Managing cyber attacks in international law, business, and relations : in search of cyber peace
Resource Information
The work Managing cyber attacks in international law, business, and relations : in search of cyber peace represents a distinct intellectual or artistic creation found in Biddle Law Library - University of Pennsylvania Law School. This resource is a combination of several types including: Work, Language Material, Books.
The Resource
Managing cyber attacks in international law, business, and relations : in search of cyber peace
Resource Information
The work Managing cyber attacks in international law, business, and relations : in search of cyber peace represents a distinct intellectual or artistic creation found in Biddle Law Library - University of Pennsylvania Law School. This resource is a combination of several types including: Work, Language Material, Books.
- Label
- Managing cyber attacks in international law, business, and relations : in search of cyber peace
- Title remainder
- in search of cyber peace
- Statement of responsibility
- Scott J. Shackelford, JD, PHD, Kelley School of Business, Indiana University
- Title variation
- Managing Cyber Attacks in International Law, Business, & Relations
- Language
- eng
- Summary
- This book presents a framework to reconceptualize internet governance and better manage cyber attacks. It examines the potential of polycentric regulation to increase accountability through bottom-up action. It also provides a synthesis of the current state of cybersecurity research, bringing features of cyber attacks to light and comparing and contrasting the threat to all relevant stakeholders. Throughout the book, cybersecurity is treated holistically, covering issues in law, science, economics and politics. This interdisciplinary approach is an exemplar of how strategies from different disciplines as well as the private and public sectors may cross-pollinate to enhance cybersecurity. Case studies and examples illustrate what is at stake and identify best practices. The book discusses technical issues of Internet governance and cybersecurity while presenting the material in an informal, straightforward manner. The book is designed to inform readers about the interplay of Internet governance and cybersecurity and the potential of polycentric regulation to help foster cyber peace
- Cataloging source
- UkCbUP
- Index
- index present
- LC call number
- KZ6718
- LC item number
- .S53 2014
- Literary form
- non fiction
- Nature of contents
- dictionaries
Context
Context of Managing cyber attacks in international law, business, and relations : in search of cyber peaceWork of
No resources found
No enriched resources found
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/2zv27UvL9M8/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/2zv27UvL9M8/">Managing cyber attacks in international law, business, and relations : in search of cyber peace</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Work Managing cyber attacks in international law, business, and relations : in search of cyber peace
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/2zv27UvL9M8/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/2zv27UvL9M8/">Managing cyber attacks in international law, business, and relations : in search of cyber peace</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>