Introduction |
|
ix | |
|
|
|
|
Chapter 1 The "Science" of Cybersecurity in the Human and Social Sciences: Issues and Reflections |
|
|
1 | (24) |
|
|
|
1 | (3) |
|
|
4 | (7) |
|
|
11 | (5) |
|
1.4 One or more definition(s)? |
|
|
16 | (4) |
|
|
20 | (1) |
|
|
21 | (4) |
|
Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity |
|
|
25 | (42) |
|
|
|
25 | (2) |
|
|
27 | (16) |
|
2.2.1 What is a definition? |
|
|
27 | (2) |
|
2.2.2 Usefulness of definitions |
|
|
29 | (1) |
|
2.2.3 Rules for constructing definitions |
|
|
29 | (3) |
|
2.2.4 Definitions of cybersecurity |
|
|
32 | (11) |
|
|
43 | (5) |
|
2.3.1 What is a typology? |
|
|
44 | (1) |
|
2.3.2 Usefulness of typologies |
|
|
44 | (1) |
|
2.3.3 Rules for the construction of typologies |
|
|
45 | (1) |
|
2.3.4 Cybersecurity typologies |
|
|
46 | (2) |
|
|
48 | (3) |
|
2.4.1 What is a taxonomy? |
|
|
48 | (1) |
|
2.4.2 Usefulness of taxonomy |
|
|
49 | (1) |
|
2.4.3 Rules for the construction of taxonomies |
|
|
49 | (1) |
|
2.4.4 Taxonomies of cybersecurity |
|
|
50 | (1) |
|
|
51 | (5) |
|
|
52 | (1) |
|
2.5.2 Usefulness of ontologies |
|
|
53 | (1) |
|
2.5.3 Rules for construction of ontologies |
|
|
53 | (1) |
|
2.5.4 Cybersecurity ontologies |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
57 | (10) |
|
Chapter 3 Cybersecurity and Data Protection - Research Strategies and Limitations in a Legal and Public Policy Perspective |
|
|
67 | (18) |
|
|
|
67 | (1) |
|
3.2 Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? |
|
|
68 | (6) |
|
3.2.1 Potential tensions between cybersecurity and data protection |
|
|
69 | (3) |
|
3.2.2 Potential synergies between cybersecurity and data protection |
|
|
72 | (2) |
|
3.3 Methodological approaches and challenges for the study of cybersecurity - legal and public policy perspectives |
|
|
74 | (6) |
|
3.3.1 Legal interpretation and comparison as methodological approaches to the study of cybersecurity |
|
|
74 | (3) |
|
3.3.2 Public policy approaches to the study of cybersecurity |
|
|
77 | (1) |
|
3.3.3 Transdisciplinary synergies between legal and public policy perspectives |
|
|
78 | (2) |
|
3.4 Conclusion and outlook |
|
|
80 | (1) |
|
|
81 | (4) |
|
Chapter 4 Researching State-sponsored Cyber-espionage |
|
|
85 | (38) |
|
|
4.1 Defining cybersecurity and cyber-espionage |
|
|
85 | (2) |
|
4.2 Taxonomies of cyber-threats |
|
|
87 | (1) |
|
4.3 The structure of this chapter |
|
|
88 | (2) |
|
4.4 The significance of state-sponsored cyber-espionage |
|
|
90 | (4) |
|
4.5 Research themes in state-sponsored cyber-espionage |
|
|
94 | (4) |
|
4.6 Theorizing state-sponsored cyber-espionage in the social sciences |
|
|
98 | (6) |
|
4.7 Research methodologies into state-sponsored cyber-espionage |
|
|
104 | (2) |
|
4.8 Intellectual precision and objectivity in state-sponsored cyber-espionage research |
|
|
106 | (4) |
|
4.9 Detecting state actors in cyber-espionage research |
|
|
110 | (2) |
|
4.10 Identifying specific state actors in cyber-espionage research |
|
|
112 | (4) |
|
4.11 Conclusion: researching a transformational subject |
|
|
116 | (2) |
|
|
118 | (5) |
|
Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk |
|
|
123 | (30) |
|
|
|
|
123 | (1) |
|
5.2 The scientific approach to move from uncertainty to risk |
|
|
124 | (2) |
|
5.3 Learning about the data: the exploratory phase |
|
|
126 | (2) |
|
|
128 | (2) |
|
5.5 Statistical exploration on the various variables of the dataset |
|
|
130 | (4) |
|
5.6 Univariate modeling for the relevant variables |
|
|
134 | (5) |
|
5.7 Multivariate and dynamic modeling |
|
|
139 | (10) |
|
5.7.1 A fast-changing environment: time dependency |
|
|
140 | (3) |
|
|
143 | (4) |
|
5.7.3 Models for prediction |
|
|
147 | (2) |
|
|
149 | (2) |
|
|
151 | (1) |
|
|
151 | (2) |
|
Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research |
|
|
153 | (32) |
|
|
|
|
153 | (1) |
|
|
154 | (1) |
|
6.2 Information warfare and cybersecurity |
|
|
154 | (2) |
|
6.3 Researching information warfare and cybersecurity |
|
|
156 | (1) |
|
6.4 Qualitative research methodologies for information warfare and cybersecurity |
|
|
157 | (4) |
|
6.4.1 Clustering of documents |
|
|
159 | (1) |
|
6.4.2 Clustering of words |
|
|
159 | (1) |
|
6.4.3 Word frequencies and word clouds |
|
|
159 | (1) |
|
6.4.4 Text search and word trees |
|
|
159 | (1) |
|
6.4.5 Example use cases of qualitative document analysis |
|
|
160 | (1) |
|
6.5 An analysis of national cybersecurity strategies |
|
|
161 | (8) |
|
6.5.1 Selection process for the documents |
|
|
161 | (1) |
|
|
162 | (5) |
|
|
167 | (2) |
|
6.6 An analysis of the alignment of South Africa's Cybercrimes Bill to international legislation |
|
|
169 | (7) |
|
6.6.1 Background to the documents |
|
|
169 | (1) |
|
|
170 | (4) |
|
|
174 | (2) |
|
6.7 An analysis of the influence of classical military philosophy on seminal information warfare texts |
|
|
176 | (1) |
|
6.8 Reflections on qualitative document analysis for information warfare and cybersecurity research |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
180 | (5) |
|
Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France |
|
|
185 | (26) |
|
|
|
185 | (2) |
|
7.2 Localization of an online field |
|
|
187 | (7) |
|
7.2.1 Online ethnographic work and empathy |
|
|
192 | (1) |
|
7.2.2 Cybersecurity issues of an online field |
|
|
193 | (1) |
|
7.3 Online-offline continuum |
|
|
194 | (5) |
|
7.4 Continuum between security and insecurity |
|
|
199 | (5) |
|
|
204 | (1) |
|
|
205 | (6) |
List of Authors |
|
211 | (2) |
Index |
|
213 | |