Cyber Sovereignty International Security, Mass Communication, and the Future of the Internet /

Bibliographic Details
Main Author: Topor, Lev (Author)
Corporate Author: SpringerLink (Online service)
Summary:XIX, 207 p. 33 illus., 13 illus. in color.
text
Language:English
Published: Cham : Springer Nature Switzerland : Imprint: Springer, 2024.
Edition:1st ed. 2024.
Series:Global Power Shift,
Subjects:
Online Access:https://doi.org/10.1007/978-3-031-58199-1
Format: Electronic Book

MARC

LEADER 00000nam a22000005i 4500
001 978-3-031-58199-1
003 DE-He213
005 20250807153125.0
007 cr nn 008mamaa
008 240626s2024 sz | s |||| 0|eng d
020 |a 9783031581991  |9 978-3-031-58199-1 
024 7 |a 10.1007/978-3-031-58199-1  |2 doi 
050 4 |a JZ5587-6009 
072 7 |a JPS  |2 bicssc 
072 7 |a POL012000  |2 bisacsh 
072 7 |a JPS  |2 thema 
082 0 4 |a 327.116  |2 23 
100 1 |a Topor, Lev.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Cyber Sovereignty  |h [electronic resource] :  |b International Security, Mass Communication, and the Future of the Internet /  |c by Lev Topor. 
250 |a 1st ed. 2024. 
264 1 |a Cham :  |b Springer Nature Switzerland :  |b Imprint: Springer,  |c 2024. 
300 |a XIX, 207 p. 33 illus., 13 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
341 0 |b Table of contents navigation  |2 onix 
341 0 |b Single logical reading order  |2 onix 
341 0 |b Short alternative textual descriptions  |2 onix 
341 0 |b Use of color is not sole means of conveying information  |2 onix 
341 0 |b Use of high contrast between text and background color  |2 onix 
341 0 |b Next / Previous structural navigation  |2 onix 
341 0 |b All non-decorative content supports reading without sight  |2 onix 
347 |a text file  |b PDF  |2 rda 
490 1 |a Global Power Shift,  |x 2198-7351 
505 0 |a  Chapter 1. Introduction -- Chapter 2. Cyberspace: Structure, Functionality and Vulnerabilities -- Chapter 3. Sovereignty, Power, International Security and a Lack of International Law -- Chapter 4. Cyber Warfare: Global Trends and Proxy Wars -- Chapter 5. Mis/Disinformation and National Resilience: Are Countries Immune to Fake News? -- Chapter 6. Secure Cyber Domains (SCD): Mature Models -- Chapter 7. Vulnerable Models of Cyber Domains -- Chapter 8. The Future of the Internet. 
520 |a The internet has become a battleground for global power struggles, with nations and even terrorist organizations wielding cyber-attacks to exert control. As the absence of binding international laws and norms leaves cyberspace largely unchecked, countries are seeking to establish their Sovereign Cyber Domains (SCD) - tightly controlled cyberspaces. In this illuminating monograph, the author explores how Russia, China, Iran, and others perceive the internet as a means for the United States and its allies to maintain global dominance and influence foreign audiences, driving their pursuit of strict regulations over domestic cyber affairs and mass communication. Yet, even the United States is now susceptible to foreign cyber operations, mainly foreign influence that undermines its domestic affairs. Even International Blocs like the European Union had expressed concerns about foreign influence and privacy rights abuses, leading to regulatory initiatives like the General Data Protection Regulation, Digital Services Act and the Digital Markets Act. As nations prioritize cybersecurity and sovereignty over free speech and convenience, the book predicts a future of increased regulation across all layers of the cyber domain, mirroring the historical emergence of the concept of sovereignty. Drawing on a combination of political science, international relations, and cyber domain practices, this monograph offers valuable insights for policymakers, practitioners, researchers, and students. By analyzing existing cyber sovereignty processes and predicting future trends, the book contributes to international relations theories, sheds light on the challenges of an unregulated cyber domain, and provides guidance for a secure and controlled digital future. 
532 8 |a Accessibility summary: This PDF does not fully comply with PDF/UA standards, but does feature limited screen reader support, described non-text content (images, graphs), bookmarks for easy navigation and searchable, selectable text. Users of assistive technologies may experience difficulty navigating or interpreting content in this document. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. 
532 8 |a No reading system accessibility options actively disabled 
532 8 |a Publisher contact for further accessibility information: accessibilitysupport@springernature.com 
650 0 |a Security, International. 
650 0 |a Politics and war. 
650 0 |a International law. 
650 0 |a Communication in politics. 
650 1 4 |a International Security Studies. 
650 2 4 |a Military and Defence Studies. 
650 2 4 |a Public International Law. 
650 2 4 |a Political Communication. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783031581984 
776 0 8 |i Printed edition:  |z 9783031582004 
776 0 8 |i Printed edition:  |z 9783031582011 
830 0 |a Global Power Shift,  |x 2198-7351 
856 4 0 |u https://doi.org/10.1007/978-3-031-58199-1 
912 |a ZDB-2-POS 
912 |a ZDB-2-SXPI 
950 |a Political Science and International Studies (SpringerNature-41174) 
950 |a Political Science and International Studies (R0) (SpringerNature-43724)