Power and Security in the Information Age: Investigating the Role of the State in CyberspaceMyriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may be on the growing importance of information technology today, agreement is far more elusive when it comes to pinning down the impact of this development on security issues.This volume focuses on the role of the state in defending against cyber-threats and in securing the information age. The notion that is most uncritically accepted within the overall information security debate is that state power is eroding due to the effects of information and communication technology and that the state is unable to provide security in the information age. This volume challenges the unidimensionality of this statement. Without denying that new challenges for the state have arisen, authors in this volume argue that too much credence is often given to the spectre of an erosion of sovereignty.Written by scholars in international relations, the manuscript is captivating with the significance and actuality of the issues discussed, and the logical, knowledgeable, and engaged manner of presenting the issues. The essays intrigue and provoke with a number of fresh hypotheses, observations, and suggestions and contribute to mapping the diverse layers, actors, approaches, and policies of the cybersecurity realm. |
Contents
Information Power and Security An Outline of Debates and Implications | 1 |
2 Is Anything Ever New? Exploring the Specificities of Security and Governance in the Information Age | 19 |
3 Metapower Networks Security and Commerce | 45 |
Thoughts on Physical Space and Digital Space | 67 |
5 Terrorist Use of the Internet and the Challenges of Governing Cyberspace | 95 |
Other editions - View all
Common terms and phrases
11 September accessed 19 February actors analysis anonymity attacks Cambridge challenges companies complexity concept Conflict content control Critical Information Infrastructure Critical Infrastructure Protection cultural Cyber cyber-security cyber-terrorism cyber-threats cyberspace Deibert economic Emerging environment example firms global information Global Politics groups hackers identity Impacts and Consequences implications Information Age Information Infrastructure Protection information networks Information Operations information revolution information security Information Society information technologies Information Warfare information-sharing associations institutions interactions International Relations International Security International Studies international system Internet Governance ISACs issues John Arquilla John Perry Barlow Journal meta-power military Myriam Dunn nation-states national security organisations Papp placeless-ness hypothesis potential Research RFID risk Rosenau Santa Monica security breaches Security Studies September 2001 sharing SMEs social soft power Strategy surveys territorial Terrorism terrorist threats Toffler traditional transformation University Press vulnerabilities WARPs Washington D.C. websites World Politics York