Rewired : the past, present, and future of cybersecurity /: the past, present, and future of cybersecurity. (2016)
- Record Type:
- Book
- Title:
- Rewired : the past, present, and future of cybersecurity /: the past, present, and future of cybersecurity. (2016)
- Main Title:
- Rewired : the past, present, and future of cybersecurity
- Further Information:
- Note: Ryan Ellis, Vivek Mohan.
- Authors:
- Ellis, Ryan
Mohan, Vivek K - Contents:
- Notes on Contributors Acknowledgement Introduction: Rewired: Cybersecurity Governance; Ryan Ellis and Vivek Mohan Chapter 1: Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs; Elaine Sedenberg and Jim Dempsey Chapter 2: Cybersecurity Governance in the GCC; James Shires Chapter 3: The United Kingdom’s Emerging Internet of Things (IoT) Policy Landscape; Leonie Maria Tanczer, Irina Brass, Miles Elsden, Madeline Carr, and Jason Blackstock Chapter 4: Birds of a Feather: Strategies for Collective Cybersecurity in the Aviation Ecosystem; Emilian Papadopoulos and Evan Sills Chapter 5: An Incidents-Based Conceptualization of Cybersecurity Governance; Jacqueline Eggenschwiler Chapter 6: Cyber Governance and the Financial Services Sector: The Role of Public-Private Partnerships; Valeria San Juan and Aaron Martin Chapter 7: The Regulation of Botnets: How Does Cybersecurity Governance Theory Work When Everyone is a Stakeholder?; Samantha A. Adams, Karine e Silva, Bert-Jaap Koops, Bart van der Sloot Chapter 8: Governing Risk: The Emergence of Cyber Insurance; Trey Herr Chapter 9: Containing Conficker: A Public Health Approach; Michael Thornton Chapter 10: Bug Bounty Programs: Institutional Variation and the Different Meanings of Security; Andreas Kuehn and Ryan Ellis Chapter 11: Rethinking Data, Geography, and Jurisdiction: A Common Framework for Harmonizing Global Data Flow Controls; Jonah Force Hill and Matthew Noyes Chapter 12:Notes on Contributors Acknowledgement Introduction: Rewired: Cybersecurity Governance; Ryan Ellis and Vivek Mohan Chapter 1: Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs; Elaine Sedenberg and Jim Dempsey Chapter 2: Cybersecurity Governance in the GCC; James Shires Chapter 3: The United Kingdom’s Emerging Internet of Things (IoT) Policy Landscape; Leonie Maria Tanczer, Irina Brass, Miles Elsden, Madeline Carr, and Jason Blackstock Chapter 4: Birds of a Feather: Strategies for Collective Cybersecurity in the Aviation Ecosystem; Emilian Papadopoulos and Evan Sills Chapter 5: An Incidents-Based Conceptualization of Cybersecurity Governance; Jacqueline Eggenschwiler Chapter 6: Cyber Governance and the Financial Services Sector: The Role of Public-Private Partnerships; Valeria San Juan and Aaron Martin Chapter 7: The Regulation of Botnets: How Does Cybersecurity Governance Theory Work When Everyone is a Stakeholder?; Samantha A. Adams, Karine e Silva, Bert-Jaap Koops, Bart van der Sloot Chapter 8: Governing Risk: The Emergence of Cyber Insurance; Trey Herr Chapter 9: Containing Conficker: A Public Health Approach; Michael Thornton Chapter 10: Bug Bounty Programs: Institutional Variation and the Different Meanings of Security; Andreas Kuehn and Ryan Ellis Chapter 11: Rethinking Data, Geography, and Jurisdiction: A Common Framework for Harmonizing Global Data Flow Controls; Jonah Force Hill and Matthew Noyes Chapter 12: Private Ordering Shaping Cybersecurity Policy: The Case of Bug Bounties; Amit Elazari Bar On … (more)
- Edition:
- 1st
- Publisher Details:
- Hoboken, New Jersey : John Wiley & Sons, Inc
- Publication Date:
- 2016
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer networks -- Security measures - Languages:
- English
- ISBNs:
- 9781119085171
- Related ISBNs:
- 9781119085201
- Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.416297
- Ingest File:
- 02_520.xml