Author: Hugo Loiseau
Publisher: John Wiley & Sons
ISBN: 1119777577
Category : Computers
Languages : en
Pages : 240
Book Description
The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?
Cybersecurity in Humanities and Social Sciences
Author: Hugo Loiseau
Publisher: John Wiley & Sons
ISBN: 1119777577
Category : Computers
Languages : en
Pages : 240
Book Description
The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?
Publisher: John Wiley & Sons
ISBN: 1119777577
Category : Computers
Languages : en
Pages : 240
Book Description
The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?
Research Methods for Cyber Security
Author: Thomas W. Edgar
Publisher: Syngress
ISBN: 0128129301
Category : Computers
Languages : en
Pages : 430
Book Description
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. - Presents research methods from a cyber security science perspective - Catalyzes the rigorous research necessary to propel the cyber security field forward - Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage
Publisher: Syngress
ISBN: 0128129301
Category : Computers
Languages : en
Pages : 430
Book Description
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. - Presents research methods from a cyber security science perspective - Catalyzes the rigorous research necessary to propel the cyber security field forward - Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage
Academic Studies in Humanities and Social Sciences
Author: Redzep ŠKRIJELJ
Publisher: Livre de Lyon
ISBN: 238236159X
Category : Education
Languages : en
Pages : 264
Book Description
Academic Studies in Humanities and Social Sciences
Publisher: Livre de Lyon
ISBN: 238236159X
Category : Education
Languages : en
Pages : 264
Book Description
Academic Studies in Humanities and Social Sciences
Social and Human Elements of Information Security: Emerging Trends and Countermeasures
Author: Gupta, Manish
Publisher: IGI Global
ISBN: 160566037X
Category : Business & Economics
Languages : en
Pages : 412
Book Description
Provides research on the social and human aspects of information security. Presents the latest trends, issues, and findings in the field.
Publisher: IGI Global
ISBN: 160566037X
Category : Business & Economics
Languages : en
Pages : 412
Book Description
Provides research on the social and human aspects of information security. Presents the latest trends, issues, and findings in the field.
Proceedings of the International Conference on Business, Economics, Social Sciences, and Humanities - Humanities and Social Sciences Track (ICOBEST-HSS 2024)
Author: Lia Warlina
Publisher: Springer Nature
ISBN: 2384762699
Category : Electronic books
Languages : en
Pages : 256
Book Description
Publisher: Springer Nature
ISBN: 2384762699
Category : Electronic books
Languages : en
Pages : 256
Book Description
Why Cyber Security Is a Socio-Technical Challenge
Author: Mils Hills
Publisher: Nova Publishers
ISBN: 9781536100907
Category : Computers
Languages : en
Pages : 0
Book Description
This book is a provocative manifesto of disruptive thinking about cyber security. It presents cutting-edge thinking and professional reflection and is designed to be a source of ideas and approaches that can be adopted for application in the real world by those who recognize that conventional ways of defining and considering cyber-attack are insufficient. All of the authors believe that the term cyber must be urgently wrestled back from the technologists, cyber security professionals, consultancies and corporate silos that have hijacked it (seemingly without any resistance) and rendered the term essentially meaningless. The authors write from applied and often unique experiences in a range of commercial, consulting, state and defense environments. Many of the authors of this volume have direct experience of inflicting, reporting on and protecting organizations from such effects, and also have knowledge of taking the challenge to additional levels. Most consultancies, academics and experts dont live in the real world, are content with operating in the commoditised world of cyber-technical security and dont have the intellectual capacity to understand, engage with or monetize this more challenging reality. This book is intended to help organizations improve preparedness for the established cyber world reality.
Publisher: Nova Publishers
ISBN: 9781536100907
Category : Computers
Languages : en
Pages : 0
Book Description
This book is a provocative manifesto of disruptive thinking about cyber security. It presents cutting-edge thinking and professional reflection and is designed to be a source of ideas and approaches that can be adopted for application in the real world by those who recognize that conventional ways of defining and considering cyber-attack are insufficient. All of the authors believe that the term cyber must be urgently wrestled back from the technologists, cyber security professionals, consultancies and corporate silos that have hijacked it (seemingly without any resistance) and rendered the term essentially meaningless. The authors write from applied and often unique experiences in a range of commercial, consulting, state and defense environments. Many of the authors of this volume have direct experience of inflicting, reporting on and protecting organizations from such effects, and also have knowledge of taking the challenge to additional levels. Most consultancies, academics and experts dont live in the real world, are content with operating in the commoditised world of cyber-technical security and dont have the intellectual capacity to understand, engage with or monetize this more challenging reality. This book is intended to help organizations improve preparedness for the established cyber world reality.
Research Anthology on Artificial Intelligence Applications in Security
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799877485
Category : Computers
Languages : en
Pages : 2253
Book Description
As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.
Publisher: IGI Global
ISBN: 1799877485
Category : Computers
Languages : en
Pages : 2253
Book Description
As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.
Cybersecurity
Author: Peter W. Singer
Publisher: OUP USA
ISBN: 0199918090
Category : Computers
Languages : en
Pages : 322
Book Description
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity and Cyerbwar: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity and Cyerbwar is the definitive account on the subject for the educated general reader who wants to know more about the nature of war, conflict, and security in the twenty-first century.
Publisher: OUP USA
ISBN: 0199918090
Category : Computers
Languages : en
Pages : 322
Book Description
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity and Cyerbwar: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity and Cyerbwar is the definitive account on the subject for the educated general reader who wants to know more about the nature of war, conflict, and security in the twenty-first century.
Analyzing Human Behavior in Cyberspace
Author: Yan, Zheng
Publisher: IGI Global
ISBN: 1522571299
Category : Computers
Languages : en
Pages : 357
Book Description
The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition. Analyzing Human Behavior in Cyberspace provides emerging research exploring the four types of cyber behavior, expanding the scientific knowledge about the subject matter and revealing its extreme complexity. Featuring coverage on a broad range of topics such as cyber effects, emotion recognition, and cyber victimization, this book is ideally designed for sociologists, psychologists, academicians, researchers, and graduate-level students seeking current research on how people behave online.
Publisher: IGI Global
ISBN: 1522571299
Category : Computers
Languages : en
Pages : 357
Book Description
The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition. Analyzing Human Behavior in Cyberspace provides emerging research exploring the four types of cyber behavior, expanding the scientific knowledge about the subject matter and revealing its extreme complexity. Featuring coverage on a broad range of topics such as cyber effects, emotion recognition, and cyber victimization, this book is ideally designed for sociologists, psychologists, academicians, researchers, and graduate-level students seeking current research on how people behave online.
Foundational Cybersecurity Research
Author: National Academies of Sciences, Engineering, and Medicine
Publisher: National Academies Press
ISBN: 0309455294
Category : Computers
Languages : en
Pages : 105
Book Description
Attaining meaningful cybersecurity presents a broad societal challenge. Its complexity and the range of systems and sectors in which it is needed mean that successful approaches are necessarily multifaceted. Moreover, cybersecurity is a dynamic process involving human attackers who continue to adapt. Despite considerable investments of resources and intellect, cybersecurity continues to poses serious challenges to national security, business performance, and public well-being. Modern developments in computation, storage and connectivity to the Internet have brought into even sharper focus the need for a better understanding of the overall security of the systems we depend on. Foundational Cybersecurity Research focuses on foundational research strategies for organizing people, technologies, and governance. These strategies seek to ensure the sustained support needed to create an agile, effective research community, with collaborative links across disciplines and between research and practice. This report is aimed primarily at the cybersecurity research community, but takes a broad view that efforts to improve foundational cybersecurity research will need to include many disciplines working together to achieve common goals.
Publisher: National Academies Press
ISBN: 0309455294
Category : Computers
Languages : en
Pages : 105
Book Description
Attaining meaningful cybersecurity presents a broad societal challenge. Its complexity and the range of systems and sectors in which it is needed mean that successful approaches are necessarily multifaceted. Moreover, cybersecurity is a dynamic process involving human attackers who continue to adapt. Despite considerable investments of resources and intellect, cybersecurity continues to poses serious challenges to national security, business performance, and public well-being. Modern developments in computation, storage and connectivity to the Internet have brought into even sharper focus the need for a better understanding of the overall security of the systems we depend on. Foundational Cybersecurity Research focuses on foundational research strategies for organizing people, technologies, and governance. These strategies seek to ensure the sustained support needed to create an agile, effective research community, with collaborative links across disciplines and between research and practice. This report is aimed primarily at the cybersecurity research community, but takes a broad view that efforts to improve foundational cybersecurity research will need to include many disciplines working together to achieve common goals.