Synopses & Reviews
Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity."
Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual. The essays explore such issues as information ownership, censorship, cyberwars, cyberterrorism, privacy, and rebellion, bringing together expert knowledge from computer science and the social sciences with case studies. It reviews existing policies and practices and discusses the threats and benefits of living in an increasingly networked world. This authoritative analysis of one of the most controversial and compelling security debates of the twenty-first century will appeal to scholars and practitioners interested in security, international relations and policymaking.
About the Author
Giampiero Giacomello is Assistant Professor of International Relations at the Department of Political and Social Sciences at the University of Bologna, Italy. He is also Adjunct Professor with the M.A. program on EU Policy Studies at James Madison University in Florence, Italy.
Table of Contents
List of Abbreviations
List of Figures and Tables
Acknowledgments
Foreword Carlo Schaerf List of Contributors
Introduction - Security in Cybersapce Giampiero Giacomello Part One: The Nation Chapter 1: The ‘State(s) of Cybersecurity
Rossella Mattioli Chapter 2: Reducing Uncertainties in Cyberspace through Confidence and Capacity Building Measures
Patryk Pawlak Chapter 3: Wikileaks and Cyberspace
Judith Reppy Chapter 4: Leaks: Securing Communications and Achieving Nuclear Zero
Bruce Larkin Chapter 5: Establishing Norms of Behavior in Cyberspace
: The Chinese Viewpoint
Chunmei Kang Part Two: The Infrastructure and The Individual Chapter 6: Einstein on the Breach: Surveillance Technology, Cybersecurity and Organizational Change
Milton Mueller and
Andreas Kuehn Chapter 7: Artificial or ‘Legitimate Barriers to Internet Governance?”
Francesco Giacomini and
Laura Cordani Chapter 8: Public-Private Partnerships:
A ‘Soft Approach to Cybersecurity? Views from the European Union
Maria Grazia Porcedda Chapter 9: Targeting Ones Ideal Audience:
Self-Presentation Practices among Extreme Nationalists on Social Networks
Andra SiibakBibliography
Index