Plus d’un million de livres à portée de main !
Bookbot

Mary Manjikian

    Cybersecurity Ethics
    Do Fewer Resources Mean Less Influence?
    Deterring Cybertrespass And Securing Cyberspace
    Do Fewer Resources Mean Less Influence?: A Comparative Historical Case Study of Military Influence in a Time of Austerity
    Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes: A Comparison of Territorial and Weapons-Based Regimes
    Securitization of Property Squatting in Europe
    • Focusing on the intersection of housing and state control, this book critiques how urban property squatting in Europe is increasingly framed as a criminal act and a security threat. It analyzes legislative initiatives and governmental strategies that enforce conformity and surveillance, highlighting the implications for citizenship and urban politics. By breaking new ground in these fields, it offers a critical perspective on the pressures shaping contemporary housing practices and the broader socio-political landscape.

      Securitization of Property Squatting in Europe
    • "An analysis of weapons-based confidence-building measures shows how academics can work together to self-police their research for national security implications, socialize new members of the academic community into the importance of considering security issues, and develop and disseminate norms regarding what is and is not a moral and ethical use of these technologies. It may be possible for academics and policymakers to come together to work for a ban or build-down on cyber weapons patterned on international efforts to ban chemical and biological weapons and implement export regimes to control the export of code which may form the components of cyber weapons. If we conceptualize cyberspace as territory, we can also learn from the example of territorially-based confidence-building measures such as those implemented along the Indo-Pakistan border. This approach stresses the importance of developing notification procedures to prevent misperceptions and the escalation spiral, as well as communicating regularly to establish trust between all parties. The case studies presented here illustrate the promises and pitfalls of each approach and offer valuable warnings to policymakers seeking to implement such measures in cyberspace. They show what happens when not everyone in a regime is equally committed to a specific outcome by illustrating the difficulties of monitoring compliance in confidence-building regimes, and show the ways in which doctrines and confidence-building measures may not be perfectly aligned"--Publisher's web site

      Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes: A Comparison of Territorial and Weapons-Based Regimes
    • As military conflicts come to an end, it is not uncommon for societies to expect a "peace dividend" and to engage in elite and popular conversations about how much defense spending is still needed. The issues are similar across countries and time periods: How can defense planners preserve capabilities, avoid the reversibility problem, and plan for the long term? How can they guide the development of technologies and doctrines in a climate of austerity? This manuscript draws lessons from previous historic situations and applies them to today. Related products: The State-Society/Citizen Relationship in Security Analysis: Implications for Planning and Implementation of U.S. Intervention and Peace/State-Building Operations can be found here: https: //bookstore.gpo.gov/products/sku/008-000-01144-3 Corruption, Legitimacy, and Stability: Implications for the U.S. Army can be found here: https: //bookstore.gpo.gov/products/sku/008-000-01254-7 The Effective Use of Reserve Personnel in the U.S. Military: Lessons from the United Kingdom Reserve Model is available here: https: //bookstore.gpo.gov/products/sku/008-000-01100-1 Rethinking the Drone War: National Security, Legitimacy, and Civilian Casualties in U.S. Counterterrorism Operations is available here: https: //bookstore.gpo.gov/products/sku/008-000-01213-0

      Do Fewer Resources Mean Less Influence?: A Comparative Historical Case Study of Military Influence in a Time of Austerity
    • Deterring Cybertrespass And Securing Cyberspace

      Lessons From United States Border Control Strategies

      • 84pages
      • 3 heures de lecture

      The book explores the application of deterrence strategies in cyberspace to protect corporate, governmental, and personal entities from hostile actors. It highlights two main approaches: deterrence by denial and deterrence by punishment. Analysts draw on traditional military deterrence concepts, but the author argues that these historical scenarios, such as nuclear or biological warfare, may not effectively translate to the unique challenges of cyberspace security. The discussion emphasizes the need for tailored strategies to address the evolving threats in the digital realm.

      Deterring Cybertrespass And Securing Cyberspace
    • Do Fewer Resources Mean Less Influence?

      • 92pages
      • 4 heures de lecture

      Exploring the aftermath of military conflicts, the book examines how societies anticipate a "peace dividend" while debating the necessity of ongoing defense spending. It addresses challenges faced by defense planners in maintaining capabilities, avoiding reversibility, and ensuring long-term planning amid austerity. By drawing lessons from historical contexts, it provides insights into guiding technological and doctrinal development in contemporary settings, highlighting the complexities of defense strategy during periods of transition.

      Do Fewer Resources Mean Less Influence?
    • Cybersecurity Ethics

      An Introduction

      • 272pages
      • 10 heures de lecture

      Focusing on cybersecurity ethics, this revised second edition provides an accessible introduction to the subject. It includes updated content and new chapters that explore critical topics such as social justice, artificial intelligence, and big data, making it a comprehensive resource for understanding the ethical implications within the field of cybersecurity.

      Cybersecurity Ethics
    • Gender, Sexuality, and Intelligence Studies

      The Spy in the Closet

      • 292pages
      • 11 heures de lecture

      Engaging with intelligence studies through queer theory, this work explores the complexities of espionage and the spy's role as a mediator between military force and diplomatic efforts. It presents the idea of a dual foreign policy, where leaders of democracies can operate with both overt and covert agendas. By examining how the intelligence community facilitates these hidden actions, the book highlights the nuanced interplay between public ideology and clandestine operations, offering a fresh perspective on critical intelligence studies and international relations.

      Gender, Sexuality, and Intelligence Studies
    • Introduction to Cyber Politics and Policy

      • 432pages
      • 16 heures de lecture

      Focusing on the intersection of technology and political science, this textbook provides a thorough introduction to cyber politics and security. It addresses the complexities of the digital landscape while exploring relevant political theories, making it an essential resource for students studying these contemporary issues. The book aims to equip readers with a foundational understanding of how cyber elements influence political dynamics and policy-making.

      Introduction to Cyber Politics and Policy
    • The book presents a critical analysis of U.S.-led drone strikes, highlighting accusations from international NGOs and legal bodies regarding potential war crimes and violations of the Law of Armed Conflict. Dr. Mary Manjikian examines the responses from military leaders to these allegations and introduces a framework to understand the various anti-drone arguments from policymakers, NGOs, and academics. Additionally, it discusses the call for regulation of autonomous weapons, emphasizing the ongoing debate surrounding military ethics and technology.

      A Typology of Arguments About Drone Ethics
    • Threat Talk

      The Comparative Politics of Internet Addiction

      • 200pages
      • 7 heures de lecture

      The book explores the contrasting perspectives of US and Chinese scientists and policymakers on internet addiction, highlighting the cultural differences in understanding its implications. Mary Manjikian argues that the internet's impact is not universally beneficial or harmful; instead, its significance and associated risks vary across societies. Through a culturalist lens, the work delves into how these differing viewpoints shape responses to the challenges posed by internet use.

      Threat Talk