National Security in the Information AgeEmily O. Goldman Routledge, 2 Αυγ 2004 - 256 σελίδες As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing concern. Political, economic and military leaders must manage and reduce the level of risk associated with threats from hostile states, malevolent nonstate actors such as organized terrorist groups or individual hackers, and high-tech accidents. The impact of the information technology revolution on warfare, global stability, governance, and even the meaning of existing security constructs like deterrence is significant. These essays examine the ways in which the information technology revolution has affected the logic of deterrence and crisis management, definitions of peace and war, democratic constraints on conflict, the conduct of and military organization for war, and the growing role of the private sector in providing security. |
Περιεχόμενα
1 | |
MANAGING CONFLICT IN THE INFORMATION AGE | 13 |
ORGANIZATION AND CONDUCT OF WARFARE IN THE INFORMATION AGE | 75 |
GOVERNANCE IN THE INFORMATION AGE | 140 |
CONCLUDING REFLECTIONS | 209 |
Abstracts | 226 |
Notes on Contributors | 231 |
233 | |
Άλλες εκδόσεις - Προβολή όλων
National Security in the Information Age Emily O. Goldman,Silvio Pons,Federico Romero Περιορισμένη προεπισκόπηση - 2004 |
Συχνά εμφανιζόμενοι όροι και φράσεις
11 September ability action activity actors adversary Afghanistan American analysis Atrium attack Berlin Berlin Blockade Bruce Schneier capabilities challenge civil liberties combat command communications complex concept conflict crises crisis management cyber insurance cyberspace cyberwar deception decision defence Demchak democratic destruction deterrence disruption domestic effective electronic Electronic Frontier Foundation emerging enemy escalation example focused forces foreign function global goal groups Harknett implications incentives individual information age information systems information technology information technology network information warfare infrastructure integrated intelligence intrusive involved John Arquilla knowledge Kosovo lethal Matt Bishop monitoring national security non-state nuclear operations organizational perception management physical political potential problem protect proxies requires response revolution risk senior leaders society Soviet Soviet Union strategy structure surprise surveillance target technical terrorism terrorist threat United University Press USA Patriot Act vulnerabilities Washington weapons York