The following links lead to the full text from the respective local libraries:
Alternatively, you can try to access the desired document yourself via your local library catalog.
If you have access problems, please contact us.
17592 results
Sort by:
World Affairs Online
In: Issues in twenty-first century warfare
This title is part of UC Press's Voices Revived program, which commemorates University of California Press's mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1959
"Cyberterrorism in the 21st century is now one of the greatest threats to global security and information. It transcends national borders (and by extension national legal systems), making it difficult for individual countries to formulate a cohesive defence plan against it. The world has yet to see any serious acts of cyberterrorism targeting multiple countries at once, but there's a need for countries to develop legal precedents to deal with this should it happen. This book investigates cyberterrorism in terms of the conventions and legislation developed in response to the growing need to protect the digital infrastructure and information of citizens, companies and governments. It looks at the challenges faced by international organisations in first defining then responding to and curbing cyberterrorism. Following this is analysis of legal provisions, with case studies of enforcement and of jurisdiction of these provisions. Unique in the way that all aspects of cyberterrorism are considered, from initial infringement to eventual prosecution, this book provides recommendations and guidance to law-based post-graduates and professionals working on digital crime, and to those interested in national and international legal legislation against it."--Publisher's website.
In: Routledge studies in conflict, security and technology
"This book examines the shape, sources and dangers of information warfare (IW) as it pertains to military, diplomatic and civilian stakeholders. Cyber warfare and information warfare are different beasts. Both concern information, but where the former does so exclusively in its digitized and operationalized form, the latter does so in a much broader sense: with IW, information itself is the weapon. The present work aims to help scholars, analysts, and policymakers understand information warfare within the context of cyber conflict. Specifically, the chapters in the volume address the shape of influence campaigns waged across digital infrastructure and in the psychology of democratic populations in recent years by belligerent state actors, from the Russian Federation to the Islamic Republic of Iran. In marshalling evidence on the shape and evolution of information warfare as a broad-scoped phenomenon aimed at societies writ large, the authors in this book present timely empirical investigations into the global landscape of influence operations, legal and strategic analyses of their role in international politics, and insightful examinations of the potential for democratic process to overcome pervasive foreign manipulation. This book will be of much interest to students of cyber-security, national security, strategic studies, defence studies and International Relations in general."--
World Affairs Online
In: Strategic Forum, No. 105
World Affairs Online
In: Publication 480,5 (EF)
In: International law Dossiers
In: Pittsburgh series in composition, literacy, and culture
In: Composition, Literacy, and Culture Ser.
Intro -- Contents -- Preface -- Introduction: From the Dark Side of Digital Composing to #Rhetops / Jim Ridolfo and William Hart-Davidson -- Part I: Rhetorical Operations and Emerging Tactics -- 1. The Rhetoric of Infrastructure: American Colonialism and the Military Telegraph / Elizabeth Losh -- 2. Revisiting "A Soldier's Guide To Rhetorical Theory": Intelligence Analysis In The Open / Gary Mills -- 3. Rhetoric and the US Intelligence Community's Misuses of Theory / Nate Kreuter -- 4. Insurgent Rhetorics and Historical Materialism / Mike Edwards -- 5. Minerva Rising: The Pentagon's Weaponization of Rhetorical Knowledge / John Gagnon -- 6. Insurgent Circulation, Weaponized Media: Waging the Late Sixties War Within / Brad E. Lucas -- 7. Gamergate: Understanding the Tactics of Online Knowledge Disruptors / Michael Trice -- Part II: Digital Practices -- 8. ISIS Versus the United States: Rhetorical Battle in the Middle East / William M. Marcellino and Madeline Magnuson -- 9. Stormwatch: Machine Learning Approaches to Understanding White Supremacy Online / Ryan Omizo -- 10. Dark Interactions: Interfaces and Object Arrays as Surveillance in Digital Rhetoric / John Gallagher -- 11. Digital Surveillance of Gang Communication: Graffiti's Rhetorical Velocity Between Street Gangs and Urban Law Enforcement / Seth Long and Ken Fitch -- Part III: Practitioner Stories -- 12. Digital Age Education: Preparing Warriors for Hybrid Conflict at Air Force Cyberworx / Jeffrey Collins and Gary Mills -- 13. Mapping the Rhetoric-Operations Divide: Considerations for the Future / Angie Mallory -- 14. Social Media Strategy for the Military-Engaged American Red Cross / Laura A. Ewing -- 15. Changing Technologies and Writing From and About War / D. Alexis Hart and Cheryl Hatch.
In: Ius informationis 1
In: Routledge research in international law
1. Use of force : displaced twentieth-century rules, norms and standards? -- 2. Revolution in military affairs : hi-tech weaponry, low-tech legal safeguards -- 3. The fourth domain : ascendance of outer space as a war theatre -- 4. War in the fifth domain : cyberwarfare -- 5. Discarding law by analogy : old legal frameworks for new threats.
In: Advances in Information Security