National Security in the Information AgeEmily O. Goldman Routledge, 2 Αυγ 2004 - 256 σελίδες As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing concern. Political, economic and military leaders must manage and reduce the level of risk associated with threats from hostile states, malevolent nonstate actors such as organized terrorist groups or individual hackers, and high-tech accidents. The impact of the information technology revolution on warfare, global stability, governance, and even the meaning of existing security constructs like deterrence is significant. These essays examine the ways in which the information technology revolution has affected the logic of deterrence and crisis management, definitions of peace and war, democratic constraints on conflict, the conduct of and military organization for war, and the growing role of the private sector in providing security. |
Περιεχόμενα
13 | |
Information Technology and Crisis Management | 46 |
International Competition and Information TechnologyDriven Military Organizations | 75 |
The Strategy and Tactics of Information Warfare | 113 |
Information Warfare and Democratic Accountability | 140 |
Information Warfare and Domestic Threats to American Security | 161 |
Rewarding IT Security in the Marketplace | 190 |
Thinking about New Security Paradigms | 209 |
Abstracts | 226 |
Notes on Contributors | 231 |
233 | |
Άλλες εκδόσεις - Προβολή όλων
National Security in the Information Age Emily O. Goldman,Silvio Pons,Federico Romero Περιορισμένη προεπισκόπηση - 2004 |
Συχνά εμφανιζόμενοι όροι και φράσεις
ability action activity actors adversary American analysis approach attack authority become central challenge civil command communications complex concern continued create crisis management critical cyber decision defence democratic designed destruction deterrence direct discussion disruption domestic effective electronic emerging enemy example forces foreign function global goal greater groups important increase individual information age information technology information warfare infrastructure integrated intelligence involved issues knowledge leaders less lethal limited losses means military monitoring national security noted nuclear operations organizational organizations particular perception physical plans political possible potential Press preventive problem protect Report requires response risk Second social society strategy structure surprise surveillance technical terrorism thinking threat United University vulnerabilities Washington weapons York