The Resource Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors
Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors
Resource Information
The item Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of San Diego Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of San Diego Libraries.
This item is available to borrow from 1 library branch.
- Summary
- "This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities -- for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand"--Publisher's web site
- Language
- eng
- Extent
- 1 online resource (xv, 677 pages)
- Note
-
- "August 2016."
- Paper version available for sale by the Superintendent of Documents, U.S. Government Publishing Office
- Contents
-
- Technologies that will change your world
- Rick Hutley
- Big data challenges, failed cities, and the rise of the new net
- Jeff Boleng and Colin P. Clarke
- Part II.
- Challenges and threats in cyberspace.
- Cyberterrorism in a post-Stuxnet world
- Michael Kenney
- China's reconnaissance and system sabotage activities : supporting information deterrence
- Timothy L. Thomas
- Introduction
- Information warfare a la Russe
- Stephen J. Blank
- The
- Adaptive nature of crime : co-opting the internet
- Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten
- Digitally armed and dangerous : humanitarian intervention in the wired world
- Ronald J. Deibert and John Scott-Railton
- The
- Threat from inside ... your automobile
- Isaac R. Porche III
- Phil Williams and Dighton Fiddner
- Part III.
- Responding to threats in cyberspace.
- Reflections on cyberdeterrence
- Martin Libicki
- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates
- Davis B. Bobrow
- Identifying the real and absolute enemy
- Rob van Kranenburg
- Could the United States benefit from cyber-arms-control agreements?
- Benoît Morel
- Part I.
- Transnational organized crime and digilantes in the cybercommons
- Kelsey Ida
- From cybercrime to cyberwar : indicators and warnings
- Timothy J. Shimeall
- Crisis management in cyberspace and in a "cybered" world
- Phil Williams
- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology
- Chris C. Demchak
- Conclusion
- Dighton Fiddner
- Concepts and trends in cyberspace.
- Defining a framework for decision-making in cyberspace
- Dighton Fiddner
- Emerging trends in cyberspace : dimensions and dilemmas
- Nazli Choucri
- Label
- Cyberspace : malevolent actors, criminal opportunities, and strategic competition
- Title
- Cyberspace
- Title remainder
- malevolent actors, criminal opportunities, and strategic competition
- Statement of responsibility
- Phil Williams, Dighton Fiddner, editors
- Title variation
- Malevolent actors, criminal opportunities, and strategic competition
- Language
- eng
- Summary
- "This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities -- for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand"--Publisher's web site
- Cataloging source
- AWC
- http://bibfra.me/vocab/lite/collectionName
- HeinOnline U.S. Federal Agency Documents, Decisions, & Appeals Library
- Government publication
- federal national government publication
- Illustrations
-
- illustrations
- maps
- Index
- no index present
- LC call number
- HM851
- LC item number
- .C93 2016 ONLINE
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorDate
- 1948-
- http://library.link/vocab/relatedWorkOrContributorName
-
- Williams, Phil
- Fiddner, Dighton,
- Army War College (U.S.)
- Army War College (U.S.)
- http://library.link/vocab/subjectName
-
- Cyberspace
- Cyberspace
- Cyberterrorism
- Computer crimes
- Information warfare
- Computer crimes
- Cyberspace
- Cyberspace
- Cyberterrorism
- Information warfare
- Label
- Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors
- Note
-
- "August 2016."
- Paper version available for sale by the Superintendent of Documents, U.S. Government Publishing Office
- Bibliography note
- Includes bibliographical references
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Technologies that will change your world
- Rick Hutley
- Big data challenges, failed cities, and the rise of the new net
- Jeff Boleng and Colin P. Clarke
- Part II.
- Challenges and threats in cyberspace.
- Cyberterrorism in a post-Stuxnet world
- Michael Kenney
- China's reconnaissance and system sabotage activities : supporting information deterrence
- Timothy L. Thomas
- Introduction
- Information warfare a la Russe
- Stephen J. Blank
- The
- Adaptive nature of crime : co-opting the internet
- Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten
- Digitally armed and dangerous : humanitarian intervention in the wired world
- Ronald J. Deibert and John Scott-Railton
- The
- Threat from inside ... your automobile
- Isaac R. Porche III
- Phil Williams and Dighton Fiddner
- Part III.
- Responding to threats in cyberspace.
- Reflections on cyberdeterrence
- Martin Libicki
- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates
- Davis B. Bobrow
- Identifying the real and absolute enemy
- Rob van Kranenburg
- Could the United States benefit from cyber-arms-control agreements?
- Benoît Morel
- Part I.
- Transnational organized crime and digilantes in the cybercommons
- Kelsey Ida
- From cybercrime to cyberwar : indicators and warnings
- Timothy J. Shimeall
- Crisis management in cyberspace and in a "cybered" world
- Phil Williams
- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology
- Chris C. Demchak
- Conclusion
- Dighton Fiddner
- Concepts and trends in cyberspace.
- Defining a framework for decision-making in cyberspace
- Dighton Fiddner
- Emerging trends in cyberspace : dimensions and dilemmas
- Nazli Choucri
- Control code
- 956529828
- Dimensions
- unknown
- Extent
- 1 online resource (xv, 677 pages)
- Form of item
- online
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- color illustrations, color maps
- http://library.link/vocab/ext/overdrive/overdriveId
- 008-000-01210-5
- Specific material designation
- remote
- System control number
- (OCoLC)956529828
- Label
- Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors
- Note
-
- "August 2016."
- Paper version available for sale by the Superintendent of Documents, U.S. Government Publishing Office
- Bibliography note
- Includes bibliographical references
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Technologies that will change your world
- Rick Hutley
- Big data challenges, failed cities, and the rise of the new net
- Jeff Boleng and Colin P. Clarke
- Part II.
- Challenges and threats in cyberspace.
- Cyberterrorism in a post-Stuxnet world
- Michael Kenney
- China's reconnaissance and system sabotage activities : supporting information deterrence
- Timothy L. Thomas
- Introduction
- Information warfare a la Russe
- Stephen J. Blank
- The
- Adaptive nature of crime : co-opting the internet
- Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten
- Digitally armed and dangerous : humanitarian intervention in the wired world
- Ronald J. Deibert and John Scott-Railton
- The
- Threat from inside ... your automobile
- Isaac R. Porche III
- Phil Williams and Dighton Fiddner
- Part III.
- Responding to threats in cyberspace.
- Reflections on cyberdeterrence
- Martin Libicki
- Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates
- Davis B. Bobrow
- Identifying the real and absolute enemy
- Rob van Kranenburg
- Could the United States benefit from cyber-arms-control agreements?
- Benoît Morel
- Part I.
- Transnational organized crime and digilantes in the cybercommons
- Kelsey Ida
- From cybercrime to cyberwar : indicators and warnings
- Timothy J. Shimeall
- Crisis management in cyberspace and in a "cybered" world
- Phil Williams
- Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology
- Chris C. Demchak
- Conclusion
- Dighton Fiddner
- Concepts and trends in cyberspace.
- Defining a framework for decision-making in cyberspace
- Dighton Fiddner
- Emerging trends in cyberspace : dimensions and dilemmas
- Nazli Choucri
- Control code
- 956529828
- Dimensions
- unknown
- Extent
- 1 online resource (xv, 677 pages)
- Form of item
- online
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- color illustrations, color maps
- http://library.link/vocab/ext/overdrive/overdriveId
- 008-000-01210-5
- Specific material designation
- remote
- System control number
- (OCoLC)956529828
Subject
- Information warfare
- Electronic books
- Information warfare
- Computer crimes
- Computer crimes
- Cyberspace
- Cyberspace
- Cyberspace -- Government policy
- Cyberspace -- Government policy
- Cyberterrorism
- Cyberterrorism
Genre
Member of
- HeinOnline U.S. Federal Agency Documents, Decisions, & Appeals Library
- HeinOnline U.S. Federal Agency Documents, Decisions, and Appeals
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sandiego.edu/portal/Cyberspace--malevolent-actors-criminal/9507wux7sOI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/portal/Cyberspace--malevolent-actors-criminal/9507wux7sOI/">Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sandiego.edu/portal/Cyberspace--malevolent-actors-criminal/9507wux7sOI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/portal/Cyberspace--malevolent-actors-criminal/9507wux7sOI/">Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>