Request Inspection Copy

If you are an Academic or Teacher and wish to consider this book as a prescribed textbook for your course, you may be eligible for a complimentary inspection copy. Please complete this form, including information about your position, campus and course, before adding to cart.

* Required Fields

To complete your Inspection Copy Request you will need to click the Checkout button in the right margin and complete the checkout formalities. You can include Inspection Copies and purchased items in the same shopping cart, see our Inspection Copy terms for further information.

Any Questions? Please email our text Support Team on text@footprint.com.au

Submit

Email this to a friend

* ALL required Fields

Order Inspection Copy

An inspection copy has been added to your shopping cart

Introduction to Cyber Politics and Policy

by Mary Manjikian CQ Press
Pub Date:
05/2020
ISBN:
9781544359304
Format:
Pbk 432 pages
Price:
AU$127.00 NZ$132.17
Product Status: Out of stock. Not available to order.
Instructors
& Academics:
Introduction to Cyber Politics and Policy is a comprehensive introductory textbook for cyber politics and security courses, and the perfect addition to any International Relations or Intelligence course. Written by Mary Manjikian, an expert in the field and an instructor who has taught the course for ten years, it assumes no prior knowledge of technical concepts, legal concepts, military concepts or international relations theory.


 


Instead, she aims to bridge the gaps between the intricacies of technology and the theories of political science. The book emphasizes the importance of collaboration and understanding between the two fields - students from both technology and political science backgrounds need to understand the implications of technology decisions and the policy questions that arise from them in order to make a meaningful contribution to ever-changing field.

Preface
Acknowledgements
1. A Brief History of the Internet
What is the internet?
The infancy of the internet (1963-1984)
The period of growth and early regulation (1984-2000)
The Securitization/Militarization of cyberspace (2000-2012)
The Era of Surveillance and Big Data (2013-present)
Conclusion
Questions for Discussion
Key Terms
For Further Reading
2. The Internet, Technology Studies and International Relations
Who decides what a technology is for?
Critical Issues: What are Digital Human Rights?
People and Places: The Great Firewall of China
The Uniqueness Debate
A World Apart or an Extension of Terrestrial Space?
People and Places: The Dark Web
Conclusion
Questions for Discussion
Key Terms
For Further Reading
3. A Realist View of Cyberspace
The Foundation of the Interstate System: A quick Review
A Realist View of Cyberthreat
People and Places: What is the Fifth Domain of Warfare?
Building a Bridge: Tools of the Trade: Hacks, Spoofs and Computer Network Exploitation (CNE)
Critical Issues: Measuring Cyber capability
The Beginning of Cyberwar
People and Places: The First Cyber Attack - Stuxnet
Conclusion
Questions for Discussion
Key Terms
For Further Reading
4. Liberal Internationalism, Cooperation and Regimes
What is Liberal Internationalism
Liberal Internationalism in Cyberspace
How do states cooperate to regulate cyberspace?
People and Places: ASEAN's Cybersecurity Regime
Opposing the Liberal Internationalist View
Critical Issues: Cryptocurrency
People and Places: The 2016 Attach on the Central Bank of Bangladesh
Conclusion
Questions for Discussion
Key Terms
For Further Reading
5. Constructivism
What is Constructivism?
Critical Issues: Politics of the Digital Silk Road
Building a Bridge: Internet Routing and Naming Protocols
Neither a Battlefield nor a Village: Language Constructs the Internet
Building a Bridge: The Physical Structure of the Internet
People and Places: What is Critical Infrastructure?
Conclusion
Questions for Discussion
Key Terms
For Further Reading
6. Governance
Governing the Internet
The Cyber Sovereignty Position
Russia's cyber realist view of cyberspace
Global Governance in Cyberspace
Can International Norms be Grafted onto Cyberspace?
Conclusion
Questions for Discussion
Key Terms
For Further Reading
7. Cybercrime
Does the Internet Encourage Crime?
The State's Role in Combatting Cybercrime
Crime as a Social Construct
Critical issues: Should People and Organizations Be “Banneda from the Internet?
An International Convention on Cybercrime?
Defining Cybercrime
Regulation and Responsibility: Who is Liable?
States and Firms Cooperate: The Example of a Botnet Takedown
The Rise of Anticipatory Policing
But is it a crime? The Example of Wikileaks
Conclusion
Questions for Discussion
Key Terms
For Further Reading
8. Private Actors
What are Technology Actors?
Are Technology Actors Competitors to States in the Internaitonal System?
Technology Actors as Gatekeepers
Technology Actors as Platforms
Technology Actors, Responsibility and Liability
What is Corporate Social Responsibility
Is Facebook a Monopoly?
Conclusion
Questions for Discussion
Key Terms
For Further Reading
9. States and Private Actors and the Provision of Cybersecurity
What are Public-Private Partnerships?
Public-Private Partnerships in the Cybersecurity Arena
Public-Private Partnerships and the Conduct of Cyberwar
Critiquing PPP's: Is what's good for General Motors also good for America?
Platforms as Foreign Policy Actors Today
Case study: Corporations, Shared Risk and the Cloud
International Legal Challenges in Cloud Computing
Case Study: Hua Wei Corporation and US-China Relations
Conclusion
Questions for Discussion
Key Terms
For Further Reading
10. Ethics
What're Ethics?
Ethical Lenses for Considering Cyber Values
Critical Issues: Information Privacy
The Emergence of Cyber Norms
Conclusion
Questions for Discussion
Key Terms
For Further Reading
11. Conflict
What is Cybersecurity?
Do Cyberweapons make the world more dangerous?
Hybrid War: Where is the battlefield in cyberspace?
Critical Issues: Space Security
Defining Acts of War
Critical Issues: Who is Winning the Cyber Arms Race
Is Cyberwar Illegal or Unethical?
Creating International Rules Governing Cyberwarfare
Solutions to Regulate and End Cyberconflict
Conclusion
Questions for Discussion
Key Terms
For Further Reading
12. The Future
What is an Emerging Technology?
Selected Future Challenges: Big Data
Building a Bridge: Quantum Computing
Selected Future Challenges: Artificial Intelligence
Building a Bridge: The Politics of Neural Networks
Critical Issues: Should the United Nations Ban Autonomous Weapons?
Building a Bridge: Smart Cities
Conclusion
Questions for Discussion
Key Terms
For Further Reading
References
Glossary

Introduction to Cyber Politics is a welcome addition to the world of international relations literature in a new and complex policy arena. It's a first-of-its-kind resource covering state-sponsored cyber threats and international regimes to cryptocurrencies and cybercrime, all in one volume.”



Dr. Mary Manjikian is Associate Dean and Professor at Regent University.  A former US Foreign Service Officer with service in The Netherlands, Russia and Bulgaria, Manjikian was a Fulbright Scholar at the Institute for Advanced Study at Durham University.  She has also served as an External Research Associate at the US Army War College.  She is the author of Apocalypse and Post-Politics:  The Romance of the End  (Lexington Books, 2012); Threat Talk:  Comparing the Discourse of Internet Addiction and User Protection in China and the United States  (Ashgate:  2012); The Securitization of Property Squatting in Western Europe (Routledge, 2013) and Cybersecurity Ethics:  An Introduction (Routledge, 2017).  Her work has also appeared in International Studies Quarterly, International Feminist Journal of Politics, International Journal of Intelligence and Counterintelligence, and Intelligence and National Security.