Showing 1 - 8 of 8
With the Russian government hack of the Democratic National Convention email servers, and further leaks expected over the coming months that could influence an election, the drama of the 2016 U.S. presidential race highlights an important point: Nefarious hackers do not just pose a risk to...
Persistent link: https://www.econbiz.de/10014124891
Persistent link: https://www.econbiz.de/10002538407
"Biotraffic delves into the complex world of biological resource trade, taking readers inside the contemporary Ciskei region of South Africa, a once-notorious apartheid 'homeland' turned extractive hub for wild medicinal plants. Drawing from in-depth ethnographic fieldwork and archival research,...
Persistent link: https://www.econbiz.de/10014560265
Despite recent work challenging offense dominance in cyberspace, scholars and policymakers still view offensive operations as dominating defense. Why do these sides come to very different conclusions about the nature and utility of offensive cyber capabilities? Disagreements are due to a poor...
Persistent link: https://www.econbiz.de/10012982200
Internet Security Governance covers the policy challenges that arise from building and governing security in the Internet’s architecture and key protocols. It includes the discussion of defensively oriented technical and legal topics that cross national boundaries and/or involve security of...
Persistent link: https://www.econbiz.de/10014131844
Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes...
Persistent link: https://www.econbiz.de/10014134844
Persistent link: https://www.econbiz.de/10003816397
Persistent link: https://www.econbiz.de/10011480924