Jump to ContentJump to Main Navigation

You are looking at 1-18 of 18 items

  • Keywords: Cybersecurity x
Clear All Modify Search

View:

The Power of Resilience: How the Best Companies Manage the Unexpected

Yossi Sheffi

Published in print:
2015
Published Online:
May 2016
ISBN:
9780262029797
eISBN:
9780262330626
Item type:
book
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262029797.001.0001
Subject:
Economics and Finance, Financial Economics

This book focuses on deep-tier risks, corporate social responsibility risks, cybersecurity risks, global raw material risks, long-term disruptions, business continuity planning, risk and disruption ... More


The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Ben Buchanan

Published in print:
2017
Published Online:
June 2017
ISBN:
9780190665012
eISBN:
9780190686543
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190665012.001.0001
Subject:
Political Science, Security Studies

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on ... More


Fix IT: See and solve the problems of digital healthcare

Harold Thimbleby

Published in print:
2021
Published Online:
November 2021
ISBN:
9780198861270
eISBN:
9780191893339
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198861270.001.0001
Subject:
Public Health and Epidemiology, Public Health, Epidemiology

We can’t get healthcare without computers. This book shows that digital healthcare is riskier than you thought. Until digital healthcare improves, digital risk means that patients will be harmed ... More


Big Data, Cyber Security and Liberty

Jin Ree Lee and Thomas J. Holt

in The Pre-Crime Society: Crime, Culture and Control in the Ultramodern Age

Published in print:
2021
Published Online:
January 2022
ISBN:
9781529205251
eISBN:
9781529205299
Item type:
chapter
Publisher:
Policy Press
DOI:
10.1332/policypress/9781529205251.003.0019
Subject:
Sociology, Law, Crime and Deviance

Big data, generally defined as voluminous datasets that cannot be processed by traditional information technology within a tolerable time, is increasingly used by both industry personnel and academic ... More


Accumulation and Repression

Dan Schiller

in Digital Depression: Information Technology and Economic Crisis

Published in print:
2014
Published Online:
April 2017
ISBN:
9780252038761
eISBN:
9780252096716
Item type:
chapter
Publisher:
University of Illinois Press
DOI:
10.5406/illinois/9780252038761.003.0014
Subject:
Society and Culture, Technology and Society

This chapter examines concerns regarding the internet's strategic vulnerabilities and the challenges to the longstanding U.S. approach to global internet governance both from within and without. The ... More


Teaching Terrorism: Inside the Homeland Security Program

Nicole Nguyen

in A Curriculum of Fear: Homeland Security in U.S. Public Schools

Published in print:
2016
Published Online:
May 2017
ISBN:
9780816698264
eISBN:
9781452955209
Item type:
chapter
Publisher:
University of Minnesota Press
DOI:
10.5749/minnesota/9780816698264.003.0005
Subject:
Education, Educational Policy and Politics

The fourth chapter looks in-depth at Milton’s curriculum to investigate how the Homeland Security program centered on threat and insecurity by exploring topics such as agro-terrorism, bio-terrorism, ... More


Safe and secure

Harold Thimbleby

in Fix IT: See and solve the problems of digital healthcare

Published in print:
2021
Published Online:
November 2021
ISBN:
9780198861270
eISBN:
9780191893339
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198861270.003.0017
Subject:
Public Health and Epidemiology, Public Health, Epidemiology

Cybersecurity is a serious problem for all computers and digital systems. In healthcare, patient safety is paramount, but in the wider world security has a higher profile than safety. Both have ... More


What Do I Need to Know About Cyber Frameworks, Standards, and Laws?

Gregory Falco and Eric Rosenbach

in Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity

Published in print:
2022
Published Online:
November 2021
ISBN:
9780197526545
eISBN:
9780197526576
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780197526545.003.0004
Subject:
Business and Management, Information Technology

The question “What do I need to know about cyber frameworks, standards, and laws?” distills the complex landscape of cyber risk laws, requirements, and standards. The chapter begins with a case study ... More


Introduction

Ben Buchanan

in The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Published in print:
2017
Published Online:
June 2017
ISBN:
9780190665012
eISBN:
9780190686543
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190665012.003.0001
Subject:
Political Science, Security Studies

The introduction lays out the core argument of the book: that the security dilemma—the unintentional way in which states can threaten other states—applies to cyber operations. It demonstrates that ... More


The Failure of Traditional Mitigations

Ben Buchanan

in The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Published in print:
2017
Published Online:
June 2017
ISBN:
9780190665012
eISBN:
9780190686543
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190665012.003.0006
Subject:
Political Science, Security Studies

This chapter shows how the canonical international relations literature fails to solve the cybersecurity dilemma. The mitigations that had previously been outlined no longer work on the new problems ... More


Information Distribution and the Status Quo

Ben Buchanan

in The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Published in print:
2017
Published Online:
June 2017
ISBN:
9780190665012
eISBN:
9780190686543
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190665012.003.0007
Subject:
Political Science, Security Studies

While the last chapter showed how past mitigations to the security dilemma do not work in cybersecurity, this one goes further, showing that in some ways the cybersecurity dilemma is harder to solve ... More


Limitations, Objections, and the Future of the Cybersecurity Dilemma

Ben Buchanan

in The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Published in print:
2017
Published Online:
June 2017
ISBN:
9780190665012
eISBN:
9780190686543
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190665012.003.0008
Subject:
Political Science, Security Studies

This chapter considers three counterarguments to the cybersecurity dilemma logic. It shows that even if the cybersecurity threat does not pose an existential risk, it is vitally important and can ... More


Mitigating the Cybersecurity Dilemma

Ben Buchanan

in The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Published in print:
2017
Published Online:
June 2017
ISBN:
9780190665012
eISBN:
9780190686543
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190665012.003.0009
Subject:
Political Science, Security Studies

This chapter considers how the cybersecurity dilemma can be mitigated. It considers the ways in which states can act unilaterally to improve their baseline defenses, can form bilateral partnerships ... More


Conclusion: The Dangers of the Cybersecurity Dilemma

Ben Buchanan

in The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Published in print:
2017
Published Online:
June 2017
ISBN:
9780190665012
eISBN:
9780190686543
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190665012.003.0010
Subject:
Political Science, Security Studies

The conclusion recapitulates the argument of the book. It shows as well the stakes of the problem, describing the damage that can flow from an unchecked cybersecurity dilemma. It shows how the ... More


Article 25 Data protection by design and by default

Lee A. Bygrave

in The EU General Data Protection Regulation (GDPR): A Commentary

Published in print:
2020
Published Online:
March 2021
ISBN:
9780198826491
eISBN:
9780191932267
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198826491.003.0060
Subject:
Law, EU Law

Article 4(5) (Definition of ‘pseudonymisation’) (see too recital 28); Article 5(2) (Accountability) (see too recital 11); Article 6(4)(e) (Compatibility); Article 22 (Automated individual ... More


Article 33 Notification of a personal data breach to the supervisory authority

Cédric Burton

in The EU General Data Protection Regulation (GDPR): A Commentary

Published in print:
2020
Published Online:
March 2021
ISBN:
9780198826491
eISBN:
9780191932267
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198826491.003.0069
Subject:
Law, EU Law

Recital 88; Article 4(12) (Definition of a personal data breach); Article 5(2)) (Accountability principle); Article 28(3)(f) (Processor); Article 32 (security of processing); Article 34 ... More


Article 34 Communication of a personal data breach to the data subject

Cédric Burton

in The EU General Data Protection Regulation (GDPR): A Commentary

Published in print:
2020
Published Online:
March 2021
ISBN:
9780198826491
eISBN:
9780191932267
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198826491.003.0070
Subject:
Law, EU Law

Article 4(12) (Definition of a personal data breach); Article 23(1) (Restriction of communication obligation by EU Member States) (see too recital 73); Article 28(3)(f) (Processor); Article 32 ... More


Article 42 Certification

Ronald Leenes

in The EU General Data Protection Regulation (GDPR): A Commentary

Published in print:
2020
Published Online:
March 2021
ISBN:
9780198826491
eISBN:
9780191932267
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198826491.003.0081
Subject:
Law, EU Law

Article 5(2) (Principle of accountability); Article 24(3) (Responsibility of the controller); Article 25(3) (Data protection by design and by default); Article 28(5) (Responsibilities of the ... More


View: