|
Showing 1 - 5 of
5 matches in All Departments
Cybersecurity is a complex and contested issue in international
politics. By focusing on the 'great powers'--the US, the EU, Russia
and China--studies in the field often fail to capture the specific
politics of cybersecurity in the Middle East, especially in Egypt
and the GCC states. For these countries, cybersecurity policies and
practices are entangled with those of long-standing allies in the
US and Europe, and are built on reciprocal flows of data, capital,
technology and expertise. At the same time, these states have
authoritarian systems of governance more reminiscent of Russia or
China, including approaches to digital technologies centred on
sovereignty and surveillance. This book is a pioneering examination
of the politics of cybersecurity in the Middle East. Drawing on new
interviews and original fieldwork, James Shires shows how the label
of cybersecurity is repurposed by states, companies and other
organisations to encompass a variety of concepts, including state
conflict, targeted spyware, domestic information controls, and
foreign interference through leaks and disinformation. These
shifting meanings shape key technological systems as well as the
social relations underpinning digital development. But however the
term is interpreted, it is clear that cybersecurity is an integral
aspect of the region's contemporary politics.
A wide range of actors have publicly identified cyber stability as
a key policy goal but the meaning of stability in the context of
cyber policy remains vague and contested: vague because most
policymakers and experts do not define cyber stability when they
use the concept; contested because they propose measures that rely
- often implicitly - on divergent understandings of cyber
stability. This is a thorough investigation of instability within
cyberspace and of cyberspace itself. Its purpose is to
reconceptualise stability and instability for cyberspace, highlight
their various dimensions and thereby identify relevant policy
measures. It critically examines both 'classic' notions associated
with stability - for example, whether cyber operations can lead to
unwanted escalation - as well as topics that have so far not been
addressed in the existing cyber literature, such as the application
of a decolonial lens to investigate Euro-American
conceptualisations of stability in cyberspace.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R164
Discovery Miles 1 640
The Car
Arctic Monkeys
CD
R374
Discovery Miles 3 740
Loot
Nadine Gordimer
Paperback
(2)
R205
R164
Discovery Miles 1 640
Loot
Nadine Gordimer
Paperback
(2)
R205
R164
Discovery Miles 1 640
|