Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization, 1st Edition

  • Pauline C. Reich
  • Published By:
  • ISBN-10: 1615208321
  • ISBN-13: 9781615208326
  • DDC: 363.325
  • Grade Level Range: College Freshman - College Senior
  • 350 Pages | eBook
  • Original Copyright 2013 | Published/Released November 2012
  • This publication's content originally published in print form: 2013

  • Price:  Sign in for price



In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. LAW, POLICY, AND TECHNOLOGY: CYBERTERORRISM, INFORMATION WARFARE, AND INTERNET IMMOBILIZATION provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Table of Contents.
Detailed Table of Contents.
1: Setting the Scene for Cyberterrorism and Other Cyber Attacks.
2: The Security Practitioners' Perspective.
3: Economic, Political, and Social Threats in the Information Age.
4: Critical Information Infrastructure and Cyber-Terrorism.
5: Attackers: Internal and External.
6: Threats, Vulnerability, Uncertainty, and Information Risk.
7: ICT and Security Governance: Doing the Right Things the Right Way (and Well Enough).
8: Concerns about What Will Happen Next: Should These Things Keep You Awake at Night?.
9: Law and Policy Perspectives.
10: Introduction: Weak Legal Framework and Limited International Cooperation.
11: To Define or Not to Define: Law and Policy Conundrums for the Cybercrime, National Security, International Law and Military Law Communities.
12: Anonymity, Actual Incidents, Cyber Attacks, and Digital Immobilization.
13: Culture Clashes: Freedom, Privacy, and Government Surveillance Issues Arising in Relation to National Security and Internet Use.
14: What Is Cyberterrorism and How Real Is the Threat? A Review of the Academic Literature, 1996 – 2009.
15: Cyber-Search and Cyber-Seizure: Policy Considerations of Cyber Operations and Fourth Amendment Implications.
16: Terrorism and the Internet: Do We Need an International Solution?.
17: Case Studies.
18: Case Study: India - Terrorism and Terrorist Use of the Internet/Technology.
19: China's Cyber Tool: Striving to Attain Electronic Shi?.
20: The United Kingdom's Centre for the Protection of National Infrastructure: An Evaluation of the UK Government's Response Mechanism to Cyber Attacks on Critical Infrastructures.
Compilation of References.
About the Contributors.