Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
Intro -- Title Page -- Copyright Page -- Dedication -- Contents -- List of Figures -- List of Tables -- Acknowledgments -- 1. Entering the Cyber Commons -- Problem -- Research Question -- Interdependence and Power -- Method Development -- Cyber Application and Case Studies -- Summary -- 2. Interdependence -- Why Use Interdependence Theory? -- Interdependent Characteristics of the Virtual State -- Defining Interdependent Cyberspace -- Cyber Operations -- Summary -- 3. Power -- Types of Power -- Power Application -- Power through Economic Cyber Influences -- Summary -- 4. Method Development -- Method Types -- Describing the Data Sources -- Categorizing Cyber Events -- Case Study Guideline -- Summary -- 5. Cyber Applications -- Application in Practice -- Deciphering the Data -- Evaluating the First Four Hypotheses -- Summary -- 6. Case Study Analysis -- Deciphering Events through Narrative Linkages -- Japanese Government Case: Economic Espionage -- Ukrainian Power Grid Case: Economic Cyberattack -- Codan Case: Intellectual Property Theft -- Evaluating the Economic Hypotheses -- Summary -- 7. Framing Future Channels -- Linking Hypotheses to the Research Question -- Future Applications -- Final Thoughts -- Appendix -- Notes -- Bibliography -- Index -- About Mark T. Peters II
Problem melden