Coverart for item
The Resource Cyberspace : Risks and Benefits for Society, Security and Development

Cyberspace : Risks and Benefits for Society, Security and Development

Label
Cyberspace : Risks and Benefits for Society, Security and Development
Title
Cyberspace
Title remainder
Risks and Benefits for Society, Security and Development
Creator
Contributor
Subject
Language
eng
Member of
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Series statement
Advanced Sciences and Technologies for Security Applications Ser
Cyberspace : Risks and Benefits for Society, Security and Development
Label
Cyberspace : Risks and Benefits for Society, Security and Development
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=4858112
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • "Contents" -- "Introduction" -- "Prologue" -- "Cyberspace" -- "1 On How the Cyberspace Arose to Fulfill Theoretical Physicistsâ{u0080}{u0099} Needs and Eventually Changed the World: Personal Recallings and a Practitionerâ{u0080}{u0099}s Perspective" -- "Abstract" -- "1 Introduction" -- "2 A Most Humble Aim: Producing Professionally-Looking Preprints and Sending Their Encoded Files by Using Computers" -- "3 Paul Ginsparg and the ArXiv Concept" -- "4 The World Wide Web" -- "5 Fulfilling the Needs of Theoretical Physicists" -- "6 Once More the Same Discourse, but from a Different Perspective" -- "7 The Uncountable Present Uses of Cyberspace" -- "8 The Dangers of Cyberspace" -- "9 The Future of Cyberspace" -- "10 Conclusion" -- "Acknowledgement" -- "References" -- "2 Narrative Mapping of Cyberspace. Context and Consequences" -- "Abstract" -- "1 Introduction" -- "2 Cyberspace Context" -- "2.1 Context Background" -- "2.2 Contemporary Context" -- "3 Cyberspace Consequencesâ{u0080}{u0094}General" -- "4 Overarching Consequences of Cyberspace" -- "5 Specific Consequences of Cyberspace: A Selection of Four" -- "5.1 Power Consequences" -- "5.2 Consequences for Conflict" -- "5.3 Consequences for Personal Well-Being (Human Security)" -- "5.4 Consequences for Business" -- "5.5 Consequences for the Future" -- "6 Conclusion" -- "References" -- "3 A Conceptual and Legal Approach to the Cyberspace: The Dilemma Security Versus Freedom" -- "Abstract" -- "1 Introduction: Equilibrium and Evolution of Crime and Technology" -- "2 Examples of the Criminal Activities Involved. Terrorism and Organized Crime. Means Used to Commit Crimes" -- "3 Privacy, Data Use and Big Data" -- "4 Right to Forget and Right to Remember" -- "5 Cyber-Criminal Controls and Impunity" -- "6 Cyber Intelligence" -- "7 Conclusion" -- "References"
  • "4 The Digital Revolution in Developing Countries: Brief Analysis of the Dominican Republic" -- "Abstract" -- "1 Introduction" -- "2 ICTs and Development" -- "2.1 Human Development" -- "2.2 From the MDGs to the SDGs" -- "3 The so Called â{u0080}{u009C}Digital Revolutionâ{u0080}{u009D}" -- "3.1 Digital Divide" -- "3.2 Education" -- "3.3 Data Revolution" -- "4 The Case of the Dominican Republic" -- "4.1 General Context" -- "4.2 Digital Strategies in the Dominican Republic" -- "5 Conclusion" -- "References" -- "5 Business Strategy in the Digital Age. Digital Transformation, Disruption and Cybersecurity" -- "Abstract" -- "1 Progress of the New Technologies, Networks and Consequences" -- "2 Digital Transformation and Disruption" -- "3 Convergence in the Changes and Impact on Business" -- "4 Management Information Systems" -- "5 The Power of Network, Systems and Reflexivity" -- "6 Change, Complexity and a New Mindset" -- "7 Conclusion" -- "References" -- "6 Impact of Cyberspace on Individual Safety and Group Securityâ{u0080}{u0094}A Human Developmental Psychology Approach" -- "Abstract" -- "1 How to Describe the Modern Developmental Context?" -- "2 Digital Natives and Digital Immigrants" -- "3 The Consequences of Using Cyberspace for Individual Mind" -- "4 Changes in Cognitive, Social and Physical Functioning" -- "5 Functional Changes in the Nervous System" -- "6 Influence of Individuals on Cyberspace" -- "7 The Challengesâ{u0080}{u0094}How to Protect Individual Safety and Group Security in Cyberspace" -- "8 Changes in the Personal Safety in Cyberspace" -- "9 Improving Individual Cyber-Safety in Cyberspace" -- "10 Changes in the Group Security in Cyberspace" -- "11 The â{u0080}{u0098}Keep It Tameâ{u0080}{u0099} Campaign" -- "12 The GePePeS Project" -- "13 Conclusion" -- "References" -- "Internet Sources" -- "Some of Broken Heart Pages" -- "Cybersecurity" -- "7 Cyberspace: A Platform for Organized Crime" -- "Abstract"
  • "1 Cyberspace: A Haven for Organized Crime" -- "2 Sociological and Legal Definition of Organized Crime in the European Union (EU) and the United Nations (UN)" -- "3 Money Laundering" -- "3.1 Tax Havens and Bank Secrecy" -- "3.2 Criminal Legal Instruments to Combat Money Laundering. Confiscation and the Financial Action Task Force (FATF)" -- "4 Illicit Trafficking of Dual Use Materials: The Case of Chemical, Biological, Radiological, and Nuclear (CBRN) Materials" -- "5 Conclusions" -- "References" -- "8 Some Criminal Aspects of Cybersecurity" -- "Abstract" -- "1 Cyberspace and Cybersecurity" -- "2 Describing and Categorizing Cybercrime" -- "3 A Challenging New Future: Growing Risks" -- "3.1 Some Blurred Distinctions" -- "3.2 Cybercrime Prevention" -- "3.3 Some Specific Legal Concerns" -- "4 Conclusion" -- "Acknowledgements" -- "References" -- "9 The Situation and Evolution of the Managed Services of Cybersecurity, Towards 3.0 and Beyond" -- "Abstract" -- "1 Security Services Generation 1.0: From Mediocrity to Taximeter" -- "2 Security Services Generation 2.0: From Taxi to Airplane" -- "3 Security Services Generation 3.0: Cybersecurity and Intelligence, Strategy, Virtualization and Cloud" -- "4 Conclusion" -- "References" -- "10 Collaboration of Private Investigation with Public Institutions Within the Spanish Cybersecurity Strategy. How Private Investigation Gathers Proof on Cyber Delinquency" -- "Abstract" -- "1 Introduction" -- "2 A Review of the National Security Law and National Cybersecurity Strategy" -- "2.1 National Security Law (2015)" -- "2.2 National Cybersecurity Strategy (2013)" -- "2.3 Private Security Law (2014)" -- "2.4 Cyberdefense Joint Command (Ministry of Defense)" -- "2.5 Summary" -- "3 Private Investigation" -- "3.1 Companyâ{u0080}{u0099}s Employee and Social Networks" -- "3.2 System Information Attack" -- "3.3 Bullying on Employees"
  • "3.4 Wi-Fi Penetration" -- "3.5 On-line Fraud" -- "3.6 Identity Theft" -- "3.7 Cyberbullying and Grooming on Children" -- "4 Conclusion" -- "References" -- "11 Psychosociological Characteristics of Cybercrime" -- "Abstract" -- "1 Introduction" -- "2 Cybercrime and Cybercriminals" -- "3 Cyberterrorism and Cyberterrorist" -- "4 Cyberwar" -- "5 Conclusion" -- "References" -- "12 Use of Cyberspace for Terrorist Purposes" -- "Abstract" -- "1 Introduction" -- "2 Is the Use of Cyberspace a Cyber-Threat?" -- "3 Cyberspace at the Service of Terror" -- "3.1 Cyberspace at the Service of Daesh" -- "3.2 Cyberspace at the Service of al-Qaeda" -- "3.3 Cyberspace at the Service of the Taliban" -- "3.4 Cyberspace at the Service of al-Shabbaah" -- "3.5 Cyberspace at the Service of Boko Haram" -- "3.6 Cyberspace at the Service of Jabhat al Nusrah" -- "4 Conclusion" -- "References" -- "13 Mythology of Cyber-Crimeâ{u0080}{u0094}Insecurity & Governance in Cyberspace: Some Critical Perspectives" -- "Abstract" -- "1 Introduction" -- "2 Scoping the Problem: Who Are the Principle Attackers in Cyberspace?" -- "3 The Changing Virtual Landscapesâ{u0080}{u0094}Policing the Interface Between Cyber Worlds and External Realities" -- "4 Who Are the Major Playersâ{u0080}{u0094}What Domains Do They Control?" -- "4.1 Cyber-Criminals" -- "4.2 Hactivists" -- "4.3 State Related Actors" -- "5 Mapping Impacts, Costs and Consequences" -- "5.1 Switching off Cities" -- "5.2 Targeting Critical Infrastructure" -- "6 The â{u0080}{u0098}Newâ{u0080}{u0099} Surveillance Architectures and Agendas" -- "6.1 The Snowden Revelations" -- "7 Governance" -- "8 Conclusion" -- "References" -- "Cyberwarfare" -- "14 The Tallinn Manual and Jus ad bellum: Some Critical Notes" -- "Abstract" -- "1 Introduction" -- "2 The Tallinn Manual: A Quick Overview" -- "3 Cyber War and the Use of Force" -- "4 Cyber-Attacks and Non-State Actors" -- "5 Conclusion" -- "References"
  • "15 War-Like Activities in the Cyberspace: Applicability of the Law of Armed Conflicts" -- "Abstract" -- "1 Cyberspace as a New Battleground" -- "2 Preconditions for the Application of IHL to Cyber Hostilities" -- "2.1 Cyber Operations and International Armed Conflicts" -- "Attribution to a State" -- "Resort to Armed Force" -- "2.2 Cyber Operations and Non-International Armed Conflicts" -- "Intensity" -- "Organization of the Armed Group" -- "3 Basic Issues Related to the Application of IHL to Cyber Hostilities" -- "3.1 Determination of the Cyber Operations Subject to IHL Rules on the Conduct of Hostilities" -- "3.2 Cyber Operations as â{u0080}{u009C}Attacksâ{u0080}{u009D}" -- "4 Conclusion" -- "References" -- "16 Negotiation on Cyber Warfare" -- "Abstract" -- "1 Introduction" -- "2 To Which Category of Weapons Cyber Weapons Belong?" -- "3 Conceptual Approaches and Priorities" -- "4 Cyber Strategy in Different Countries and Organizations" -- "5 Cyberwarfare Legal Status" -- "6 The Tallinn Manual" -- "7 What About Preventive Use of the Cyber Power?" -- "8 Conclusion" -- "References" -- "17 Security of Cyber-Space in Nuclear Facilities" -- "Abstract" -- "1 Introduction" -- "2 The Nature of Cyber Space" -- "3 Cyber Attacks Against Iranâ{u0080}{u0099}s Nuclear Facilities" -- "4 Impacts of Stuxnet Virus on the Strategic Nuclear Program of Iran" -- "5 Nitro Zeus Plot Against Iranâ{u0080}{u0099}s Nuclear Activities" -- "6 Threat Is Global!!" -- "7 Multidimensional Phenomena" -- "8 Importance of a Cyber Security Culture" -- "9 Security of Cyber Space Vis-à-Vis Nuclear Security" -- "10 Iranâ{u0080}{u0099}s International Initiative" -- "11 Conclusion" -- "References" -- "18 Can Cyber Attacks Prevent Wars?" -- "Abstract" -- "1 Introduction" -- "2 Scenarios" -- "3 Discussion" -- "4 Conclusion" -- "References" -- "Erratum to: Cyberspace "
  • "Erratum to: J.M. RamÃ{u00AD}rez and L.A. GarcÃ{u00AD}a-Segura (eds.), Cyberspace, Advanced Sciences and Technologies for Security Applications, DOI 10.1007/978-3-319-54975-0 "
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9783319549750&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4388125'}
Extent
1 online resource (286 pages)
Form of item
online
Isbn
9783319549750
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...