Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Cohesive Societies
Sustainable Security
Other Resource Pages
News Releases
Speeches
Video/Audio Channel
External Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National SecurityInstitute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Cohesive SocietiesSustainable SecurityOther Resource PagesNews ReleasesSpeechesVideo/Audio ChannelExternal Podcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS

      Get in Touch

    Connect
    Search
    • RSIS
    • Publication
    • External Publications
    • Law, Policy and Technology: Cyberterrorism, Information Warfare and Internet Immobilization
    • Authored Books
    • Journal Articles
    • Edited Books
    • Chapters in Edited Books
    • Policy Reports
    • Working Papers
    • Op-Eds
    • External Publications for the Year

    Law, Policy and Technology: Cyberterrorism, Information Warfare and Internet Immobilization
    by Pauline C. Reich and Eduardo Gelbstein

    24 June 2012

    In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers.

    Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

    Topics Covered
    The many academic areas covered in this publication include, but are not limited to:

    Critical Information Infrastructure
    Cyber Attacks
    Cyber-Deterrence
    Cyber-Search and Cyber-Seizure
    Cyberterrorism
    Economic, Political and Social Threats in the Information Age
    ICT and Security Governance
    Law and Policy Perspective
    Policy Considerations of Cyber Operations
    Threats, Vulnerability, Uncertainty and Information Risk
    Reviews and Testimonials
    Reich (Waseda U., Japan) and Gelbstein (Webster U., Switzerland) compile 16 chapters by law, security, and information professionals from Europe, the US, and Asia, who examine issues in cyber and information security; initiatives in law, policy, and information security to address them; and how to address gaps in these areas. They consider the nature of the problem, the parties that have an interest in disrupting technology infrastructures and computer systems, how attacks take place and how organizations can prepare for them, and when, where, and why they occur. They discuss the main challenges facing security practitioners; the economic, political, and social consequences of information security disruption; the relationship between critical information infrastructure and cyberterrorism; managing risks associated with information assets; standards and best practices; key vulnerabilities; the application of law and policy to actual incidents; the academic literature on cyberterrorism; the nature of cyber threats to government and private computer systems; whether an international solution to cyberterrorism is needed; and case studies from India, China, and the UK.

    – Annotation ©2013 Book News Inc. Portland, OR
    Recommended – This 2012 book is an excellent source of information and references covering the broad and complex field of cyber security. The two authors/editors address the two major perspectives – information and communications technology and legal. This balance between the two major components of any serious study of cyber security is most welcome. […] Anyone interested in developing or influencing policy on cyber security should consider this book a must read. What they have to tell us about cyber security is worth reading.

    – Ken Krechmer. University of Colorado, USA
    It is not a surprise that the “softer” issues around Internet-based cyber-crime, cyber-terrorism, and information warfare are both unclear and constantly evolving. […] Throughout the volume, the dominating concerns are surveillance and intelligence collection, with associated limits and related litigation or legislation. This volume goes beyond raising awareness.

    – L.F. Pau, Computing Reviews
    These essays address contemporary problems posed by widespread internet use and the role, if any, it has in increasing the likelihood, frequency, or lethality of cyber attacks, especially of cyber terror acts. In this area, definitions are unsettled, laws are often inadequately formulated, and the nature of the threats and identity of the culprits is often doubtful. […] Law, Policy and Technology realistically and rather comprehensively presents main challenges associated with internet use and suggests ways for exploring how to address them without succumbing to the dramatic excesses of all-too-common ungrounded fear or to the tempting quietism of baseless denial.

    – A. Pablo Iannone, Central Connecticut State University

    Categories: Authored Books
    Source: Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
    Citation: Pauline C. Reich, and Eduardo Gelbstein, Law, Policy and Technology: Cyberterrorism, Information Warfare and Internet Immobilization. USA: IGI Global, 2012

    In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers.

    Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

    Topics Covered
    The many academic areas covered in this publication include, but are not limited to:

    Critical Information Infrastructure
    Cyber Attacks
    Cyber-Deterrence
    Cyber-Search and Cyber-Seizure
    Cyberterrorism
    Economic, Political and Social Threats in the Information Age
    ICT and Security Governance
    Law and Policy Perspective
    Policy Considerations of Cyber Operations
    Threats, Vulnerability, Uncertainty and Information Risk
    Reviews and Testimonials
    Reich (Waseda U., Japan) and Gelbstein (Webster U., Switzerland) compile 16 chapters by law, security, and information professionals from Europe, the US, and Asia, who examine issues in cyber and information security; initiatives in law, policy, and information security to address them; and how to address gaps in these areas. They consider the nature of the problem, the parties that have an interest in disrupting technology infrastructures and computer systems, how attacks take place and how organizations can prepare for them, and when, where, and why they occur. They discuss the main challenges facing security practitioners; the economic, political, and social consequences of information security disruption; the relationship between critical information infrastructure and cyberterrorism; managing risks associated with information assets; standards and best practices; key vulnerabilities; the application of law and policy to actual incidents; the academic literature on cyberterrorism; the nature of cyber threats to government and private computer systems; whether an international solution to cyberterrorism is needed; and case studies from India, China, and the UK.

    – Annotation ©2013 Book News Inc. Portland, OR
    Recommended – This 2012 book is an excellent source of information and references covering the broad and complex field of cyber security. The two authors/editors address the two major perspectives – information and communications technology and legal. This balance between the two major components of any serious study of cyber security is most welcome. […] Anyone interested in developing or influencing policy on cyber security should consider this book a must read. What they have to tell us about cyber security is worth reading.

    – Ken Krechmer. University of Colorado, USA
    It is not a surprise that the “softer” issues around Internet-based cyber-crime, cyber-terrorism, and information warfare are both unclear and constantly evolving. […] Throughout the volume, the dominating concerns are surveillance and intelligence collection, with associated limits and related litigation or legislation. This volume goes beyond raising awareness.

    – L.F. Pau, Computing Reviews
    These essays address contemporary problems posed by widespread internet use and the role, if any, it has in increasing the likelihood, frequency, or lethality of cyber attacks, especially of cyber terror acts. In this area, definitions are unsettled, laws are often inadequately formulated, and the nature of the threats and identity of the culprits is often doubtful. […] Law, Policy and Technology realistically and rather comprehensively presents main challenges associated with internet use and suggests ways for exploring how to address them without succumbing to the dramatic excesses of all-too-common ungrounded fear or to the tempting quietism of baseless denial.

    – A. Pablo Iannone, Central Connecticut State University

    Categories: Authored Books
    Source: Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
    Citation: Pauline C. Reich, and Eduardo Gelbstein, Law, Policy and Technology: Cyberterrorism, Information Warfare and Internet Immobilization. USA: IGI Global, 2012

    Popular Links

    About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

    Connect with Us

    rsis.ntu
    rsis_ntu
    rsisntu
    rsisvideocast
    school/rsis-ntu
    rsis.sg
    rsissg
    RSIS
    RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    Getting to RSIS

    Nanyang Technological University
    Block S4, Level B3,
    50 Nanyang Avenue,
    Singapore 639798

    Click here for direction to RSIS

    Get in Touch

      Copyright © S. Rajaratnam School of International Studies. All rights reserved.
      Privacy Statement / Terms of Use
      Help us improve

        Rate your experience with this website
        123456
        Not satisfiedVery satisfied
        What did you like?
        0/255 characters
        What can be improved?
        0/255 characters
        Your email
        Please enter a valid email.
        Thank you for your feedback.
        This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
        OK
        Latest Book
        more info