Afficher la notice abrégée

dc.contributor.authorSchrijvers, Erik
dc.contributor.authorPrins, Corien
dc.contributor.authorPasschier, Reijer
dc.date.accessioned2021-10-14T04:07:35Z
dc.date.available2021-10-14T04:07:35Z
dc.date.issued2021
dc.date.submitted2021-10-13T13:52:53Z
dc.identifierONIX_20211013_9783030778385_16
dc.identifierOCN: 1272954527
dc.identifierhttps://library.oapen.org/handle/20.500.12657/50947
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/72286
dc.description.abstractThis open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infrastructure. The increasing use of digital technology implies new and significant vulnerabilities for our society. However, it is striking that almost all cyber-security measures taken by governments, international bodies and other major players are aimed at preventing incidents. But there is no such thing as total digital security. Whether inside or outside the digital domain, incidents can and will occur and may lead to disruption. While a raft of provisions, crisis contingency plans and legal regulations are in place to deal with the possibility of incidents in the ‘real world’, no equivalence exists for the digital domain and digital disruption. Hence, this book uniquely discusses several specific policy measures government and businesses should take in order to be better prepared to deal with a digital disruption and prevent further escalation.
dc.languageEnglish
dc.relation.ispartofseriesResearch for Policy
dc.rightsopen access
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer securityen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UB Information technology: general topicsen_US
dc.subject.classificationthema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relationsen_US
dc.subject.classificationthema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV Crime and criminologyen_US
dc.subject.classificationthema EDItEUR::J Society and Social Sciences::JP Politics and government::JPP Public administrationen_US
dc.subject.otherCyber Attacks
dc.subject.otherCrisis Contingency Planning
dc.subject.otherCrisis Management
dc.subject.otherCritical Infrastructures
dc.subject.otherCritical Information Infrastructures
dc.subject.otherCyber Insurance
dc.subject.otherCyber Security Policy
dc.subject.otherCyber War
dc.subject.otherDisaster
dc.subject.otherOpen Access
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UR Computer security
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UB Information technology: general topics
dc.subject.otherthema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relations
dc.subject.otherthema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV Crime and criminology
dc.subject.otherthema EDItEUR::J Society and Social Sciences::JP Politics and government::JPP Public administration
dc.titlePreparing for Digital Disruption
dc.typebook
oapen.identifier.doi10.1007/978-3-030-77838-5
oapen.relation.isPublishedBy9fa3421d-f917-4153-b9ab-fc337c396b5a
oapen.relation.isFundedByNorthern Arizona University
oapen.relation.isFundedBy9e14e39f-14b1-4a12-bdd2-aa86f536ee73
oapen.relation.isbn9783030778385
oapen.imprintSpringer
oapen.pages74
oapen.grant.number[grantnumber unknown]
dc.relationisFundedBy9e14e39f-14b1-4a12-bdd2-aa86f536ee73


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée

open access
Excepté là où spécifié autrement, la license de ce document est décrite en tant que open access