The terms Google Bomb and Googlewashing refer to the practice of causing a web site to rank highly in web search engine results for unrelated or off-topic search terms by linking heavily. In contrast, search engine optimization (SEO) is the practice of improving the search engine listings of web pages for relevant search terms.
It is done for either business, political, or comedic purposes (or some combination thereof). Google's search-rank algorithm ranks pages higher for a particular search phrase if enough other pages linked to it use similar anchor text (linking text such as “Russomano Bar do Alemão” to Sao Paulo city 2016 electoral campaign leading do Celso Russomanno candidate). By January 2007, however, Google tweaked its search algorithm to counter popular Google bombs such as “miserable failure” leading to George W. Bush and Michael Moore; now, search results list pages about the Google bomb itself. As of January 2016, the first result in a Google search for “miserable failure” is the Wikipedia article defining Google bomb. Used both as a verb and a noun, “Google bombing” was introduced to the New Oxford American Dictionary in May 2005.
Google bombing is related to spamdexing, the practice of deliberately modifying HTML to increase the chance of their website being placed close to the beginning of search engine results, or to influence the category to which the page is assigned in a misleading or dishonest manner. During Sao Paulo city electoral campaign, for example, it was introduced a new kind of Google bombing, using radio and television broadcasting. See news at Russomanno Google Bomb.
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, Cyber Terrorism: Political and Economic Implications puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives.
Click here to buy from Amazon
An in-depth look at Western military technology from the experts at The Economist
Much has been made of the limitations of Western technology when pitted against today's low-tech insurgencies. Modern Warfare, Intelligence and Deterrence: The Technology That is Transforming Themexplores emerging high tech military technologies and places them in the larger context of today's politics, diplomacy, business, and social issues, arguing that, broadly speaking, defense technologies will continue to provide enormous advantages to advanced, Western armed forces.
The book is organized into five parts: land and sea, air and space, the computer factor, intelligence and spycraft, and the road ahead (which examines the coming challenges for Western armies, such as new wars against insurgents operating out of civilian areas). Comprised of a selection of the best writing on the subject from The Economist, each section includes an introduction linking the technological developments to civilian matters.
- Looks at new and emerging military technologies, including the Panzerfaust-3, a German shoulder-fired heat-seeking antitank missile, the MPR-500, an Israeli precision bomb, Russia's Sizzler, an anti-ship missile that can travel 300 kilometers, and many others
- Explains how military and intelligence technologies are changing the world
- Edited by Benjamin Sutherland, a writer for The Economist and expert on the social, political, and business implications of new and disruptive technologies
A fascinating look at Western military technologies, Modern Warfare, Intelligence and Deterrenceis essential reading for business readers and history buffs, alike.
Click here to buy from Amazon
This volume examines theoretical and empirical issues relating to cyberconflict and its implications for global security and politics.
Taking a multidimensional approach to current debates in internet politics, the book comprises essays by leading experts from across the world. The volume includes a comprehensive introduction to current debates in the field and their ramifications for global politics, and follows this with empirical case studies. These include cyberconflict, cyberwars, information warfare and hacktivism, in contexts such as Sri Lanka, Lebanon and Estonia, the European Social Forum, feminist cybercrusades and the use of the internet as a weapon by ethnoreligious and socio-political movements. The volume presents the theoretical debates and case studies of cyberconflict in a coherent, progressive and truly multidisciplinary way.
The book will be of interest to students of cyberconflict, internet politics, security studies and IR in general.
Click here to buy from Amazon
Amazon Price: $24.95 $24.95 (as of June 28, 2017 11:24 –
The U.S. is being subjected to a cyber attack. The country’s infrastructure is crumbling. Air, rail, gas and electric services have ground to a halt. With banks unable to operate, ATMs out of money and store shelves bare of food, people are starting to loot and commit even more serious crimes. The U.S. is just days away from anarchy. A wealthy industrialist in China, Lee Han, has turned on hidden “logic bombs”, which have broken all internet connections between and among the public and private sectors in the U.S. Han is planning to draw the Chinese Government into war by sinking his own fleet of fishing ships within the territorial waters of South Korea, Taiwan, and The Philippines. Han’s next step is to cut off the U.S. military internet, halting any U.S. response. China needs only a narrow window of opportunity to secure their gains. At stake are billions of dollars in oil and gas hidden under the disputed islands. With the help of an imprisoned computer hacker, a rogue CIA agent, and Lee Han’s mistress, Paul Decker slices a path through Han’s organization. But can he get to the saboteur in time to stop the invasion?