Cargando…

Cybersecurity in Humanities and Social Sciences A Research Methods Approach.

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Loiseau, Hugo
Otros Autores: Ventre, Daniel, Aden, Hartmut
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2020.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_on1202458511
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 201031s2020 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d EBLCP  |d REDDC  |d IEEEE  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1202449053 
020 |a 9781119777564 
020 |a 1119777569 
020 |a 9781119777588  |q (electronic bk.) 
020 |a 1119777585  |q (electronic bk.) 
020 |a 9781119777571  |q (electronic bk.) 
020 |a 1119777577  |q (electronic bk.) 
024 7 |a 10.1002/9781119777588  |2 doi 
035 |a (OCoLC)1202458511  |z (OCoLC)1202449053 
037 |a 9820912  |b IEEE 
050 4 |a QA76.9.A25  |b .C934 2020 
082 0 4 |a 005.8072 
049 |a UAMI 
100 1 |a Loiseau, Hugo. 
245 1 0 |a Cybersecurity in Humanities and Social Sciences  |h [electronic resource] :  |b A Research Methods Approach. 
260 |a Newark :  |b John Wiley & Sons, Incorporated,  |c 2020. 
300 |a 1 online resource (241 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 1 The "Science" of Cybersecurity in the Human and Social Sciences: Issues and Reflections -- 1.1. Introduction -- 1.2. A method? -- 1.3. Data? -- 1.4. One or more definition(s)? -- 1.5. Conclusion -- 1.6. References -- Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity -- 2.1. Introduction -- 2.2. Definition -- 2.2.1. What is a definition? -- 2.2.2. Usefulness of definitions -- 2.2.3. Rules for constructing definitions -- 2.2.4. Definitions of cybersecurity -- 2.3. Typology 
505 8 |a 2.3.1. What is a typology? -- 2.3.2. Usefulness of typologies -- 2.3.3. Rules for the construction of typologies -- 2.3.4. Cybersecurity typologies -- 2.4. Taxonomy -- 2.4.1. What is a taxonomy? -- 2.4.2. Usefulness of taxonomy -- 2.4.3. Rules for the construction of taxonomies -- 2.4.4. Taxonomies of cybersecurity -- 2.5. Ontologies -- 2.5.1. What is ontology? -- 2.5.2. Usefulness of ontologies -- 2.5.3. Rules for construction of ontologies -- 2.5.4. Cybersecurity ontologies -- 2.6. Conclusion -- 2.7. References 
505 8 |a Chapter 3 Cybersecurity and Data Protection -- Research Strategies and Limitations in a Legal and Public Policy Perspective -- 3.1. Introduction -- 3.2. Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? -- 3.2.1. Potential tensions between cybersecurity and data protection -- 3.2.2. Potential synergies between cybersecurity and data protection -- 3.3. Methodological approaches and challenges for the study of cybersecurity -- legal and public policy perspectives 
505 8 |a 3.3.1. Legal interpretation and comparison as methodological approaches to the study of cybersecurity -- 3.3.2. Public policy approaches to the study of cybersecurity -- 3.3.3. Transdisciplinary synergies between legal and public policy perspectives -- 3.4. Conclusion and outlook -- 3.5. References -- Chapter 4 Researching State-sponsored Cyber-espionage -- 4.1. Defining cybersecurity and cyber-espionage -- 4.2. Taxonomies of cyber-threats -- 4.3. The structure of this chapter -- 4.4. The significance of state-sponsored cyber-espionage -- 4.5. Research themes in state-sponsored cyber-espionage 
505 8 |a 4.6. Theorizing state-sponsored cyber-espionage in the social sciences -- 4.7. Research methodologies into state-sponsored cyberespionage -- 4.8. Intellectual precision and objectivity in state-sponsored cyber-espionage research -- 4.9. Detecting state actors in cyber-espionage research -- 4.10. Identifying specific state actors in cyber-espionage research -- 4.11. Conclusion: researching a transformational subject -- 4.12. References -- Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk -- 5.1. Introduction -- 5.2. The scientific approach to move from uncertainty to risk 
500 |a 5.3. Learning about the data: the exploratory phase. 
520 |a The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security  |x Research. 
650 6 |a Sécurité informatique  |x Recherche. 
700 1 |a Ventre, Daniel. 
700 1 |a Aden, Hartmut. 
758 |i has work:  |a Cybersecurity in humanities and social sciences (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFDQhCd99y4786RHKVv7Md  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Loiseau, Hugo  |t Cybersecurity in Humanities and Social Sciences : A Research Methods Approach  |d Newark : John Wiley & Sons, Incorporated,c2020  |z 9781786305398 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6370636  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6370636 
994 |a 92  |b IZTAP