Cybersecurity in Humanities and Social Sciences - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Reference > Research and information: general > Coding theory and cryptology > Cybersecurity in Humanities and Social Sciences: A Research Methods Approach
Cybersecurity in Humanities and Social Sciences: A Research Methods Approach

Cybersecurity in Humanities and Social Sciences: A Research Methods Approach


     0     
5
4
3
2
1



International Edition


X
About the Book

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?

Table of Contents:
Introduction ix Daniel VENTRE, Hugo LOISEAU and Hartmut ADEN Chapter 1 The “Science” of Cybersecurity in the Human and Social Sciences: Issues and Reflections 1 Hugo LOISEAU 1.1 Introduction 1 1.2 A method? 4 1.3 Data? 11 1.4 One or more definition(s)? 16 1.5 Conclusion 20 1.6 References 21 Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity 25 Daniel VENTRE 2.1 Introduction 25 2.2 Definition 27 2.2.1 What is a definition? 27 2.2.2 Usefulness of definitions 29 2.2.3 Rules for constructing definitions 29 2.2.4 Definitions of cybersecurity 32 2.3 Typology 43 2.3.1 What is a typology? 44 2.3.2 Usefulness of typologies 44 2.3.3 Rules for the construction of typologies 45 2.3.4 Cybersecurity typologies 46 2.4 Taxonomy 48 2.4.1 What is a taxonomy? 48 2.4.2 Usefulness of taxonomy 49 2.4.3 Rules for the construction of taxonomies 49 2.4.4 Taxonomies of cybersecurity 50 2.5 Ontologies 51 2.5.1 What is ontology? 52 2.5.2 Usefulness of ontologies 53 2.5.3 Rules for construction of ontologies 53 2.5.4 Cybersecurity ontologies 54 2.6 Conclusion 56 2.7 References 57 Chapter 3 Cybersecurity and Data Protection – Research Strategies and Limitations in a Legal and Public Policy Perspective 67 Hartmut ADEN 3.1 Introduction 67 3.2 Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? 68 3.2.1 Potential tensions between cybersecurity and data protection 69 3.2.2 Potential synergies between cybersecurity and data protection 72 3.3 Methodological approaches and challenges for the study of cybersecurity – legal and public policy perspectives 74 3.3.1 Legal interpretation and comparison as methodological approaches to the study of cybersecurity 74 3.3.2 Public policy approaches to the study of cybersecurity 77 3.3.3 Transdisciplinary synergies between legal and public policy perspectives 78 3.4 Conclusion and outlook 80 3.5 References 81 Chapter 4 Researching State-sponsored Cyber-espionage 85 Joseph FITSANAKIS 4.1 Defining cybersecurity and cyber-espionage 85 4.2 Taxonomies of cyber-threats 87 4.3 The structure of this chapter 88 4.4 The significance of state-sponsored cyber-espionage 90 4.5 Research themes in state-sponsored cyber-espionage 94 4.6 Theorizing state-sponsored cyber-espionage in the social sciences 98 4.7 Research methodologies into state-sponsored cyber-espionage 104 4.8 Intellectual precision and objectivity in state-sponsored cyber-espionage research 106 4.9 Detecting state actors in cyber-espionage research 110 4.10 Identifying specific state actors in cyber-espionage research 112 4.11 Conclusion: researching a transformational subject 116 4.12 References 118 Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk 123 Michel DACOROGNA and Marie KRATZ 5.1 Introduction 123 5.2 The scientific approach to move from uncertainty to risk 124 5.3 Learning about the data: the exploratory phase 126 5.4 Data cleansing 128 5.5 Statistical exploration on the various variables of the dataset 130 5.6 Univariate modeling for the relevant variables 134 5.7 Multivariate and dynamic modeling 139 5.7.1 A fast-changing environment: time dependency 140 5.7.2 Causal relations 143 5.7.3 Models for prediction 147 5.8 Conclusion 149 5.9 Acknowledgments 151 5.10 References 151 Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research 153 Brett VAN NIEKERK and Trishana RAMLUCKAN 6.1 Introduction 153 6.1.1 Previous research 154 6.2 Information warfare and cybersecurity 154 6.3 Researching information warfare and cybersecurity 156 6.4 Qualitative research methodologies for information warfare and cybersecurity 157 6.4.1 Clustering of documents 159 6.4.2 Clustering of words 159 6.4.3 Word frequencies and word clouds 159 6.4.4 Text search and word trees 159 6.4.5 Example use cases of qualitative document analysis 160 6.5 An analysis of national cybersecurity strategies 161 6.5.1 Selection process for the documents 161 6.5.2 Analysis 162 6.5.3 Discussion 167 6.6 An analysis of the alignment of South Africa’s Cybercrimes Bill to international legislation 169 6.6.1 Background to the documents 169 6.6.2 Analysis 170 6.6.3 Discussion 174 6.7 An analysis of the influence of classical military philosophy on seminal information warfare texts 176 6.8 Reflections on qualitative document analysis for information warfare and cybersecurity research 177 6.9 Conclusion 179 6.10 References 180 Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France 185 Elena WALDISPUEHL 7.1 Introduction 185 7.2 Localization of an online field 187 7.2.1 Online ethnographic work and empathy 192 7.2.2 Cybersecurity issues of an online field 193 7.3 Online–offline continuum 194 7.4 Continuum between security and insecurity 199 7.5 Conclusion 204 7.6 References 205 List of Authors 211 Index 213

About the Author :
Hugo LOISEAU, École de politique appliquée Faculté des lettres et sciences humaines Université de Sherbrooke Quebec Canada. Daniel VENTRE, CESDIP Laboratory CNRS Guyancourt France. Hartmut ADEN, Berlin School of Economics and Law Berlin Institute for Safety and Security Research Germany.


Best Sellers


Product Details
  • ISBN-13: 9781786305398
  • Publisher: ISTE Ltd and John Wiley & Sons Inc
  • Publisher Imprint: ISTE Ltd and John Wiley & Sons Inc
  • Height: 10 mm
  • No of Pages: 240
  • Returnable: N
  • Sub Title: A Research Methods Approach
  • Width: 10 mm
  • ISBN-10: 1786305399
  • Publisher Date: 27 Nov 2020
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 10 mm
  • Weight: 538 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cybersecurity in Humanities and Social Sciences: A Research Methods Approach
ISTE Ltd and John Wiley & Sons Inc -
Cybersecurity in Humanities and Social Sciences: A Research Methods Approach
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cybersecurity in Humanities and Social Sciences: A Research Methods Approach

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!