|
Sort Order |
|
|
|
Items / Page
|
|
|
|
|
|
|
Srl | Item |
1 |
ID:
150490
|
|
|
Summary/Abstract |
The “Snowden leaks” and censorship methods used during the Arab Spring have brought warranted attention to technologically supported censorship and surveillance (Bauman et al. 2014; Deibert and Crete-Nishihata 2012, 344). The public is now aware how digital tools and information are prone to tracing, interception, and suppression. Processes of eavesdropping and information collection (i.e., surveillance) are often interrelated with processes of removal, displacement, and restriction of material or speech (i.e., censorship). Both are often enshrouded in secrecy, leaving censorship and surveillance techniques open to abuses (Setty 2015).
|
|
|
|
|
|
|
|
|
|
2 |
ID:
049576
|
|
|
Publication |
London, Fourth Estate Limited, 1999.
|
Description |
xiii, 402p.
|
Standard Number |
1857028791
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
043583 | 327.12/SIN 043583 | Main | On Shelf | General | |
|
|
|
|
3 |
ID:
171855
|
|
|
Summary/Abstract |
Recently, historians have started to consider the role and evolution of secrecy in American foreign affairs in the post-1945 period. A special issue of this journal was even devoted to it in 2011.1 Yet historians have never meaningfully considered secrecy’s role in U.S. international relations prior to the Second World War. International historians have neglected to appreciate that the United States’ present institutionalized culture of official secrecy concerning foreign affairs is, uniquely among the nineteenth century’s great powers, wholly a creature of the twentieth century and would be profoundly alien to any of the State Department’s occupants in the years leading up to the First World War. Whereas the publication of State Department cables in 2010 on WikiLeaks provoked paroxysms of official panic, during the second half of the nineteenth century such publications were not only routine but undertaken annually by the department itself. Secrecy simply was not integral to how the nation went about its business abroad.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
192045
|
|
|
Summary/Abstract |
Cybersecurity plays a role in national security. This study introduces cybersecurity concepts in ways familiar to defense economists and identifies parallel methods of analysis in the fields. The theoretical tools of both fields include microeconomics and game theory. These tools enable analyses of phenomena present in both milieus: public goods, externalities, commons, incentives, interdependent security, platform economics, and inefficiency of decentralized decision making. Additional topics include cyber war, cyberterrorism, deterrence and disinformation in cyberspace, price of anarchy, and economics of cryptography.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
047343
|
|
|
Publication |
DelhI, Macmillan India Ltd., 2001.
|
Description |
xix, 608p.
|
Standard Number |
0333936795
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
044826 | 005.8/FAD 044826 | Main | On Shelf | General | |
|
|
|
|
|
|
|
|
|