Cyberspace: malevolent actors, criminal opportunities, and strategic competition

"This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, h...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Williams, Phillip G. (HerausgeberIn), Fiddner, Dighton (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Carlisle, PA Strategic Studies Institute and U.S. Army War College Press [2016]
Schlagworte:
Online-Zugang:URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV043977479
003 DE-604
005 20170102
007 cr|uuu---uuuuu
008 161223s2016 xx ab|| o|||| 00||| eng d
020 |a 9781584877264  |9 978-1-58487-726-4 
020 |z 158487726X  |c Online  |9 158487726X 
020 |z 9781584877264  |9 9781584877264 
035 |a (OCoLC)968689913 
035 |a (DE-599)BVBBV043977479 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-706 
245 1 0 |a Cyberspace: malevolent actors, criminal opportunities, and strategic competition  |c Phil Williams, Dighton Fiddner, eds. 
264 1 |a Carlisle, PA  |b Strategic Studies Institute and U.S. Army War College Press  |c [2016] 
300 |a 1 Online-Ressource  |b color illustrations, color maps 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a "August 2016." 
505 8 |a Includes bibliographical references 
505 8 |a Introduction / Phil Williams and Dighton Fiddner -- Part I. Concepts and trends in cyberspace. Defining a framework for decision-making in cyberspace / Dighton Fiddner -- Emerging trends in cyberspace : dimensions and dilemmas / Nazli Choucri -- Technologies that will change your world / Rick Hutley -- Big data challenges, failed cities, and the rise of the new net / Jeff Boleng and Colin P. Clarke -- Part II. Challenges and threats in cyberspace. Cyberterrorism in a post-Stuxnet world / Michael Kenney -- China's reconnaissance and system sabotage activities : supporting information deterrence / Timothy L. Thomas -- Information warfare a la Russe / Stephen J. Blank -- The adaptive nature of crime : co-opting the internet / Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten -- Digitally armed and dangerous : humanitarian intervention in the wired world / Ronald J. Deibert and John Scott-Railton -- The threat from inside ... your automobile / Isaac R. Porche III -- Part III. Responding to threats in cyberspace. Reflections on cyberdeterrence / Martin Libicki -- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates / Davis B. Bobrow -- Identifying the real and absolute enemy / Rob van Kranenburg -- Could the United States benefit from cyber-arms-control agreements? / Benoît Morel -- Transnational organized crime and digilantes in the cybercommons / Kelsey Ida -- From cybercrime to cyberwar : indicators and warnings / Timothy J. Shimeall -- Crisis management in cyberspace and in a "cybered" world / Phil Williams -- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology / Chris C. Demchak -- Conclusion / Dighton Fiddner 
520 |a "This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities -- for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand"--Publisher's web site 
650 4 |a Cyberspace 
650 4 |a Cyberspace / Government policy 
650 4 |a Cyberterrorism 
650 4 |a Computer crimes 
650 4 |a Information warfare 
650 7 |a Computer crimes  |2 fast 
650 7 |a Cyberspace  |2 fast 
650 7 |a Cyberspace / Government policy  |2 fast 
650 7 |a Cyberterrorism  |2 fast 
650 7 |a Information warfare  |2 fast 
650 4 |a Politik 
650 0 7 |a Cyberspace  |0 (DE-588)4266146-8  |2 gnd  |9 rswk-swf 
689 0 0 |a Cyberspace  |0 (DE-588)4266146-8  |D s 
689 0 |5 DE-604 
700 1 |a Williams, Phillip G.  |4 edt 
700 1 |a Fiddner, Dighton  |4 edt 
856 4 0 |u http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1319  |z URL des Erstveröffentlichers  |3 Volltext 
943 1 |a oai:aleph.bib-bvb.de:BVB01-029385937 

Datensatz im Suchindex

_version_ 1819298862702002176
any_adam_object
author2 Williams, Phillip G.
Fiddner, Dighton
author2_role edt
edt
author2_variant p g w pg pgw
d f df
author_facet Williams, Phillip G.
Fiddner, Dighton
building Verbundindex
bvnumber BV043977479
contents Includes bibliographical references
Introduction / Phil Williams and Dighton Fiddner -- Part I. Concepts and trends in cyberspace. Defining a framework for decision-making in cyberspace / Dighton Fiddner -- Emerging trends in cyberspace : dimensions and dilemmas / Nazli Choucri -- Technologies that will change your world / Rick Hutley -- Big data challenges, failed cities, and the rise of the new net / Jeff Boleng and Colin P. Clarke -- Part II. Challenges and threats in cyberspace. Cyberterrorism in a post-Stuxnet world / Michael Kenney -- China's reconnaissance and system sabotage activities : supporting information deterrence / Timothy L. Thomas -- Information warfare a la Russe / Stephen J. Blank -- The adaptive nature of crime : co-opting the internet / Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten -- Digitally armed and dangerous : humanitarian intervention in the wired world / Ronald J. Deibert and John Scott-Railton -- The threat from inside ... your automobile / Isaac R. Porche III -- Part III. Responding to threats in cyberspace. Reflections on cyberdeterrence / Martin Libicki -- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates / Davis B. Bobrow -- Identifying the real and absolute enemy / Rob van Kranenburg -- Could the United States benefit from cyber-arms-control agreements? / Benoît Morel -- Transnational organized crime and digilantes in the cybercommons / Kelsey Ida -- From cybercrime to cyberwar : indicators and warnings / Timothy J. Shimeall -- Crisis management in cyberspace and in a "cybered" world / Phil Williams -- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology / Chris C. Demchak -- Conclusion / Dighton Fiddner
ctrlnum (OCoLC)968689913
(DE-599)BVBBV043977479
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04460nam a2200517 c 4500</leader><controlfield tag="001">BV043977479</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170102 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161223s2016 xx ab|| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781584877264</subfield><subfield code="9">978-1-58487-726-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">158487726X</subfield><subfield code="c">Online</subfield><subfield code="9">158487726X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781584877264</subfield><subfield code="9">9781584877264</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)968689913</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043977479</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberspace: malevolent actors, criminal opportunities, and strategic competition</subfield><subfield code="c">Phil Williams, Dighton Fiddner, eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Carlisle, PA</subfield><subfield code="b">Strategic Studies Institute and U.S. Army War College Press</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">color illustrations, color maps</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"August 2016."</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Introduction / Phil Williams and Dighton Fiddner -- Part I. Concepts and trends in cyberspace. Defining a framework for decision-making in cyberspace / Dighton Fiddner -- Emerging trends in cyberspace : dimensions and dilemmas / Nazli Choucri -- Technologies that will change your world / Rick Hutley -- Big data challenges, failed cities, and the rise of the new net / Jeff Boleng and Colin P. Clarke -- Part II. Challenges and threats in cyberspace. Cyberterrorism in a post-Stuxnet world / Michael Kenney -- China's reconnaissance and system sabotage activities : supporting information deterrence / Timothy L. Thomas -- Information warfare a la Russe / Stephen J. Blank -- The adaptive nature of crime : co-opting the internet / Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten -- Digitally armed and dangerous : humanitarian intervention in the wired world / Ronald J. Deibert and John Scott-Railton -- The threat from inside ... your automobile / Isaac R. Porche III -- Part III. Responding to threats in cyberspace. Reflections on cyberdeterrence / Martin Libicki -- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates / Davis B. Bobrow -- Identifying the real and absolute enemy / Rob van Kranenburg -- Could the United States benefit from cyber-arms-control agreements? / Benoît Morel -- Transnational organized crime and digilantes in the cybercommons / Kelsey Ida -- From cybercrime to cyberwar : indicators and warnings / Timothy J. Shimeall -- Crisis management in cyberspace and in a "cybered" world / Phil Williams -- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology / Chris C. Demchak -- Conclusion / Dighton Fiddner</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities -- for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand"--Publisher's web site</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Government policy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace / Government policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Phillip G.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fiddner, Dighton</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1319</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029385937</subfield></datafield></record></collection>
id DE-604.BV043977479
illustrated Illustrated
indexdate 2024-12-24T05:36:39Z
institution BVB
isbn 9781584877264
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029385937
oclc_num 968689913
open_access_boolean
owner DE-706
owner_facet DE-706
physical 1 Online-Ressource color illustrations, color maps
publishDate 2016
publishDateSearch 2016
publishDateSort 2016
publisher Strategic Studies Institute and U.S. Army War College Press
record_format marc
spelling Cyberspace: malevolent actors, criminal opportunities, and strategic competition Phil Williams, Dighton Fiddner, eds.
Carlisle, PA Strategic Studies Institute and U.S. Army War College Press [2016]
1 Online-Ressource color illustrations, color maps
txt rdacontent
c rdamedia
cr rdacarrier
"August 2016."
Includes bibliographical references
Introduction / Phil Williams and Dighton Fiddner -- Part I. Concepts and trends in cyberspace. Defining a framework for decision-making in cyberspace / Dighton Fiddner -- Emerging trends in cyberspace : dimensions and dilemmas / Nazli Choucri -- Technologies that will change your world / Rick Hutley -- Big data challenges, failed cities, and the rise of the new net / Jeff Boleng and Colin P. Clarke -- Part II. Challenges and threats in cyberspace. Cyberterrorism in a post-Stuxnet world / Michael Kenney -- China's reconnaissance and system sabotage activities : supporting information deterrence / Timothy L. Thomas -- Information warfare a la Russe / Stephen J. Blank -- The adaptive nature of crime : co-opting the internet / Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten -- Digitally armed and dangerous : humanitarian intervention in the wired world / Ronald J. Deibert and John Scott-Railton -- The threat from inside ... your automobile / Isaac R. Porche III -- Part III. Responding to threats in cyberspace. Reflections on cyberdeterrence / Martin Libicki -- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates / Davis B. Bobrow -- Identifying the real and absolute enemy / Rob van Kranenburg -- Could the United States benefit from cyber-arms-control agreements? / Benoît Morel -- Transnational organized crime and digilantes in the cybercommons / Kelsey Ida -- From cybercrime to cyberwar : indicators and warnings / Timothy J. Shimeall -- Crisis management in cyberspace and in a "cybered" world / Phil Williams -- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology / Chris C. Demchak -- Conclusion / Dighton Fiddner
"This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities -- for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand"--Publisher's web site
Cyberspace
Cyberspace / Government policy
Cyberterrorism
Computer crimes
Information warfare
Computer crimes fast
Cyberspace fast
Cyberspace / Government policy fast
Cyberterrorism fast
Information warfare fast
Politik
Cyberspace (DE-588)4266146-8 gnd rswk-swf
Cyberspace (DE-588)4266146-8 s
DE-604
Williams, Phillip G. edt
Fiddner, Dighton edt
http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1319 URL des Erstveröffentlichers Volltext
spellingShingle Cyberspace: malevolent actors, criminal opportunities, and strategic competition
Includes bibliographical references
Introduction / Phil Williams and Dighton Fiddner -- Part I. Concepts and trends in cyberspace. Defining a framework for decision-making in cyberspace / Dighton Fiddner -- Emerging trends in cyberspace : dimensions and dilemmas / Nazli Choucri -- Technologies that will change your world / Rick Hutley -- Big data challenges, failed cities, and the rise of the new net / Jeff Boleng and Colin P. Clarke -- Part II. Challenges and threats in cyberspace. Cyberterrorism in a post-Stuxnet world / Michael Kenney -- China's reconnaissance and system sabotage activities : supporting information deterrence / Timothy L. Thomas -- Information warfare a la Russe / Stephen J. Blank -- The adaptive nature of crime : co-opting the internet / Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten -- Digitally armed and dangerous : humanitarian intervention in the wired world / Ronald J. Deibert and John Scott-Railton -- The threat from inside ... your automobile / Isaac R. Porche III -- Part III. Responding to threats in cyberspace. Reflections on cyberdeterrence / Martin Libicki -- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates / Davis B. Bobrow -- Identifying the real and absolute enemy / Rob van Kranenburg -- Could the United States benefit from cyber-arms-control agreements? / Benoît Morel -- Transnational organized crime and digilantes in the cybercommons / Kelsey Ida -- From cybercrime to cyberwar : indicators and warnings / Timothy J. Shimeall -- Crisis management in cyberspace and in a "cybered" world / Phil Williams -- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology / Chris C. Demchak -- Conclusion / Dighton Fiddner
Cyberspace
Cyberspace / Government policy
Cyberterrorism
Computer crimes
Information warfare
Computer crimes fast
Cyberspace fast
Cyberspace / Government policy fast
Cyberterrorism fast
Information warfare fast
Politik
Cyberspace (DE-588)4266146-8 gnd
subject_GND (DE-588)4266146-8
title Cyberspace: malevolent actors, criminal opportunities, and strategic competition
title_auth Cyberspace: malevolent actors, criminal opportunities, and strategic competition
title_exact_search Cyberspace: malevolent actors, criminal opportunities, and strategic competition
title_full Cyberspace: malevolent actors, criminal opportunities, and strategic competition Phil Williams, Dighton Fiddner, eds.
title_fullStr Cyberspace: malevolent actors, criminal opportunities, and strategic competition Phil Williams, Dighton Fiddner, eds.
title_full_unstemmed Cyberspace: malevolent actors, criminal opportunities, and strategic competition Phil Williams, Dighton Fiddner, eds.
title_short Cyberspace: malevolent actors, criminal opportunities, and strategic competition
title_sort cyberspace malevolent actors criminal opportunities and strategic competition
topic Cyberspace
Cyberspace / Government policy
Cyberterrorism
Computer crimes
Information warfare
Computer crimes fast
Cyberspace fast
Cyberspace / Government policy fast
Cyberterrorism fast
Information warfare fast
Politik
Cyberspace (DE-588)4266146-8 gnd
topic_facet Cyberspace
Cyberspace / Government policy
Cyberterrorism
Computer crimes
Information warfare
Politik
url http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1319
work_keys_str_mv AT williamsphillipg cyberspacemalevolentactorscriminalopportunitiesandstrategiccompetition
AT fiddnerdighton cyberspacemalevolentactorscriminalopportunitiesandstrategiccompetition