|
|
|
|
| LEADER |
00000nam a22000005i 4500 |
| 001 |
978-3-031-58199-1 |
| 003 |
DE-He213 |
| 005 |
20250807153125.0 |
| 007 |
cr nn 008mamaa |
| 008 |
240626s2024 sz | s |||| 0|eng d |
| 020 |
|
|
|a 9783031581991
|9 978-3-031-58199-1
|
| 024 |
7 |
|
|a 10.1007/978-3-031-58199-1
|2 doi
|
| 050 |
|
4 |
|a JZ5587-6009
|
| 072 |
|
7 |
|a JPS
|2 bicssc
|
| 072 |
|
7 |
|a POL012000
|2 bisacsh
|
| 072 |
|
7 |
|a JPS
|2 thema
|
| 082 |
0 |
4 |
|a 327.116
|2 23
|
| 100 |
1 |
|
|a Topor, Lev.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
| 245 |
1 |
0 |
|a Cyber Sovereignty
|h [electronic resource] :
|b International Security, Mass Communication, and the Future of the Internet /
|c by Lev Topor.
|
| 250 |
|
|
|a 1st ed. 2024.
|
| 264 |
|
1 |
|a Cham :
|b Springer Nature Switzerland :
|b Imprint: Springer,
|c 2024.
|
| 300 |
|
|
|a XIX, 207 p. 33 illus., 13 illus. in color.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 341 |
0 |
|
|b Table of contents navigation
|2 onix
|
| 341 |
0 |
|
|b Single logical reading order
|2 onix
|
| 341 |
0 |
|
|b Short alternative textual descriptions
|2 onix
|
| 341 |
0 |
|
|b Use of color is not sole means of conveying information
|2 onix
|
| 341 |
0 |
|
|b Use of high contrast between text and background color
|2 onix
|
| 341 |
0 |
|
|b Next / Previous structural navigation
|2 onix
|
| 341 |
0 |
|
|b All non-decorative content supports reading without sight
|2 onix
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Global Power Shift,
|x 2198-7351
|
| 505 |
0 |
|
|a Chapter 1. Introduction -- Chapter 2. Cyberspace: Structure, Functionality and Vulnerabilities -- Chapter 3. Sovereignty, Power, International Security and a Lack of International Law -- Chapter 4. Cyber Warfare: Global Trends and Proxy Wars -- Chapter 5. Mis/Disinformation and National Resilience: Are Countries Immune to Fake News? -- Chapter 6. Secure Cyber Domains (SCD): Mature Models -- Chapter 7. Vulnerable Models of Cyber Domains -- Chapter 8. The Future of the Internet.
|
| 520 |
|
|
|a The internet has become a battleground for global power struggles, with nations and even terrorist organizations wielding cyber-attacks to exert control. As the absence of binding international laws and norms leaves cyberspace largely unchecked, countries are seeking to establish their Sovereign Cyber Domains (SCD) - tightly controlled cyberspaces. In this illuminating monograph, the author explores how Russia, China, Iran, and others perceive the internet as a means for the United States and its allies to maintain global dominance and influence foreign audiences, driving their pursuit of strict regulations over domestic cyber affairs and mass communication. Yet, even the United States is now susceptible to foreign cyber operations, mainly foreign influence that undermines its domestic affairs. Even International Blocs like the European Union had expressed concerns about foreign influence and privacy rights abuses, leading to regulatory initiatives like the General Data Protection Regulation, Digital Services Act and the Digital Markets Act. As nations prioritize cybersecurity and sovereignty over free speech and convenience, the book predicts a future of increased regulation across all layers of the cyber domain, mirroring the historical emergence of the concept of sovereignty. Drawing on a combination of political science, international relations, and cyber domain practices, this monograph offers valuable insights for policymakers, practitioners, researchers, and students. By analyzing existing cyber sovereignty processes and predicting future trends, the book contributes to international relations theories, sheds light on the challenges of an unregulated cyber domain, and provides guidance for a secure and controlled digital future.
|
| 532 |
8 |
|
|a Accessibility summary: This PDF does not fully comply with PDF/UA standards, but does feature limited screen reader support, described non-text content (images, graphs), bookmarks for easy navigation and searchable, selectable text. Users of assistive technologies may experience difficulty navigating or interpreting content in this document. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com.
|
| 532 |
8 |
|
|a No reading system accessibility options actively disabled
|
| 532 |
8 |
|
|a Publisher contact for further accessibility information: accessibilitysupport@springernature.com
|
| 650 |
|
0 |
|a Security, International.
|
| 650 |
|
0 |
|a Politics and war.
|
| 650 |
|
0 |
|a International law.
|
| 650 |
|
0 |
|a Communication in politics.
|
| 650 |
1 |
4 |
|a International Security Studies.
|
| 650 |
2 |
4 |
|a Military and Defence Studies.
|
| 650 |
2 |
4 |
|a Public International Law.
|
| 650 |
2 |
4 |
|a Political Communication.
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer Nature eBook
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783031581984
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783031582004
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783031582011
|
| 830 |
|
0 |
|a Global Power Shift,
|x 2198-7351
|
| 856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-031-58199-1
|
| 912 |
|
|
|a ZDB-2-POS
|
| 912 |
|
|
|a ZDB-2-SXPI
|
| 950 |
|
|
|a Political Science and International Studies (SpringerNature-41174)
|
| 950 |
|
|
|a Political Science and International Studies (R0) (SpringerNature-43724)
|