Book Cover; Title; Copyright; Contents; Illustrations; Acknowledgements; Abbreviations; Introduction; 1 The information age and cyber-threats: Shifting meanings and interpretations; 2 Politics and threat construction: Theoretical underpinnings; 3 The hostile intelligence threat, data security, and encryption set the stage; 4 Asymmetric vulnerabilities and the double-edged sword of information warfare: Developments in the military domain; 5 Critical infrastructures and homeland security; 6 Securing the information age: Failed securitisation or a new logic of security?
7 Cyber-threats and security in the information age: Issues and implicationsBibliography; Index
Summary
This book explores how cyber-threats are constructed and propelled onto the political agenda, with a specific focus on the United States