Muutke küpsiste eelistusi

E-raamat: Conflicts, Crimes and Regulations in Cyberspace [Wiley Online]

  • Formaat: 240 pages
  • Ilmumisaeg: 14-Jan-2022
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • ISBN-10: 1119885094
  • ISBN-13: 9781119885092
Teised raamatud teemal:
  • Wiley Online
  • Hind: 174,45 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 240 pages
  • Ilmumisaeg: 14-Jan-2022
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • ISBN-10: 1119885094
  • ISBN-13: 9781119885092
Teised raamatud teemal:
The study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies.

This book presents cyberspace as a socio-technical system on an international level. It focuses on state and non-state actors, as well as the study of strategic concepts and norms. Unlike global studies, the socio-technical approach and “meso” scale facilitate the analysis of cyberspace in international relations. This is an area of both collaboration and conflict for which specific modes of regulation have appeared.
Introduction xi
Sebastien-Yves Laurent
Chapter 1 The United States, States and the False Claims of the End of the Global Internet
1(42)
Sebastien-Yves Laurent
1.1 Introduction
1(1)
1.2 The creation of the internet and the development of cyberspace by the United States
2(11)
1.2.1 The first international telecommunications systems developed by all states
3(1)
1.2.2 The creation and development of the internet by the United States
3(1)
1.2.3 International management controlled by the United States
4(6)
1.2.4 A sociotechnical system bearing a composite American ideology
10(1)
1.2.5 The false recomposition of the global sociotechnical system: the global summits on the information society
11(2)
1.3 Cyberspace transformed by the arrival in force of states
13(7)
1.3.1 State intentions in "national strategies": a global approach
14(2)
1.3.2 Russian-American structural disagreements on information security and cybersecurity
16(2)
1.3.3 Discussions on cybersecurity: the symbolic international restoration of the coercive state
18(2)
1.4 Praxis of state coercion in cyberspace
20(9)
1.4.1 Intelligence and surveillance activities in the digital environment
21(3)
1.4.2 Non-military cyber operations
24(2)
1.4.3 Interstate digital conflicts, secrecy and coercive diplomacy
26(3)
1.5 The fragmentation of the global internet and the digital sovereignty of states
29(4)
1.5.1 Linguistic balkanization: Digital Babel
29(2)
1.5.2 Political fragmentation: alternative internets
31(2)
1.6 The strong constraint of interstate cooperation for all states
33(2)
1.6.1 Interstate agreements on an embryo of international law
33(1)
1.6.2 State dependence on international cooperation for cybersecurity
34(1)
1.7 Conclusion
35(1)
1.8 References
36(7)
Chapter 2 Cybersecurity in America: The US National Security Apparatus and Cyber Conflict Management
43(20)
Frederick Gagnon
Alexis Rapin
2.1 Introduction
43(2)
2.2 Societal and institutional dynamics
45(4)
2.3 Organizational and bureaucratic dynamics
49(4)
2.4 Individual dynamics
53(4)
2.5 Conclusion
57(1)
2.6 References
58(5)
Chapter 3 Separation of Offensive and Defensive Functions: The Originality of the French Cyberdefense Model Called into Question?
63(26)
Alix Desforges
3.1 Introduction
63(3)
3.2 A model designed and developed in response to the threats and challenges of the early 2010s
66(9)
3.2.1 An organizational model apparently based on two main actors
66(5)
3.2.2 The commitment to a strict offensive/defensive separation
71(4)
3.3 A strict separation of offensive and defensive functions and missions: an obstacle to better defense?
75(10)
3.3.1 A rapidly changing context: an increasingly significant threat from the most advanced states
76(2)
3.3.2 Limits that have become obstacles to accomplishing cyberdefense missions
78(4)
3.3.3 An institutionalized rapprochement of the actors of defensive and offensive parts in the name of cyberdefense missions: from mitigation to obliteration?
82(3)
3.4 Conclusion
85(1)
3.5 References
86(3)
Chapter 4 The Boundary Between Cybercrime and Cyberwar: An Uncertain No-Man's Land
89(18)
Marc Watin-Augouard
4.1 Introduction
89(2)
4.2 The field of cybercrime up to the limits of the glass ceiling
91(7)
4.2.1 The field of cybercrime: an attempt at delimitation
92(3)
4.2.2 Cybercrime, the "21st century crime"
95(1)
4.2.3 Cyber conflict at the edge of the glass ceiling
95(3)
4.3 War in cyberspace, cyber in war
98(6)
4.3.1 Cyber in war, a daily reality
98(1)
4.3.2 Autonomous warfare in the cyber world: the test of the law of armed conflict
99(3)
4.3.3 Digital cyber persuasion
102(2)
4.4 Conclusion
104(1)
4.5 References
105(2)
Chapter 5 Cyberdefense, the Digital Dimension of National Security
107(10)
Bertrand Warusfel
5.1 Introduction
107(1)
5.2 Cyberdefense in the political and legal framework of digital security
108(3)
5.2.1 A definition of cyberdefense
108(1)
5.2.2 Linking cyberdefense to national security strategy
109(2)
5.3 The emergence of a coherent legal regime for cyberdefense
111(4)
5.3.1 The legal basis of the permanent cyberdefense posture
111(1)
5.3.2 Exceptional instruments for responding to a crisis
112(3)
5.4 Conclusion
115(1)
5.5 References
116(1)
Chapter 6 Omnipresence Without Omnipotence: The US Campaign Against Huawei in the 5G Era
117(30)
Mark Corcoral
6.1 Introduction
117(2)
6.2 The unilateral American offensive against Huawei: a disruptive campaign causing significant collateral damage
119(9)
6.2.1 Huawei: an "unusual and extraordinary" threat to the United States' position in the international order
120(2)
6.2.2 A political, legal and economic offensive against Huawei, causing significant collateral damage
122(6)
6.3 The American diplomatic offensive: the limits of American rhetorical coercion of their partners and allies
128(9)
6.3.1 Educating rather than persuading: an attempt to rhetorically coerce partners and allies
129(2)
6.3.2 Successful agenda setting but limited rhetorical coercion
131(3)
6.3.3 American rhetorical coercion in the special relationship
134(3)
6.4 The anti-Huawei offensive: a barometer of American power?
137(2)
6.5 References
139(8)
Chapter 7 The Issue of Personal and Sovereign Data in the Light of an Emerging "International Law of Intelligence"
147(22)
Fabien Lafouasse
7.1 Introduction
147(3)
7.2 The legal rules invoked in the collection of personal and sovereign data
150(6)
7.2.1 Right to privacy versus general communications surveillance
150(3)
7.2.2 Violation of territorial sovereignty versus cyberespionage
153(3)
7.3 Data localization in the light of international intelligence law
156(7)
7.3.1 Data fluidity versus data storage
156(3)
7.3.2 Datasphere versus international intelligence law
159(4)
7.4 Conclusion
163(1)
7.5 Appendix: the quadrants of intelligence law
164(1)
7.6 Sources and references
165(4)
7.6.1 Sources
165(1)
7.6.2 References
166(3)
Chapter 8 International Cybersecurity Cooperation
169(8)
Guillaume Poupard
8.1 Current attack trends
169(2)
8.2 The multiple paths of international cooperation
171(4)
8.3 The issue of attack attribution
175(2)
Chapter 9 Cyberdefense and Cybersecurity Regulations in the United States: From the Failure of the "Comprehensive Policy" to the Success of the Sectoral Approach
177(22)
Adrien Manniez
9.1 Introduction
177(1)
9.2 The identification of a new threat and the impact of cyber on how US security and defense policies are designed
178(3)
9.3 From the impact of cyber on policy to the impact of politics on cyber
181(9)
9.4 From a comprehensive cyber policy to a sectoral approach: the success of an undeclared regulatory policy
190(5)
9.5 Conclusion
195(1)
9.6 References
196(3)
List of Authors 199(2)
Index 201
Sebastien-Yves Laurent is a Professor working in the Faculty of Law and Political Science at the University of Bordeaux, France. His research is in international relations and security studies, with a particular focus on cyber and digital issues.