The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks.
An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world. Offering practical guidance for addressing contemporary risks, the book is organized into three sections:
Global Trends—considers international e-government trends, includes case studies of common cyber threats and presents efforts of the premier global institution in the field
National and Local Policy Approaches—examines the current policy environment in the United States and Europe and illustrates challenges at all levels of government
Practical Considerations—explains how to prepare for cyber attacks, including an overview of relevant U.S. Federal cyber incident response policies, an organizational framework for assessing risk, and emerging trends
Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective.
The Information Age has dawned at the same time the global political system is in transition. High technology performance and economic productivity are converging across the major developed regions of North America, East Asia, and Europe. If U.S. economic, military, and political leadership is to continue, it must depend more on flexible adaptation to the new technical and organizational realities and less on technological dominance. The heart of this adaptation lies in the evolution of a national technology policy that emphasizes market forces and the exploitation of network linkages within and among commercial and military organizations.
Amazon Price:$54.00 $46.13 You save: $7.87 (15%). (as of April 22, 2018 18:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy.
Cyberattacks–actions intended to damage adversary computer systems or networks–can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Continue reading “Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities”
How do the weak defeat the strong? Ivan Arreguín-Toft argues that, although many factors affect asymmetric conflict outcomes (for example, the relative power of the actors, their weapons technology, and outside support), the interaction of each actor's strategy is the best explanation. Supporting his argument with combined statistical and comparative case study analysis, Arreguín-Toft's strategic interaction theory has implications not only for international relations theorists, but for policy makers grappling with interstate and civil wars, as well as terrorism.
Amazon Price:$70.00 $70.00 (as of April 22, 2018 10:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information.
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.