Conflicts, Crimes and Regulations in Cyberspace»

Представляем Вашему вниманию похожие книги на «Conflicts, Crimes and Regulations in Cyberspace» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Conflicts, Crimes and Regulations in Cyberspace»

Обсуждение, отзывы о книге «Conflicts, Crimes and Regulations in Cyberspace» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x