Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Weary Giants of Flesh and Steel : = ...
~
ProQuest Information and Learning Co.
Weary Giants of Flesh and Steel : = Three Articles on the State and Information Security.
Record Type:
Language materials, manuscript : Monograph/item
Title/Author:
Weary Giants of Flesh and Steel :/
Reminder of title:
Three Articles on the State and Information Security.
Author:
Herr, Trey.
Description:
1 online resource (317 pages)
Notes:
Source: Dissertation Abstracts International, Volume: 77-08(E), Section: A.
Contained By:
Dissertation Abstracts International77-08A(E).
Subject:
Political science. -
Online resource:
click for full text (PQDT)
ISBN:
9781339585963
Weary Giants of Flesh and Steel : = Three Articles on the State and Information Security.
Herr, Trey.
Weary Giants of Flesh and Steel :
Three Articles on the State and Information Security. - 1 online resource (317 pages)
Source: Dissertation Abstracts International, Volume: 77-08(E), Section: A.
Thesis (Ph.D.)
Includes bibliographical references
This item is not available from ProQuest Dissertations & Theses.
This dissertation explores the dynamic of control between politics and technology, looking at three particular facets -- assimilation, restriction, and standardization -- as examples of the evolving relationship between the state and information security. Chapter 1 looks at the process of assimilation as the state attempts to use information security toward its own ends. Critiquing contemporary arguments on the presence of an offensive advantage in information security, this chapter breaks open the previously black boxed process of developing and deploying offensive capabilities by the state. Particularly, it examines how the software development process impacts, and often limits, the state's ability to employ malicious tools especially in lieu of conventional alternatives like precision guided bombs. Advancing the argument that there is substantial complexity in the offensive process, the chapter concludes that existing assumptions for ease of use and the likelihood of rapid escalation prevalent in literature on the topic are exaggerated owing to the challenges in assimilating and employing information security tools in a conflict environment.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781339585963Subjects--Topical Terms:
558774
Political science.
Index Terms--Genre/Form:
554714
Electronic books.
Weary Giants of Flesh and Steel : = Three Articles on the State and Information Security.
LDR
:04187ntm a2200397Ki 4500
001
911639
005
20180531091026.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781339585963
035
$a
(MiAaPQ)AAI10076294
035
$a
(MiAaPQ)gwu:13060
035
$a
AAI10076294
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Herr, Trey.
$3
1183594
245
1 0
$a
Weary Giants of Flesh and Steel :
$b
Three Articles on the State and Information Security.
264
0
$c
2016
300
$a
1 online resource (317 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 77-08(E), Section: A.
500
$a
Adviser: Susan K. Sell.
502
$a
Thesis (Ph.D.)
$c
The George Washington University
$d
2016.
504
$a
Includes bibliographical references
506
$a
This item is not available from ProQuest Dissertations & Theses.
520
$a
This dissertation explores the dynamic of control between politics and technology, looking at three particular facets -- assimilation, restriction, and standardization -- as examples of the evolving relationship between the state and information security. Chapter 1 looks at the process of assimilation as the state attempts to use information security toward its own ends. Critiquing contemporary arguments on the presence of an offensive advantage in information security, this chapter breaks open the previously black boxed process of developing and deploying offensive capabilities by the state. Particularly, it examines how the software development process impacts, and often limits, the state's ability to employ malicious tools especially in lieu of conventional alternatives like precision guided bombs. Advancing the argument that there is substantial complexity in the offensive process, the chapter concludes that existing assumptions for ease of use and the likelihood of rapid escalation prevalent in literature on the topic are exaggerated owing to the challenges in assimilating and employing information security tools in a conflict environment.
520
$a
Chapter 2 takes up the question of control through restriction, explaining the repeated use of export controls to regulate the diffusion of information security products globally. Set against a collection of legal tools seemingly ill-fitted to controlling the flow of software, the Departments of Commerce, State, and Defense have persisted in the application of export controls to limit trade in information security products. Rather than adapt to a changing commercial and research environment or craft policy tools better suited to curtail the spread of information security products abroad, the U.S. continued to apply and only moderately tweak the composition of export controls despite their limited effectiveness. This chapter explains the selection of these controls and their persistence as a product of boundedly rational behavior to minimize transaction costs and change in standard operating procedures, even at the cost of reduced regulatory efficacy.
520
$a
Chapter 3 looks at standardization, trying to answer if the recent emergence of the information security insurance industry as a means of private governance is a product of the state's failure to set and enforce standards or the private sector's opportunistic action to lock in material benefit. Synthesizing previous state efforts to create standards with literature on private governance and its internal debates, the chapter examines the history and process of insurance. It argues that a market driven enforcement mechanism was key to providing financial benefit to companies willing to lead in the governance process.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Political science.
$3
558774
650
4
$a
Information technology.
$3
559429
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0615
690
$a
0489
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
The George Washington University.
$b
Political Science.
$3
1183595
773
0
$t
Dissertation Abstracts International
$g
77-08A(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10076294
$z
click for full text (PQDT)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login