The Resource Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors

Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors

Label
Cyberspace : malevolent actors, criminal opportunities, and strategic competition
Title
Cyberspace
Title remainder
malevolent actors, criminal opportunities, and strategic competition
Statement of responsibility
Phil Williams, Dighton Fiddner, editors
Title variation
Malevolent actors, criminal opportunities, and strategic competition
Contributor
Editor
Publisher
Subject
Genre
Language
eng
Summary
"This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities -- for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand"--Publisher's web site
Member of
Cataloging source
AWC
http://bibfra.me/vocab/lite/collectionName
HeinOnline U.S. Federal Agency Documents, Decisions, & Appeals Library
Government publication
federal national government publication
Illustrations
  • illustrations
  • maps
Index
no index present
LC call number
HM851
LC item number
.C93 2016 ONLINE
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1948-
http://library.link/vocab/relatedWorkOrContributorName
  • Williams, Phil
  • Fiddner, Dighton,
  • Army War College (U.S.)
  • Army War College (U.S.)
http://library.link/vocab/subjectName
  • Cyberspace
  • Cyberspace
  • Cyberterrorism
  • Computer crimes
  • Information warfare
  • Computer crimes
  • Cyberspace
  • Cyberspace
  • Cyberterrorism
  • Information warfare
Label
Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors
Instantiates
Publication
Note
  • "August 2016."
  • Paper version available for sale by the Superintendent of Documents, U.S. Government Publishing Office
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Technologies that will change your world
  • Rick Hutley
  • Big data challenges, failed cities, and the rise of the new net
  • Jeff Boleng and Colin P. Clarke
  • Part II.
  • Challenges and threats in cyberspace.
  • Cyberterrorism in a post-Stuxnet world
  • Michael Kenney
  • China's reconnaissance and system sabotage activities : supporting information deterrence
  • Timothy L. Thomas
  • Introduction
  • Information warfare a la Russe
  • Stephen J. Blank
  • The
  • Adaptive nature of crime : co-opting the internet
  • Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten
  • Digitally armed and dangerous : humanitarian intervention in the wired world
  • Ronald J. Deibert and John Scott-Railton
  • The
  • Threat from inside ... your automobile
  • Isaac R. Porche III
  • Phil Williams and Dighton Fiddner
  • Part III.
  • Responding to threats in cyberspace.
  • Reflections on cyberdeterrence
  • Martin Libicki
  • Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates
  • Davis B. Bobrow
  • Identifying the real and absolute enemy
  • Rob van Kranenburg
  • Could the United States benefit from cyber-arms-control agreements?
  • Benoît Morel
  • Part I.
  • Transnational organized crime and digilantes in the cybercommons
  • Kelsey Ida
  • From cybercrime to cyberwar : indicators and warnings
  • Timothy J. Shimeall
  • Crisis management in cyberspace and in a "cybered" world
  • Phil Williams
  • Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology
  • Chris C. Demchak
  • Conclusion
  • Dighton Fiddner
  • Concepts and trends in cyberspace.
  • Defining a framework for decision-making in cyberspace
  • Dighton Fiddner
  • Emerging trends in cyberspace : dimensions and dilemmas
  • Nazli Choucri
Control code
956529828
Dimensions
unknown
Extent
1 online resource (xv, 677 pages)
Form of item
online
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
color illustrations, color maps
http://library.link/vocab/ext/overdrive/overdriveId
008-000-01210-5
Specific material designation
remote
System control number
(OCoLC)956529828
Label
Cyberspace : malevolent actors, criminal opportunities, and strategic competition, Phil Williams, Dighton Fiddner, editors
Publication
Note
  • "August 2016."
  • Paper version available for sale by the Superintendent of Documents, U.S. Government Publishing Office
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Technologies that will change your world
  • Rick Hutley
  • Big data challenges, failed cities, and the rise of the new net
  • Jeff Boleng and Colin P. Clarke
  • Part II.
  • Challenges and threats in cyberspace.
  • Cyberterrorism in a post-Stuxnet world
  • Michael Kenney
  • China's reconnaissance and system sabotage activities : supporting information deterrence
  • Timothy L. Thomas
  • Introduction
  • Information warfare a la Russe
  • Stephen J. Blank
  • The
  • Adaptive nature of crime : co-opting the internet
  • Shawn C. Hoard, Jeffrey L. Carasiti, and Edward J. Masten
  • Digitally armed and dangerous : humanitarian intervention in the wired world
  • Ronald J. Deibert and John Scott-Railton
  • The
  • Threat from inside ... your automobile
  • Isaac R. Porche III
  • Phil Williams and Dighton Fiddner
  • Part III.
  • Responding to threats in cyberspace.
  • Reflections on cyberdeterrence
  • Martin Libicki
  • Framing cyberwar and cybersecurity : compelling metaphors and dubious policy templates
  • Davis B. Bobrow
  • Identifying the real and absolute enemy
  • Rob van Kranenburg
  • Could the United States benefit from cyber-arms-control agreements?
  • Benoît Morel
  • Part I.
  • Transnational organized crime and digilantes in the cybercommons
  • Kelsey Ida
  • From cybercrime to cyberwar : indicators and warnings
  • Timothy J. Shimeall
  • Crisis management in cyberspace and in a "cybered" world
  • Phil Williams
  • Cybered ways of warfare : the emergent spectrum of democratized predation and the future cyber-Westphalia interstate topology
  • Chris C. Demchak
  • Conclusion
  • Dighton Fiddner
  • Concepts and trends in cyberspace.
  • Defining a framework for decision-making in cyberspace
  • Dighton Fiddner
  • Emerging trends in cyberspace : dimensions and dilemmas
  • Nazli Choucri
Control code
956529828
Dimensions
unknown
Extent
1 online resource (xv, 677 pages)
Form of item
online
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
color illustrations, color maps
http://library.link/vocab/ext/overdrive/overdriveId
008-000-01210-5
Specific material designation
remote
System control number
(OCoLC)956529828

Library Locations

    • Pardee Legal Research CenterBorrow it
      5998 Alcalá Park, San Diego, CA, 92110-2492, US
      32.771471 -117.187496
Processing Feedback ...