Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
53,621 result(s) for "Cyberterrorism"
Sort by:
Constructing the cyberterrorist : critical reflections on the UK case
\"This book maps and analyses the official British construction of the threat of cyberterrorism. By using interpretive discourse analysis, this book identifies 'strands' from a corpus of policy documents, statements and speeches from UK ministers, MPs and peers, between 12 May 2010 and 24 June 2016. The book examines how the threat of cyberterrorism was constructed in the UK, and what this securitisation has made possible. The author makes novel contributions to the Copenhagen School's 'securitisation theory' framework by outlining a 'tiered' rather than monolithic audience system; refining the 'temporal' and 'spatial' conditioning of a securitisation with reference to the distinctive characteristics of cyberterrorism; and, lastly, by detailing the way in which popular fiction can be ascribed agency to 'fill in' an absence of 'cyberterrorism' case studies. He also argues that the UK government's classification of cyberterrorism as a 'Tier One' threat created a central strand upon which a discursive securitisation was established. This book will be of interest to students of critical security studies, terrorism studies, UK politics and IR\"-- Provided by publisher.
Cybersecurity breaches and cash holdings: Spillover effect
This paper shows that firms significantly increase cash holdings after they have experienced a cybersecurity attack, and this behavior persists for years. A cyberattack increases cash holdings from a base level of 23% of assets to 26.87%. Similar firms, defined by industry and geographical proximity also increase their cash holdings. Suppliers of attacked firms are also affected. Overall, the results of this study indicate that the detrimental effects of a cybersecurity breach are not isolated to the attacked firms, and peer firms are quick to follow in taking precaution.
Cyber blockades
This is the first book to examine cyber blockades, which are large-scale attacks on infrastructure or systems that prevent a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data. The attack can take place through digital, physical, and/or electromagnetic means, and it can be conducted by another state or a sub-state group. The purpose of this book is to understand how cyber blockades can shut down or otherwise render cyberspace useless for an entire country, and Russell also seeks to understand the implications of cyber blockades for international relations. A cyber blockade can be either a legitimate or illegitimate tool depending on the circumstances. What is certain is that the state on the receiving end faces a serious threat to its political, military, economic, and social stability. The book includes two in-depth case studies of cyber blockades, Estonia in 2007 and Georgia in 2008, both of which suffered cyber attacks from Russia. Russell compares cyber blockades with those in other domains (sea, land, air, and space) and offers recommendations for policymakers and for further academic study.
Optimizing cyberdeterrence : a comprehensive strategy for preventing foreign cyberattacks
Cyberattacks are one of the greatest fears for both governments and the private sector. The attacks come without warning and can be extremely costly and embarrassing. Robert Mandel offers a unique and comprehensive strategic vision for how governments, in partnership with the private sector, can deter cyberattacks from both nonstate and state actors. Cyberdeterrence must be different from conventional military or nuclear deterrence, which are mainly based on dissuading an attack by forcing the aggressor to face unacceptable costs. In the cyber realm, where attributing a specific attack to a specific actor is extremely difficult, conventional deterrence principles are not enough. Mandel says that cyberdeterrence must alter a potential attacker's decision calculus by not only raising costs for the attacker but also by limiting the prospects for gain. Cyberdeterrence must also involve public-private partnerships, cross-domain responses must be considered, not just retaliation in kind. The book includes twelve twenty-first century cyberattack case studies in order to draw insights into cyberdeterrence and determine the conditions under which it works most effectively. Mandel concludes by making recommendations for implementing cyberdeterrence and integrating it into broader national security policy.