13 Items

Book - Oxford University Press

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

    Author:
  • Ben Buchanan
| February 2017

In this book, Cyber Security Project Fellow Dr. Ben Buchanan shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.

Book - Rowman & Littlefield Publishers, Inc.

Cyber Insecurity: Navigating the Perils of the Next Information Age

| October 2016

In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future.

Book Chapter

Creating a Secure Network: The 2001 Anthrax Attacks and the Transformation of Postal Security

| June 2014

The author critically examines the creation and implementation of new security standards within the postal network after the 2001 anthrax attack. Drawing on research conducted at the Smithsonian Institution and documents obtained under the Freedom of Information Act (FOIA), the article traces the politics inscribed within the architecture of new security technologies. The article sets debates about postal security within a broader account of political economy. The article emphasizes the possibilities and limitations of disasters to create moments of disruption and undergird new political interventions.

Book Chapter

Technology and the Reinvention of Education in Africa

| February 2014

"...More recently, the MOOC promise has come under scrutiny as early evidence of its impact started to emerge. The rate of completion of MOOC-based courses was surprising low and their pedagogic contributions became uncertain. The evaluations, however, have failed to distinguish between the dynamics of early euphoric adopters and long-trends in technological innovation. There is a possibility that the MOOC revolution will follow the pattern of mobile phone adoption, favoring poor countries with outdated educational infrastructure and technology."

Book - IOS Press

Best Practices in Computer Network Defense: Incident Detection and Response

| February 2014

The cyber security of vital infrastructure and services has become a major concern for countries worldwide. The members of NATO are no exception, and they share a responsibility to help the global community to strengthen its cyber defenses against malicious cyber activity. This book presents 10 papers and 21 specific findings from the NATO Advanced Research Workshop (ARW) "Best Practices in Computer Network Defense (CND): Incident Detection and Response", held in Geneva, Switzerland, in September 2013.

Book Chapter

Preliminary Considerations: On National Cyber Security

| December 2012

In this chapter, Melissa Hathaway and Alexander Klimburg introduce three conceptual tools to help focus the strategic context and debate. These are termed the "three dimensions," the "five mandates," and the "five dilemmas" of national cyber security. Each dimension, mandate and dilemma will play a varying role in each nation's attempt to formulate and execute a national cyber security strategy according to their specific conditions.

Book - Yale University Press

Captive Audience: The Telecom Industry and Monopoly Power in the New Gilded Age

| January 2013

This important book by leading telecommunications policy expert Susan Crawford explores why Americans are now paying much more but getting much less when it comes to high-speed Internet access. Using the 2011 merger between Comcast and NBC Universal as a lens, Crawford examines how we have created the biggest monopoly since the breakup of Standard Oil a century ago. In the clearest terms, this book explores how telecommunications monopolies have affected the daily lives of consumers and America's global economic standing.

Book Chapter

Falling Prey to Cybercrime: Implications for Business and the Economy

| February 2012

As American businesses, inventors, and artists market, sell, and distribute their products worldwide via the Internet, the threat from criminals and criminal organizations who want to profit illegally from their hard work grows. The threat from other nations wanting to jump start their industries without making the intellectual investment is even more disturbing. This fleecing of America must stop. We can no longer afford complacency and silence—we must find and use as many market levers as possible to change the path we are on.