語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Weary Giants of Flesh and Steel : = ...
~
ProQuest Information and Learning Co.
Weary Giants of Flesh and Steel : = Three Articles on the State and Information Security.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Weary Giants of Flesh and Steel :/
其他題名:
Three Articles on the State and Information Security.
作者:
Herr, Trey.
面頁冊數:
1 online resource (317 pages)
附註:
Source: Dissertation Abstracts International, Volume: 77-08(E), Section: A.
Contained By:
Dissertation Abstracts International77-08A(E).
標題:
Political science. -
電子資源:
click for full text (PQDT)
ISBN:
9781339585963
Weary Giants of Flesh and Steel : = Three Articles on the State and Information Security.
Herr, Trey.
Weary Giants of Flesh and Steel :
Three Articles on the State and Information Security. - 1 online resource (317 pages)
Source: Dissertation Abstracts International, Volume: 77-08(E), Section: A.
Thesis (Ph.D.)
Includes bibliographical references
This item is not available from ProQuest Dissertations & Theses.
This dissertation explores the dynamic of control between politics and technology, looking at three particular facets -- assimilation, restriction, and standardization -- as examples of the evolving relationship between the state and information security. Chapter 1 looks at the process of assimilation as the state attempts to use information security toward its own ends. Critiquing contemporary arguments on the presence of an offensive advantage in information security, this chapter breaks open the previously black boxed process of developing and deploying offensive capabilities by the state. Particularly, it examines how the software development process impacts, and often limits, the state's ability to employ malicious tools especially in lieu of conventional alternatives like precision guided bombs. Advancing the argument that there is substantial complexity in the offensive process, the chapter concludes that existing assumptions for ease of use and the likelihood of rapid escalation prevalent in literature on the topic are exaggerated owing to the challenges in assimilating and employing information security tools in a conflict environment.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781339585963Subjects--Topical Terms:
558774
Political science.
Index Terms--Genre/Form:
554714
Electronic books.
Weary Giants of Flesh and Steel : = Three Articles on the State and Information Security.
LDR
:04187ntm a2200397Ki 4500
001
911639
005
20180531091026.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781339585963
035
$a
(MiAaPQ)AAI10076294
035
$a
(MiAaPQ)gwu:13060
035
$a
AAI10076294
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Herr, Trey.
$3
1183594
245
1 0
$a
Weary Giants of Flesh and Steel :
$b
Three Articles on the State and Information Security.
264
0
$c
2016
300
$a
1 online resource (317 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 77-08(E), Section: A.
500
$a
Adviser: Susan K. Sell.
502
$a
Thesis (Ph.D.)
$c
The George Washington University
$d
2016.
504
$a
Includes bibliographical references
506
$a
This item is not available from ProQuest Dissertations & Theses.
520
$a
This dissertation explores the dynamic of control between politics and technology, looking at three particular facets -- assimilation, restriction, and standardization -- as examples of the evolving relationship between the state and information security. Chapter 1 looks at the process of assimilation as the state attempts to use information security toward its own ends. Critiquing contemporary arguments on the presence of an offensive advantage in information security, this chapter breaks open the previously black boxed process of developing and deploying offensive capabilities by the state. Particularly, it examines how the software development process impacts, and often limits, the state's ability to employ malicious tools especially in lieu of conventional alternatives like precision guided bombs. Advancing the argument that there is substantial complexity in the offensive process, the chapter concludes that existing assumptions for ease of use and the likelihood of rapid escalation prevalent in literature on the topic are exaggerated owing to the challenges in assimilating and employing information security tools in a conflict environment.
520
$a
Chapter 2 takes up the question of control through restriction, explaining the repeated use of export controls to regulate the diffusion of information security products globally. Set against a collection of legal tools seemingly ill-fitted to controlling the flow of software, the Departments of Commerce, State, and Defense have persisted in the application of export controls to limit trade in information security products. Rather than adapt to a changing commercial and research environment or craft policy tools better suited to curtail the spread of information security products abroad, the U.S. continued to apply and only moderately tweak the composition of export controls despite their limited effectiveness. This chapter explains the selection of these controls and their persistence as a product of boundedly rational behavior to minimize transaction costs and change in standard operating procedures, even at the cost of reduced regulatory efficacy.
520
$a
Chapter 3 looks at standardization, trying to answer if the recent emergence of the information security insurance industry as a means of private governance is a product of the state's failure to set and enforce standards or the private sector's opportunistic action to lock in material benefit. Synthesizing previous state efforts to create standards with literature on private governance and its internal debates, the chapter examines the history and process of insurance. It argues that a market driven enforcement mechanism was key to providing financial benefit to companies willing to lead in the governance process.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Political science.
$3
558774
650
4
$a
Information technology.
$3
559429
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0615
690
$a
0489
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
The George Washington University.
$b
Political Science.
$3
1183595
773
0
$t
Dissertation Abstracts International
$g
77-08A(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10076294
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入