Muutke küpsiste eelistusi

E-raamat: Cybersecurity in Humanities and Social Sciences: A Research Methods Approach

Edited by (Berlin School of Economics and Law; Berlin Institute for Safety and Security Research, Germany), Edited by (CNRS, Guyancourt, France), Edited by (Université de Sherbrooke, Quebec, Canada)
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 09-Oct-2020
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119777564
  • Formaat - EPUB+DRM
  • Hind: 171,60 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 09-Oct-2020
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119777564

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?
Introduction ix
Daniel Ventre
Hugo Loiseau
Hartmut Aden
Chapter 1 The "Science" of Cybersecurity in the Human and Social Sciences: Issues and Reflections
1(24)
Hugo Loiseau
1.1 Introduction
1(3)
1.2 A method?
4(7)
1.3 Data?
11(5)
1.4 One or more definition(s)?
16(4)
1.5 Conclusion
20(1)
1.6 References
21(4)
Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity
25(42)
Daniel Ventre
2.1 Introduction
25(2)
2.2 Definition
27(16)
2.2.1 What is a definition?
27(2)
2.2.2 Usefulness of definitions
29(1)
2.2.3 Rules for constructing definitions
29(3)
2.2.4 Definitions of cybersecurity
32(11)
2.3 Typology
43(5)
2.3.1 What is a typology?
44(1)
2.3.2 Usefulness of typologies
44(1)
2.3.3 Rules for the construction of typologies
45(1)
2.3.4 Cybersecurity typologies
46(2)
2.4 Taxonomy
48(3)
2.4.1 What is a taxonomy?
48(1)
2.4.2 Usefulness of taxonomy
49(1)
2.4.3 Rules for the construction of taxonomies
49(1)
2.4.4 Taxonomies of cybersecurity
50(1)
2.5 Ontologies
51(5)
2.5.1 What is ontology?
52(1)
2.5.2 Usefulness of ontologies
53(1)
2.5.3 Rules for construction of ontologies
53(1)
2.5.4 Cybersecurity ontologies
54(2)
2.6 Conclusion
56(1)
2.7 References
57(10)
Chapter 3 Cybersecurity and Data Protection - Research Strategies and Limitations in a Legal and Public Policy Perspective
67(18)
Hartmut Aden
3.1 Introduction
67(1)
3.2 Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime?
68(6)
3.2.1 Potential tensions between cybersecurity and data protection
69(3)
3.2.2 Potential synergies between cybersecurity and data protection
72(2)
3.3 Methodological approaches and challenges for the study of cybersecurity - legal and public policy perspectives
74(6)
3.3.1 Legal interpretation and comparison as methodological approaches to the study of cybersecurity
74(3)
3.3.2 Public policy approaches to the study of cybersecurity
77(1)
3.3.3 Transdisciplinary synergies between legal and public policy perspectives
78(2)
3.4 Conclusion and outlook
80(1)
3.5 References
81(4)
Chapter 4 Researching State-sponsored Cyber-espionage
85(38)
Joseph Fitsanakis
4.1 Defining cybersecurity and cyber-espionage
85(2)
4.2 Taxonomies of cyber-threats
87(1)
4.3 The structure of this chapter
88(2)
4.4 The significance of state-sponsored cyber-espionage
90(4)
4.5 Research themes in state-sponsored cyber-espionage
94(4)
4.6 Theorizing state-sponsored cyber-espionage in the social sciences
98(6)
4.7 Research methodologies into state-sponsored cyber-espionage
104(2)
4.8 Intellectual precision and objectivity in state-sponsored cyber-espionage research
106(4)
4.9 Detecting state actors in cyber-espionage research
110(2)
4.10 Identifying specific state actors in cyber-espionage research
112(4)
4.11 Conclusion: researching a transformational subject
116(2)
4.12 References
118(5)
Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk
123(30)
Michel Dacorogna
Marie Kratz
5.1 Introduction
123(1)
5.2 The scientific approach to move from uncertainty to risk
124(2)
5.3 Learning about the data: the exploratory phase
126(2)
5.4 Data cleansing
128(2)
5.5 Statistical exploration on the various variables of the dataset
130(4)
5.6 Univariate modeling for the relevant variables
134(5)
5.7 Multivariate and dynamic modeling
139(10)
5.7.1 A fast-changing environment: time dependency
140(3)
5.7.2 Causal relations
143(4)
5.7.3 Models for prediction
147(2)
5.8 Conclusion
149(2)
5.9 Acknowledgments
151(1)
5.10 References
151(2)
Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research
153(32)
Brett van Niekerk
Trishana Ramluckan
6.1 Introduction
153(1)
6.1.1 Previous research
154(1)
6.2 Information warfare and cybersecurity
154(2)
6.3 Researching information warfare and cybersecurity
156(1)
6.4 Qualitative research methodologies for information warfare and cybersecurity
157(4)
6.4.1 Clustering of documents
159(1)
6.4.2 Clustering of words
159(1)
6.4.3 Word frequencies and word clouds
159(1)
6.4.4 Text search and word trees
159(1)
6.4.5 Example use cases of qualitative document analysis
160(1)
6.5 An analysis of national cybersecurity strategies
161(8)
6.5.1 Selection process for the documents
161(1)
6.5.2 Analysis
162(5)
6.5.3 Discussion
167(2)
6.6 An analysis of the alignment of South Africa's Cybercrimes Bill to international legislation
169(7)
6.6.1 Background to the documents
169(1)
6.6.2 Analysis
170(4)
6.6.3 Discussion
174(2)
6.7 An analysis of the influence of classical military philosophy on seminal information warfare texts
176(1)
6.8 Reflections on qualitative document analysis for information warfare and cybersecurity research
177(2)
6.9 Conclusion
179(1)
6.10 References
180(5)
Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France
185(26)
Elena Waldispuehl
7.1 Introduction
185(2)
7.2 Localization of an online field
187(7)
7.2.1 Online ethnographic work and empathy
192(1)
7.2.2 Cybersecurity issues of an online field
193(1)
7.3 Online-offline continuum
194(5)
7.4 Continuum between security and insecurity
199(5)
7.5 Conclusion
204(1)
7.6 References
205(6)
List of Authors 211(2)
Index 213
Hugo LOISEAU, École de politique appliquée Faculté des lettres et sciences humaines Université de Sherbrooke Quebec Canada.

Daniel VENTRE, CESDIP Laboratory CNRS Guyancourt France.

Hartmut ADEN, Berlin School of Economics and Law Berlin Institute for Safety and Security Research Germany.