Coverart for item
The Resource Semi-state actors in cybersecurity, Florian J. Egloff

Semi-state actors in cybersecurity, Florian J. Egloff

Label
Semi-state actors in cybersecurity
Title
Semi-state actors in cybersecurity
Statement of responsibility
Florian J. Egloff
Creator
Author
Subject
Language
eng
Summary
"What does the global telecommunications company Huawei, a hacking-for-hire outfit in India, and Russian cyber criminals have in common? They all share a special relationship to the state, which significantly shapes the politics of cyber(in-)security. The relationships between these actors and states are complex and constantly evolving, yet not well understood. Semi-State Actors in Cybersecurity provides an insightful theoretical and empirical analysis of the political challenges raised through the interaction between such semi-state actors and states. The book uses a historical analogy to pirates, privateers, and mercantile companies to uncover the political constitution and interaction of cybercrime, state-sponsored hackers, and large technology companies. Drawing on historical archival sources and innovative theory, it identifies the parallels between today's cyber(in-)security and the historical quest for gold and glory on the high seas during the 16th - 19th centuries. The book explains what the co-presence of semi-state actors means for national and international security and shows that the proximity to the state in these relationships is a key determinant of cyber(in-)security. Through so doing, it clarifies how semi-state actors were historically and contemporarily linked to understandings of statehood, sovereignty, and the legitimacy of the state. Semi-State Actors in Cybersecurity offers insights with regard to the political use of state proximity by attackers and defenders, state collaboration with cyber criminals, and the cooperative and conflictive relations of large technology companies to the state. This offers a fresh perspective for understanding the international politics of cyber(in-)security"--
Assigning source
Provided by publisher
Cataloging source
DLC
http://library.link/vocab/creatorName
Egloff, Florian J.
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/subjectName
  • Computer crimes
  • Computer security
  • Non-state actors (International relations)
  • Cyberspace operations (Military science)
  • Criminalité informatique
  • Sécurité informatique
  • Acteurs non étatiques (Relations internationales)
  • Cyberguerre (Science militaire)
  • Computer crimes
  • Computer security
  • Cyberspace operations (Military science)
  • Non-state actors (International relations)
Label
Semi-state actors in cybersecurity, Florian J. Egloff
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Using a historical analogy as a research strategy: histories of the sea and cyberspace, comparison, and locating the analogy in time -- History of the loosely governed sea between the 16th-19th century: from the age of privateering to its abolition -- Brief history of cyberspace: origins and development of (in-)security in cyberspace -- The sea and cyberspace: comparison and analytical lines of inquiry applying the analogy to cybersecurity -- Cyber pirates and privateers: state proxies, criminals, and independent patriotic hackers -- Cyber mercantile companies conflict and cooperation
Control code
1263022740
Dimensions
25 cm
Extent
286 pages
Isbn
9780197579275
Lccn
2021037341
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
(OCoLC)1263022740
Label
Semi-state actors in cybersecurity, Florian J. Egloff
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Using a historical analogy as a research strategy: histories of the sea and cyberspace, comparison, and locating the analogy in time -- History of the loosely governed sea between the 16th-19th century: from the age of privateering to its abolition -- Brief history of cyberspace: origins and development of (in-)security in cyberspace -- The sea and cyberspace: comparison and analytical lines of inquiry applying the analogy to cybersecurity -- Cyber pirates and privateers: state proxies, criminals, and independent patriotic hackers -- Cyber mercantile companies conflict and cooperation
Control code
1263022740
Dimensions
25 cm
Extent
286 pages
Isbn
9780197579275
Lccn
2021037341
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
(OCoLC)1263022740

Library Locations

    • Ladd LibraryBorrow it
      48 Campus Ave, Lewiston, ME, 04240, US
      44.105245 -70.203443