Cyber-Security and Threat Politics

Cyber-Security and Threat Politics PDF Author: Myriam Dunn Cavelty
Publisher: Routledge
ISBN: 1134086695
Category : History
Languages : en
Pages : 340

Get Book Here

Book Description
This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.

Cyber-Security and Threat Politics

Cyber-Security and Threat Politics PDF Author: Myriam Dunn Cavelty
Publisher: Routledge
ISBN: 1134086695
Category : History
Languages : en
Pages : 340

Get Book Here

Book Description
This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.

Threat Politics

Threat Politics PDF Author: Johan Eriksson
Publisher: Routledge
ISBN: 1351735527
Category : Political Science
Languages : en
Pages : 213

Get Book Here

Book Description
This title was first published in 2001. Aiming to open up a new perspective on the study of threats and risks, this text combines insights from the thematically linked but academically disassociated fields of security studies, risk studies and crisis management studies. It provides case studies of key agents, arenas and issues involved in the politics of threats. In addition to the traditional unit of analysis - national governments - this book takes into account non-governmental agents, including public opinion, the media and business.

In the Name of Humanity

In the Name of Humanity PDF Author: Ilana Feldman
Publisher: Duke University Press
ISBN: 0822348217
Category : Political Science
Languages : en
Pages : 390

Get Book Here

Book Description
Collection of essays that consider how humanity--as a social, ethical, and political category--is produced through particular governing techniques and in turn gives rise to new forms of government.

Unanswered Threats

Unanswered Threats PDF Author: Randall L. Schweller
Publisher: Princeton University Press
ISBN: 1400837855
Category : Political Science
Languages : en
Pages : 197

Get Book Here

Book Description
Why have states throughout history regularly underestimated dangers to their survival? Why have some states been able to mobilize their material resources effectively to balance against threats, while others have not been able to do so? The phenomenon of "underbalancing" is a common but woefully underexamined behavior in international politics. Underbalancing occurs when states fail to recognize dangerous threats, choose not to react to them, or respond in paltry and imprudent ways. It is a response that directly contradicts the core prediction of structural realism's balance-of-power theory--that states motivated to survive as autonomous entities are coherent actors that, when confronted by dangerous threats, act to restore the disrupted balance by creating alliances or increasing their military capabilities, or, in some cases, a combination of both. Consistent with the new wave of neoclassical realist research, Unanswered Threats offers a theory of underbalancing based on four domestic-level variables--elite consensus, elite cohesion, social cohesion, and regime/government vulnerability--that channel, mediate, and redirect policy responses to external pressures and incentives. The theory yields five causal schemes for underbalancing behavior, which are tested against the cases of interwar Britain and France, France from 1877 to 1913, and the War of the Triple Alliance (1864-1870) that pitted tiny Paraguay against Brazil, Argentina, and Uruguay. Randall Schweller concludes that those most likely to underbalance are incoherent, fragmented states whose elites are constrained by political considerations.

The Wartime President

The Wartime President PDF Author: William G. Howell
Publisher: University of Chicago Press
ISBN: 022604842X
Category : History
Languages : en
Pages : 367

Get Book Here

Book Description
“It is the nature of war to increase the executive at the expense of the legislative authority,” wrote Alexander Hamilton in the Federalist Papers. The balance of power between Congress and the president has been a powerful thread throughout American political thought since the time of the Founding Fathers. And yet, for all that has been written on the topic, we still lack a solid empirical or theoretical justification for Hamilton’s proposition. For the first time, William G. Howell, Saul P. Jackman, and Jon C. Rogowski systematically analyze the question. Congress, they show, is more likely to defer to the president’s policy preferences when political debates center on national rather than local considerations. Thus, World War II and the post-9/11 wars in Afghanistan and Iraq significantly augmented presidential power, allowing the president to enact foreign and domestic policies that would have been unattainable in times of peace. But, contrary to popular belief, there are also times when war has little effect on a president’s influence in Congress. The Vietnam and Gulf Wars, for instance, did not nationalize our politics nearly so much, and presidential influence expanded only moderately. Built on groundbreaking research, The Wartime President offers one of the most significant works ever written on the wartime powers presidents wield at home.

The Politics of the Asia-Pacific

The Politics of the Asia-Pacific PDF Author: Mark S. Williams
Publisher: University of Toronto Press
ISBN: 1487525990
Category : History
Languages : en
Pages : 381

Get Book Here

Book Description
This book introduces readers to the deep political tensions in the Asia-Pacific and offers classroom simulations designed to encourage students to delve deeper into the issues and dynamics of the region.

Gender Threat

Gender Threat PDF Author: Yasemin Cassino
Publisher: Stanford University Press
ISBN: 1503629902
Category : Social Science
Languages : en
Pages : 245

Get Book Here

Book Description
Against all evidence to the contrary, American men have come to believe that the world is tilted – economically, socially, politically – against them. A majority of men across the political spectrum feel that they face some amount of discrimination because of their sex. The authors of Gender Threat look at what reasoning lies behind their belief and how they respond to it. Many feel that there is a limited set of socially accepted ways for men to express their gender identity, and when circumstances make it difficult or impossible for them to do so, they search for another outlet to compensate. Sometimes these behaviors are socially positive, such as placing a greater emphasis on fatherhood, but other times they can be maladaptive, as in the case of increased sexual harassment at work. These trends have emerged, notably, since the Great Recession of 2008-09. Drawing on multiple data sources, the authors find that the specter of threats to their gender identity has important implications for men's behavior. Importantly, younger men are more likely to turn to nontraditional compensatory behaviors, such as increased involvement in cooking, parenting, and community leadership, suggesting that the conception of masculinity is likely to change in the decades to come.

The Administrative Threat

The Administrative Threat PDF Author: Philip Hamburger
Publisher: Encounter Books
ISBN: 159403950X
Category : Political Science
Languages : en
Pages : 50

Get Book Here

Book Description
Government agencies regulate Americans in the full range of their lives, including their political participation, their economic endeavors, and their personal conduct. Administrative power has thus become pervasively intrusive. But is this power constitutional? A similar sort of power was once used by English kings, and this book shows that the similarity is not a coincidence. In fact, administrative power revives absolutism. On this foundation, the book explains how administrative power denies Americans their basic constitutional freedoms, such as jury rights and due process. No other feature of American government violates as many constitutional provisions or is more profoundly threatening. As a result, administrative power is the key civil liberties issue of our era.

Asymmetric Warfare

Asymmetric Warfare PDF Author: Rod Thornton
Publisher: Polity
ISBN: 0745633641
Category : Political Science
Languages : en
Pages : 253

Get Book Here

Book Description
In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks the meaning and significance of asymmetric warfare, in both civilian and military realms, and examines why it has become such an important subject for study. He seeks to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the Wests military superiority can be seriously undermined by asymmetric threats. The book concludes by looking at the ways in which the US, the state most vulnerable to asymmetric attack, is attempting to cope with some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.

Credible Threat

Credible Threat PDF Author: Sarah Sobieraj
Publisher: Oxford University Press
ISBN: 0190089318
Category : Social Science
Languages : en
Pages : 193

Get Book Here

Book Description
Greta Thunberg. Alexandria Ocasio-Cortez. Anita Sarkeesian. Emma Gonzalez. When women are vocal about political and social issues, too-often they are flogged with attacks via social networking sites, comment sections, discussion boards, email, and direct message. Rather than targeting their ideas, the abuse targets their identities, pummeling them with rape threats, attacks on their appearance and presumed sexual behavior, and a cacophony of misogynistic, racist, xenophobic, and homophobic stereotypes and epithets. Like street harassment and sexual harassment in the workplace, digital harassment rejects women's implicit claims to be taken seriously as interlocutors, colleagues, and peers. Sarah Sobieraj shows that this online abuse is more than interpersonal bullying--it is a visceral response to the threat of equality in digital conversations and arenas that men would prefer to control. Thus identity-based attacks are particularly severe for those women who are seen as most out of line, such as those from racial, ethnic, and religious minority groups or who work in domains dominated by men, such as gaming, technology, politics, and sports. Feminists and women who don't conform to traditional gender norms are also frequently targeted. Drawing on interviews with over fifty women who have been on the receiving end of identity-based abuse online, Credible Threat explains why all of us should be concerned about the hostile climate women navigate online. This toxicity comes with economic, professional, and psychological costs for those targeted, but it also exacts societal-level costs that are rarely recognized: it erodes our civil liberties, diminishes our public discourse, thins the knowledge available to inform policy and electoral decision-making, and teaches all women that activism and public service are unappealing, high-risk endeavors to be avoided. Sobieraj traces these underexplored effects, showing that when identity-based attacks succeed in constraining women's use of digital publics, there are democratic consequences that cannot be ignored.