000 -LEADER |
fixed length control field |
02741nam a22002297a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
ISBN |
9781032082769 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng- |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
363.325 |
Item number |
LAW-C |
100 ## - MAIN ENTRY--AUTHOR NAME |
Personal name |
Lawson, Sean T. |
Relator term |
author. |
245 ## - TITLE STATEMENT |
Title |
Cybersecurity discourse in the United States : |
Sub Title |
cyber-doom rhetoric and beyond / |
Statement of responsibility, etc |
Sean T. Lawson. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication |
New York, NY : |
Name of publisher |
Routledge, |
Year of publication |
2020. |
300 ## - PHYSICAL DESCRIPTION |
Number of Pages |
220p. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
<P>1. The Cyber Sky is falling! An Introduction to Cyber Doom</P><P>2. From <I>WarGames</I> to Cyber Pearl Harbor: Motivating Cybersecurity with Cyber-Doom Rhetoric</P><P>3. From Wire Devils to Cyber Squirrels: Cyber-Doom Rhetoric as Fear of Technology-Out-of-Control</P><P>4. Panic, Paralysis, and Social Collapse: The Exaggerated Fears of Cyber Doom</P><P>5. When Fear Fails: The Dangers of Cyber-Doom Rhetoric</P><P>6. Cold War 2.0 and the Emergence of Cyber-Enabled Political Warfare</P><P>7. After Action Report and Lessons Learned</P> |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book examines the role of cyber-doom rhetoric in the U.S. cybersecurity debate.<br/>For more than two decades, fear of "cyber-doom" scenarios—i.e. cyberattacks against critical infrastructure resulting in catastrophic physical, social, and economic impacts—has been a persistent feature of the U.S. cybersecurity debate. This is despite the fact that no cyberattack has come close to realizing such impacts. This book argues that such scenarios are part of a broader rhetoric of cyber-doom within the U.S. cybersecurity debate, and takes a multidisciplinary approach that draws on research in history, sociology, communication, psychology, and political science. It identifies a number of variations of cyber-doom rhetoric, then places them into a larger historical context, assesses how realistic the fears expressed in such rhetoric are, and finally draws out the policy implications of relying on these fears to structure our response to cybersecurity challenges. The United States faces very real cybersecurity challenges that are, nonetheless, much less dramatic than what is implied in the rhetoric. This book argues that relying on cyber-doom rhetoric to frame our thinking about such threats is counterproductive, and encourages us to develop ways of thinking and speaking about cybersecurity beyond cyber-doom.<br/>This book will be of much interest to students of cybersecurity, foreign policy, public administration, national security, and international relations in general. |
546 ## - LANGUAGE NOTE |
Language note |
English. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Computer security |
Geographic subdivision |
United States. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Rhetoric |
General subdivision |
Political aspects. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Cyberspace |
General subdivision |
Government policy. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Computer security |
General subdivision |
Government policy. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Books |