Cyber: 1st Edition (Hardback) book cover

Cyber

1st Edition

Edited by IISS

Routledge

675 pages

Purchasing Options:$ = USD
Hardback: 9780367346898
pub: 2019-09-11
SAVE ~$160.00
Available for pre-order
$800.00
$640.00
x

FREE Standard Shipping!

Description

Over the past several years, rising cyber power has comprehensively and profoundly affected international security. Key areas include military operations, terrorism, critical infrastructure, corporate security, individual privacy and financial security, and political processes. The burgeoning development of information technology did not always seem especially daunting from a strategic perspective. For instance, as recently as the Arab ‘spring’, which began less than a decade ago, social media seemed to power political liberalisation, casting the digital revolution as an engine of social progress. It may yet prove to be that, but for the time being less salutary aspects of the technological march have arguably overtaken the sunnier ones. The articles in this collection reflect this arc.

Table of Contents

Volume 1

Introduction

Part 1: Cyber Terrorism

  1. Kevin Soo Hoo, Seymour Goodman & Lawrence Greenberg, ‘Information Technology and the Terrorist Threat’, Survival, 39, 03, 1997, pp.135-155.
  2. Simon Chesterman, ‘Privacy and Surveillance in the Age of Terror’, Survival, 52, 5, 2010, pp.31-46.
  3. James Farwell, ‘Jihadi Video in the ‘War of Ideas’’, Survival, 52, 6, 2010, pp.127-150.
  4. James Farwell, ‘The Media Strategy of ISIS’, Survival, 56, 6, 2014, pp.49-55.
  5. Aaron Brantly, ‘Innovation an Adaption in Jihadist Digital Security’, Survival, 59, 1, 2017, pp. 79-102.
  6. Part 2: Cyber Policy

  7. Gregory Grove, Seymour Goodman & Stephen Lukasik, ‘Cyber Attacks and International Law’, Survival, 42, 3, 2000, pp. 89-104.
  8. Yoichi Funabashi, ‘Asia's Digital Challenge’, Survival, 44, 1, 2002, pp. 135-144.
  9. Nigel Inkster, ‘Chinese Intelligence in the Cyber Age’, Survival, 55, 1, 2013, pp. 45-66.
  10. Paul Cornish, ‘Governing Cyberspace through Constructive Ambiguity’, Survival, 57, 3, 2015, pp. 153-176.
  11. Daniel Moore & Thomas Rid, ‘Cryptopolitik and the Darknet’, Survival, 58, 1, 2016, pp. 7-38.
  12. Ben Buchanan, ‘Cryptography and Sovereignty’, Survival, 58, 5, 2016, pp. 95-122.
  13. Nigel Inkster, ‘Measuring Military Cyber Power’, Survival, 59, 4, 2017, pp. 27-34.
  14. Travis Sharp, ‘Hiding in Plain Sight: Political Effects of Cyber Operations’, Survival, 60, 6, 2018, pp. 45 – 22.
  15. Marcus Willett, ‘Assessing Cyber Power’, Survival, 61, 1, 2019, pp. 85-90.
  16. Alex Grigsby, ‘The End of Cyber Norms’, Survival, 59, 6, 2017, pp. 109-122.
  17. Volume 2

    Part 3: Cyber Security

  18. Christopher Hughes, ‘Google and the Great Firewall’, Survival, 52, 2, 2010, pp. 19-26.
  19. Nigel Inkster, ‘China in Cyberspace’, Survival, 52, 4, 2010, pp. 55-66.
  20. François Heisbourg, ‘Leaks and Lessons’, Survival, 53, 1, 2011, pp. 207-215.
  21. Eneken Tikk-Ringas, ‘Ten Rules for Cyber Security’, Survival, 53, 3, 2011, pp. 119-132.
  22. W. Alexander Vacca, ‘Military Culture and Cyber Security’, Survival, 53, 6, 2011, pp. 159-176.
  23. Christopher Bronk, Cody Monk & John Villasenor, ‘The Dark Side of Cyber Finance’, Survival, 54, 2, 2012, pp. 129-142.
  24. Christopher Bronk & Eneken Tikk-Ringas, ‘The Cyber Attack on Saudi Aramco’, Survival, 55, 2, 2013, pp. 81-96.
  25. Nigel Inkster, ‘Cyber Attacks in La-La Land’, Survival, 57, 1, 2015, pp. 105-116.
  26. Ben Buchanan, ‘The Life Cycles of Cyber Threats’, Survival, 58, 1, 2016, pp. 39-58.
  27. Nigel Inkster, ‘Information Warfare and the US Presidential Election’, Survival, 58, 5, 2016, pp. 23-32.
  28. Yu-Min Joo & Teck-Boon Tan, ‘Smart Cities: A New Age of Digital Insecurity’, Survival, 60, 2, 2018, pp. 91-2016.
  29. Part 4: Cyber Warfare

  30. James Farwell & Rafal Rohozinski, ‘Stuxnet and the Future of Cyber War’, Survival, 53, 1, 2011, pp. 23-40.
  31. Alexander Klimburg, ‘Mobilising Cyber Power’, Survival, 53, 1, 2011, pp. 41-60.
  32. James Farwell & Rafal Rohozinski, ‘The New Reality of Cyber War’, Survival, 54, 4, 2012, pp. 107-120.
  33. David Gompert & Martin Libicki, ‘Cyber Warfare and Sino-American Crisis Instability’, Survival, 56, 4, 2014, pp. 7-22.
  34. Lawrence Cavaiola, David Gompert & Martin Libicki, ‘Cyber House Rules: On War, Retaliation and Escalation’, Survival, 57, 1, 2015, pp. 81-104.
  35. David Gompert & Martin Libicki, ‘Waging Cyber War the American Way’, Survival, 57, 4, 2015, pp. 7-28.
  36. Elinor Sloan, ‘Robotics at War’, Survival, 57, 5, 2015, pp. 107-120.
  37. Michael Fischerkeller, ‘Incorporating Offensive Cyber Operations into Conventional Deterrence Strategies’, Survival, 59, 1, 2017, pp. 103-134.
  38. Jürgen Altmann & Frank Sauer, ‘Autonomous Weapon Systems and Strategic Stability’, Survival, 59, 5, 2017, pp. 117-142.
  39. Sergei Boeke and Dennis Broeders, ‘The Demilitarisation of Cyber conflict’, Survival, 60, 6, 2018, pp. 73-89.

Index

About the Editor

Edited by the International Institute of Strategic Studies

About the Series

Critical Themes in Contemporary Security

Learn more…

Subject Categories

BISAC Subject Codes/Headings:
POL000000
POLITICAL SCIENCE / General