![]() |
![]() |
Your cart is empty |
||
Showing 1 - 5 of 5 matches in All Departments
Cybersecurity is a complex and contested issue in international politics. By focusing on the 'great powers'--the US, the EU, Russia and China--studies in the field often fail to capture the specific politics of cybersecurity in the Middle East, especially in Egypt and the GCC states. For these countries, cybersecurity policies and practices are entangled with those of long-standing allies in the US and Europe, and are built on reciprocal flows of data, capital, technology and expertise. At the same time, these states have authoritarian systems of governance more reminiscent of Russia or China, including approaches to digital technologies centred on sovereignty and surveillance. This book is a pioneering examination of the politics of cybersecurity in the Middle East. Drawing on new interviews and original fieldwork, James Shires shows how the label of cybersecurity is repurposed by states, companies and other organisations to encompass a variety of concepts, including state conflict, targeted spyware, domestic information controls, and foreign interference through leaks and disinformation. These shifting meanings shape key technological systems as well as the social relations underpinning digital development. But however the term is interpreted, it is clear that cybersecurity is an integral aspect of the region's contemporary politics.
A wide range of actors have publicly identified cyber stability as a key policy goal but the meaning of stability in the context of cyber policy remains vague and contested: vague because most policymakers and experts do not define cyber stability when they use the concept; contested because they propose measures that rely - often implicitly - on divergent understandings of cyber stability. This is a thorough investigation of instability within cyberspace and of cyberspace itself. Its purpose is to reconceptualise stability and instability for cyberspace, highlight their various dimensions and thereby identify relevant policy measures. It critically examines both 'classic' notions associated with stability - for example, whether cyber operations can lead to unwanted escalation - as well as topics that have so far not been addressed in the existing cyber literature, such as the application of a decolonial lens to investigate Euro-American conceptualisations of stability in cyberspace.
|
![]() ![]() You may like...
Early Italian Painting
Joseph Archer Crowe, Giovanni Battista Cavalcaselle
Hardcover
R992
Discovery Miles 9 920
The Art of Experiment: Parmigianino at…
Ketty Gottardo, Guido Rebecchini
Paperback
R967
Discovery Miles 9 670
|