
Cyber-Security and Threat Politics
US Efforts to Secure the Information Age
- 192 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US.
Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- CSS Studies in security and international relations Series Editors: Andreas Wenger and Victor Mauer Center for Security Studies, ETH Zurich
- Contents
- Illustrations
- Acknowledgements
- Abbreviations
- Introduction
- 1 The information age and cyber-threats
- 2 Politics and threat construction
- 3 The hostile intelligence threat, data security, and encryption set the stage
- 4 Asymmetric vulnerabilities and the double-edged sword of information warfare
- 5 Critical infrastructures and homeland security
- 6 Securing the information age
- 7 Cyber-threats and security in the information age
- Bibliography
- Index