Power and Security in the Information Age: Investigating the Role of the State in Cyberspace

Front Cover
Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel
Ashgate Publishing, Ltd., 2007 - Political Science - 167 pages
The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may be on the growing importance of information technology today, agreement is far more elusive when it comes to pinning down the impact of this development on security issues.This volume focuses on the role of the state in defending against cyber-threats and in securing the information age. The notion that is most uncritically accepted within the overall information security debate is that state power is eroding due to the effects of information and communication technology and that the state is unable to provide security in the information age. This volume challenges the unidimensionality of this statement. Without denying that new challenges for the state have arisen, authors in this volume argue that too much credence is often given to the spectre of an erosion of sovereignty.Written by scholars in international relations, the manuscript is captivating with the significance and actuality of the issues discussed, and the logical, knowledgeable, and engaged manner of presenting the issues. The essays intrigue and provoke with a number of fresh hypotheses, observations, and suggestions and contribute to mapping the diverse layers, actors, approaches, and policies of the cybersecurity realm.
 

Contents

Information Power and Security An Outline of Debates and Implications
1
2 Is Anything Ever New? Exploring the Specificities of Security and Governance in the Information Age
19
3 Metapower Networks Security and Commerce
45
Thoughts on Physical Space and Digital Space
67
5 Terrorist Use of the Internet and the Challenges of Governing Cyberspace
95
How to Meet the Need for Threat Information
129
The Role of the State in Securing the Information Age Challenges and Prospects
151
Index
163
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information