Permalien Courriel Export
Livre imprimé
Cyber conflicts and small states
Éditeur Ashgate Publishing Limited
Année copyright 2016
Notices liées
Notice détaillée
Cyber conflicts and small states
1 vol. (xiii-215 pages) ; 24 cm
Bibliogr. en fin de chapitres. Index
Classification Dewey
Introduction / Lech J. Janczewski and William Caelli ; Information technology’s cultural setting: some considerations / Eleanor Crosby ; Small states in the cyber age: swimming safely in the ocean of data / Ian Fletcher ; An overview of the unique ICT situation of small states / Lech J. Janczewski ; Current cyber wars / Philip Whitmore ; National cyber security organisation: Part I: The Netherlands / Eric Luiijf ; Part II: New Zealand / Chris Roberts ; Part III: Australia / William Caelli ; Part IV: Poland / Piotr Sienkiewicz, Halina Świeboda and Edyta Szczepaniuk ; Security of small countries: summary and model / Lech J. Janczewski and William Caelli ; Prognosis and countermeasures / Lech J. Janczewski and William Caelli
"The probability of a world-wide cyber conflict is small. Yet the probability of forms of cyber conflict, regional or even global, could be argued as being very high. Small countries are usually signatories to military and economic alliances with major world powers but rely heavily on the technical ability of these powers in protecting their own national interests. They may be considered to be IT ’technology colonies’. Their cyber infrastructure is usually fully imported and their ability to assess it is limited. This book poses the question: to what extent should, or can, a small country prepare itself for handling the broad range of cyber threats? Looking at cyber-warfare, cyber-terrorism, cyber-crime and associated concerns, national experts from New Zealand, Australia, The Netherlands, and Poland present analyses of cyber-defence realities, priorities and options for smaller countries. They show that what is needed is the ability of small nations to be able to define and prepare appropriate responses such as the role of military/law enforcement/business entities, continuity and resilience strategies, incident response and business continuity plans and more for handing nationally-aimed cyber-attacks particularly where these address national critical infrastructures" (ed.)
Origine de la notice
Abes (SUDOC)

inMedia v4.4