Cargando…

Cybersecurity in Switzerland

Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leadi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Dunn Cavelty, Myriam (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2014.
Edición:1st ed. 2014.
Colección:SpringerBriefs in Cybersecurity,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-10620-5
003 DE-He213
005 20220112221657.0
007 cr nn 008mamaa
008 141011s2014 sz | s |||| 0|eng d
020 |a 9783319106205  |9 978-3-319-10620-5 
024 7 |a 10.1007/978-3-319-10620-5  |2 doi 
050 4 |a K564.C6 
072 7 |a UBL  |2 bicssc 
072 7 |a LAW099000  |2 bisacsh 
072 7 |a UBL  |2 thema 
082 0 4 |a 343.0999  |2 23 
100 1 |a Dunn Cavelty, Myriam.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Cybersecurity in Switzerland  |h [electronic resource] /  |c by Myriam Dunn Cavelty. 
250 |a 1st ed. 2014. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014. 
300 |a X, 75 p. 2 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Cybersecurity,  |x 2193-9748 
505 0 |a Foreword -- List of Abbreviations -- Introduction -- Global Cyber-security Policy Evolution -- Phase 1: The Four Pillar Model for Information Assurance (1997-2004) -- Phase 2: Reporting and Analysis Center for Information Assurance (MELANI) (2004-2010) -- Phase 3: Consolidation and Cyber-Risk Strategy (2011-2014) -- Conclusion. 
520 |a Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leading up to these strategy documents. The peculiarities of the Swiss political system, which influence the way cyber-security can be designed and practiced in Switzerland are considered, as well as the bigger, global influences and driving factors that shaped the Swiss approach to cyber-security. It shows that throughout the years, the most important influence on the Swiss policy-approach was the international level, or rather the developments of a cyber-security policy in other states. Even though many of the basic ideas about information-sharing and public-private partnerships were influenced by (amongst others) the US approach to critical infrastructure protection, the peculiarities of the Swiss political system has led to a particular "Swiss solution", which is based on the federalist structures and subsidiary principles, characterized by stability and resilience to external shocks in the form of cyber-incidents. Cybersecurity in Switzerland will be a stimulating read for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers. It contains not only specific material on an interesting case,  but also a wealth of background information on different variations of cyber-security, as well as on information-sharing and public-private partnerships. 
650 0 |a Computers-Law and legislation. 
650 0 |a Information technology-Law and legislation. 
650 0 |a International law. 
650 0 |a Criminology. 
650 0 |a Data protection. 
650 1 4 |a Legal Aspects of Computing. 
650 2 4 |a Public International Law. 
650 2 4 |a Criminology. 
650 2 4 |a Data and Information Security. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319106212 
776 0 8 |i Printed edition:  |z 9783319106199 
830 0 |a SpringerBriefs in Cybersecurity,  |x 2193-9748 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-10620-5  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)