Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
182 result(s) for "Cyberspace Political aspects."
Sort by:
Cyberwar and revolution : digital subterfuge in global capitalism
\"Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks\"--Back cover.
China's digital nationalism
\"Our current understanding of fake news and cyber warfare aside, many people still believe that the internet represents a cosmopolitan ideal over which the flow of diverse information educates and empowers users. The Chinese case defies these expectations. Nationalism, in China as much as elsewhere, is today adopted, filtered, transformed, enhanced, and accelerated through digital networks. And as we have increasingly seen, nationalism in digital spheres interacts in complicated ways with nationalism \"on the ground\". If we are to understand the social and political complexities of the 21st century, we need to ask: what happens to nationalism when it goes digital? In China's Digital Nationalism, Florian Schneider explores the issue by looking at digital China first hand, exploring what search engines, online encyclopedias, websites, hyperlink networks, and social media can tell us about the way that different actors construct and manage a crucial topic in contemporary Chinese politics: the protracted historical relationship with neighboring Japan. Using two cases, the infamous Nanjing Massacre of 1937 and the recent disputes over islands in the East China Sea, Schneider shows how various stakeholders in China construct networks and deploy power to shape nationalism for their own ends. These dynamics provide crucial lessons on how nation-states adapt to the shifting terrain of the digital age, and they highlight how digital nationalism is today an emergent property of complex communication networks\"-- Provided by publisher.
Cybering Democracy
In Cybering Democracy, Diana Saco boldly reconceptualizes the relationship between democratic participation and spatial realities both actual and virtual. She argues that cyberspace must be viewed as a produced social space, one that fruitfully confounds the ordering conventions of our physical spaces.
Politics as usual : the cyberspace \revolution\
Examining the effects of the Internet on American politics, this book reveals its potential as a tool for empowering people to challenge existing power structures. However, the authors show how the American political system tends to normalize political activity, and thus the Internet′s vast subversive potential could be lost, rendering it just another purveyor of ignored information.
The coming swarm : DDoS actions, hacktivism, and civil disobedience on the Internet
\"This book examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism. The internet is a vital arena of communication, self expression, and interpersonal organizing. When there is a message to convey, words to get out, people to organize, many will turn to the internet as a theater for that activity. As familiar and widely accepted activist tools--petitions, fundraisers, mass letter-writing, call-in campaigns and others--find equivalent practices in the online space, is there also room for the tactics of disruption and civil disobedience that are equally familiar from the realm of street marches, occupations, and sit-ins? Grounding the analysis historically, focusing on early deployments of activist DDOS as well as modern instances to trace its development over time, this book uses activist DDOS actions as the foundation of a larger analysis of the practice of disruptive civil disobedience on the internet\"-- Provided by publisher.
A Study of Vietnam's Control over Online Anti-state Content
Over the past two decades, the fixation on anti-state content has shaped the way Vietnamese authorities deployed various censorship strategies to achieve the dual goals of creating a superficial openness while maintaining a tight grip on online discourses. These considerations dictated how several regulations on Internet controls were formulated and enforced.Vietnamese censors also selectively borrowed from China's online censorship playbook, a key tenet of which is the fear-based approach. The modus operandi for the authorities is to first harp on what they perceive as online foreign and domestic threats to Vietnam's social stability. Then those threats are exhaustively used to enforce tougher measures that are akin to those implemented in China.But unlike China, Vietnam has not afforded to ban Western social media platforms altogether. Realizing that they would be better off exploiting social media for their own gains, Vietnamese authorities have sought to co-opt and utilize it to curb anti-state content on the Internet. The lure of the Vietnamese market has also emboldened Facebook and Google's YouTube to consider it fit to acquiesce to state censorship demands.The crackdown on anti-state content and fear-based censorship are likely to continue shaping Vietnam's Internet controls, at least in the foreseeable future. The question is how both Internet users and the authorities will make the most of their unlikely--and fickle--alliance with social media to fulfil their agendas.
Messing with the enemy : surviving in a social media world of hackers, terrorists, Russians, and fake news
\"Clint Watts electrified the nation when he testified in front of the Senate Select Committee on Intelligence regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don't hack your computer, they hack your mind. Watts reveals how these malefactors use your social media information and that of your family, friends and colleagues to map your social networks, identify your vulnerabilities, master your fears and harness your preferences. Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government's hacking of a Democratic presidential candidate's e-mails. Watts knows how they do it because he's mirrored their methods to understand their intentions, combat their actions, and co-opt their efforts. Watts examines a range of social media platforms--from the first Internet forums to the current titans of Facebook, Twitter and LinkedIn--and bad actors--from al-Qaeda to the Islamic State to the Russian social media troll farm--to illuminate exactly how our enemies use Western social media for their nefarious purposes. He explains how he's learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians--and how these interactions have generated methods for fighting back against those who seek to harm people on the Internet. He concludes with a snapshot of how advances in artificial intelligence will make future influence even more effective and dangerous to social media users and democratic governments worldwide. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.\"--Jacket.
Cyber strategy : the evolving character of power and coercion
This book examines how states integrate cyber capabilities with other instruments of power to achieve foreign policy outcomes. Given North Korea’s use of cyber intrusions to threaten the international community and extort funds for its elites, Chinese espionage and the theft of government records through the Office of Personal Management (OPM) hack, and the Russian hack on the 2016 US election, this book is a timely contribution to debates about power and influence in the 21st century. Its goal is to understand how states apply cyber means to achieve political ends, a topic speculated and imagined, but investigated with very little analytical rigor. Following on Valeriano and Maness’s (2015) book, Cyber War versus Cyber Realities: Cyber Conflict in the International System, this new study explores how states apply cyber strategies, using empirical evidence and key theoretical insights largely missed by the academic and strategy community. It investigates cyber strategies in their integrated and isolated contexts, demonstrating that they are useful to managing escalation and sending ambiguous signals, but generally they fail to achieve coercive effect.