Information Technology for Peace and Security e-bog
288,10 DKK
(inkl. moms 360,12 DKK)
This book offers an introduction to Information Technology with regard to peace, conflict, and security research, a topic that it approaches from natural science, technical and computer science perspectives. Following an initial review of the fundamental roles of IT in connection with peace, conflict and security, the contributing authors address the rise of cyber conflicts via information warf...
E-bog
288,10 DKK
Forlag
Springer Vieweg
Udgivet
12 marts 2019
Genrer
Peace studies and conflict resolution
Sprog
English
Format
pdf
Beskyttelse
LCP
ISBN
9783658256524
This book offers an introduction to Information Technology with regard to peace, conflict, and security research, a topic that it approaches from natural science, technical and computer science perspectives. Following an initial review of the fundamental roles of IT in connection with peace, conflict and security, the contributing authors address the rise of cyber conflicts via information warfare, cyber espionage, cyber defence and Darknets. The book subsequently explores recent examples of cyber warfare, including:* The Stuxnet attack on Iran's uranium refining capability* The hacking of the German Federal Parliament's internal communication system* The Wannacry malware campaign, which used software stolen from a US security agency to launch ransomware attacks worldwideThe book then introduces readers to the concept of cyber peace, including a discussion of confidence and security-building measures. A section on Cyber Arms Control draws comparisons to global efforts to control chemical warfare, to reduce the risk of nuclear war, and to prevent the militarization of space. Additional topics include the security of critical information infrastructures, and cultural violence and peace in social media. The book concludes with an outlook on the future role of IT in peace and security.Information Technology for Peace and Security breaks new ground in a largely unexplored field of study, and offers a valuable asset for a broad readership including students, educators and working professionals in computer science, IT security, peace and conflict studies, and political science.