Law, policy, and technology: Cyberterrorism, information warfare, and internet immobilization

Pauline C. Reich, Eduardo Gelbstein

Research output: Book/ReportBook

1 Citation (Scopus)

Abstract

In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

Original languageEnglish
PublisherIGI Global
Number of pages496
ISBN (Print)9781615208319
DOIs
Publication statusPublished - 2012

Fingerprint

Critical infrastructures
Military operations
Information technology
Information systems
Internet

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Law, policy, and technology : Cyberterrorism, information warfare, and internet immobilization. / Reich, Pauline C.; Gelbstein, Eduardo.

IGI Global, 2012. 496 p.

Research output: Book/ReportBook

Reich, Pauline C. ; Gelbstein, Eduardo. / Law, policy, and technology : Cyberterrorism, information warfare, and internet immobilization. IGI Global, 2012. 496 p.
@book{57c218ec74e14db88c853fa3f26ee3e4,
title = "Law, policy, and technology: Cyberterrorism, information warfare, and internet immobilization",
abstract = "In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.",
author = "Reich, {Pauline C.} and Eduardo Gelbstein",
year = "2012",
doi = "10.4018/978-1-61520-831-9",
language = "English",
isbn = "9781615208319",
publisher = "IGI Global",

}

TY - BOOK

T1 - Law, policy, and technology

T2 - Cyberterrorism, information warfare, and internet immobilization

AU - Reich, Pauline C.

AU - Gelbstein, Eduardo

PY - 2012

Y1 - 2012

N2 - In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

AB - In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

UR - http://www.scopus.com/inward/record.url?scp=84898259726&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84898259726&partnerID=8YFLogxK

U2 - 10.4018/978-1-61520-831-9

DO - 10.4018/978-1-61520-831-9

M3 - Book

SN - 9781615208319

BT - Law, policy, and technology

PB - IGI Global

ER -