You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes even destroyed. The prevalence of such stories reveals an overwhelming weakness in the security of the systems we increasingly rely on for everything: shopping, banking, health services, education, and even voting. That these problems persist even as the world rushes headlong into the Internet-of-Things and cloud based everything underscores the importance of understanding the current and potential aspects of information warfare, also known as cyberwarfare. Having passed through into the third generation of information warfare, we now must consider what the fourth generatio...
Internationally, the profession of intelligence continues to develop and expand. So too does the academic field of intelligence, both in terms of intelligence as a focus for academic research and in terms of the delivery of university courses in intelligence and related areas. To a significant extent both the profession of intelligence and those delivering intelligence education share a common aim of developing intelligence as a discipline. However, this shared interest must also navigate the existence of an academic-practitioner divide. Such a divide is far from unique to intelligence – it exists in various forms across most professions – but it is distinctive in the field of intelligence because of the centrality of secrecy to the profession of intelligence and the way in which this constitutes a barrier to understanding and openly teaching about aspects of intelligence. How can co-operation in developing the profession and academic study be maximized when faced with this divide? How can and should this divide be navigated? The Academic-Practitioner Divide in Intelligence provides a range of international approaches to, and perspectives on, these crucial questions.
Global security cannot be achieved until people view the world as a global community. Until such time, differences will continue to be perceived as threatening. These perceived ¿threats¿ are the primary threat to global security. This volume proposes methods for minimizing the ¿us versus them¿ mentality so that we can build a sense of global community. Contents Vincent LUIZZI: Editorial Foreword Preface Richard T. HULL, Randall E. OSBORNE, Paul KRIESE: Introduction Universal Justice and Global Security Matthew CROSSTON : Introduction to Part One Laura MEDER: Global Security: Needed: A New Definition for a New Century Matthew CROSSTON: Fighting Terror and Spreading Democracy: When Theory ...
Democracy promotion, security and energy are the predominant themes of US policy in Central Asia after the Cold War. This book analyses how the Bush administration understood and pursued its interests in the Central Asia states, namely Kyrgyzstan, Tajikistan, Kazakhstan, Uzbekistan, Turkmenistan. It discusses the shift in US interests after September 11 and highlights key ideas, actors and processes that have been driving US policy in Central Asia. The author examines the similarities between the Bush and Obama administrations’ attitudes towards the region, and he points to the inadequacy of the personality focused, partisan accounts that have all too often been deployed to describe the tw...
At its current rate, technological development has outpaced corresponding changes in international law. Proposals to remedy this deficiency have been made, in part, by members of the Shanghai Cooperation Organization (led by the Russian Federation), but the United States and select allies have rejected these proposals, arguing that existing international law already provides a suitable comprehensive framework necessary to tackle cyber-warfare. Cyber-Attacks and the Exploitable Imperfections of International Law does not contest (and, in fact, supports) the idea that contemporary jus ad bellum and jus in bello, in general, can accommodate cyber-warfare. However, this analysis argues that existing international law contains significant imperfections that can be exploited; gaps, not yet filled, that fail to address future risks posed by cyber-attacks.
Taking stock of the first decade of the transformation in the former Soviet bloc, this timely book explores the legacies of state socialism and attempts by once-communist countries to move toward a democratic, market-oriented system. Leading international scholars consider the ways traditions interact with other factors--both domestic and foreign--to influence the course of social, political, and economic change. With its blend of theory and case studies and its clear narrative, this book will be a valuable text for students of transition, Russian politics, and the transformation of Eastern Europe. Visit our website for sample chapters!
None