Cybersecurity is a complex and contested issue in international politics. By focusing on 'great powers' - the US, the EU, Russia and China - studies in the field often fail to capture the specific politics of cybersecurity in the Middle East, especially in Egypt and the GCC states. Drawing on new interviews and original fieldwork, James Shires shows how the label of cybersecurity is repurposed by states, companies and other organisations to encompass a variety of concepts, including state conflict, targeted spyware, domestic information controls and foreign interference through leaks and disinformation.
This volume demonstrates that the Christian Right has a surprising past. Historical analysis reveals that the countercultural movements and evangelicalism share a common heritage. Shires warns that political operatives in both parties need to heed this fact if they hope to either, in the case of the Republican Party, retain their evangelical constituency, or, in the case of the Democratic Party, recruit new evangelical voters.
Intro -- Half Title -- Title -- Copyright -- Contents -- Acknowledgments -- List of Tables -- Note on Transliteration -- Introduction -- 1. Connecting Cybersecurity and Middle East Politics -- 2. The Middle East in Global Cybersecurity -- 3. Cyber Conflict -- 4. Targeted Surveillance -- 5. Information Controls -- 6. Foreign Interference -- Conclusion -- List of Acronyms and Abbreviations -- Notes -- Bibliography -- Index -- Back Cover.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity "skills gap": the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges. It proposes that cybersecurity expertise is best understood as a skilled performance which satisfies decision-makers' demands for risk management. This alternative understanding of cybersecurity expertise enables investigation of the types of performance involved in key events which congregate experts together: cybersecurity conferences. The article makes two key claims, which are empirically based on participant observation of cybersecurity conferences in the Middle East. First, that cybersecurity conferences are ritualized activities which create an expert community across international boundaries despite significant political and social differences. Second, that the ritualized physical separation between disinterested knowledge-sharing and commercial advertisement at these conferences enacts an ideal of "pure" cybersecurity expertise rarely encountered elsewhere, without which the claims to knowledge made by cybersecurity experts would be greatly undermined. The approach taken in this article is thus a new direction for cybersecurity research, with significant implications for other areas of international politics.
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity "skills gap": the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges. It proposes that cybersecurity expertise is best understood as a skilled performance which satisfies decision-makers' demands for risk management. This alternative understanding of cybersecurity expertise enables investigation of the types of performance involved in key events which congregate experts together: cybersecurity conferences. The article makes two key claims, which are empirically based on participant observation of cybersecurity conferences in the Middle East. First, that cybersecurity conferences are ritualized activities which create an expert community across international boundaries despite significant political and social differences. Second, that the ritualized physical separation between disinterested knowledge-sharing and commercial advertisement at these conferences enacts an ideal of "pure" cybersecurity expertise rarely encountered elsewhere, without which the claims to knowledge made by cybersecurity experts would be greatly undermined. The approach taken in this article is thus a new direction for cybersecurity research, with significant implications for other areas of international politics.
In: Ecotoxicology and environmental safety: EES ; official journal of the International Society of Ecotoxicology and Environmental safety, Band 10, Heft 1, S. 1-11