Description |
1 online resource (149 p.) |
Series |
Routledge Studies in the Growth Economies of Asia Ser |
|
Routledge Studies in the Growth Economies of Asia Ser
|
Contents |
Cover -- Half Title -- Series Information -- Title Page -- Copyright Page -- Table of contents -- Foreword -- Acknowledgements -- Cyber glossary -- Abbreviations -- 1 Introduction -- IP theft -- IP vulnerability -- Who is carrying out IPR theft? -- Cyberwarfare definitions and directions -- Cyberwarfare and insurance -- Cyberwarfare and political interference -- Cyberwarfare IP theft -- Cybermercenaries -- Sectoral targets of cyberattack -- Shipping and aviation sectors -- Cyber and state control -- SME companies -- Maritime sector -- Internet of Things -- Data breaches -- Notes |
|
2 IP theft and cyberwarfare -- Where and by whom? -- Counter accusations and IP theft -- Cyberattack to fund IP theft for WMD -- Russian cyberwarfare and IP theft -- Geo-political importance of Visegrád countries for cyberwarfare -- Clues to the Russian cyberattack -- Eastern European foreign ministries attacked -- Iran as a source of geo-political cyberattacks -- The IoT's growing importance -- Cryptocurrencies -- another cyber risk -- Supply-chain cyberattack entry -- Notes -- 3 Japan -- Shogo shosha and SMEs -- Group and hierarchal decision-making -- Supply-chain cyber weaknesses |
|
SMEs under cyberattack -- Prevention of cyberattack -- Information sharing -- Cybersecurity Act revision -- Challenges of information sharing -- Outsourcing analysis -- Societal interdisciplinary involvement -- Real-time information sharing -- Cybersecurity 2018 and 2019 -- Structure of the CSC -- How activities of the CSC would work -- Measures for merging cyberspace and physical space -- Changing cyberspace and increased seriousness of threats -- Performance and assessment of cybersecurity measures, 2018 -- Risk management practice -- Development of human resources |
|
Future of ICT and Japanese cybersecurity -- Trends and outlook of the global cybersecurity market and in Japan -- Comparison of R&D between foreign companies and Japanese companies -- Global ranking of R&D spending -- Japanese ranking of R&D spending -- Chinese ranking of R&D spending -- Environment surrounding start-ups and Japan's presence -- Potential security threat from 5G -- Trends in standardisation and countermeasures -- Cybersecurity R&D in USA, UK, Israel and Singapore -- Federal cybersecurity R&D strategic plan in the USA -- Short term -- Deter -- Protect -- Detect -- Adapt |
|
Medium term -- Deter -- Protect -- Detect -- Adapt -- Long term -- Deter -- Protect -- Detect -- Adapt -- ACE in the UK -- Israel's cybersecurity eco system -- Academic eco system with its origin in the security area -- Establishment of the Cyber Spark -- Singapore's national cybersecurity R&D -- Innovation as key to success -- Notes -- 4 Russia -- Cyberwarfare and disinformation -- Internal control a priority -- Runet global internet alternative -- Cyberattacks and cyberwarfare -- Social media used by Russians -- Cyberwarfare enters Latin America -- Rogue cybercriminal hackers/mercenaries |
Notes |
Description based upon print version of record |
|
Geo-political interference |
Subject |
Cyberterrorism -- Cross-cultural studies
|
|
Intellectual property infringement -- Cross-cultural studies
|
|
Cyberterrorism
|
|
Intellectual property infringement
|
Genre/Form |
Cross-cultural studies
|
Form |
Electronic book
|
ISBN |
9780429841972 |
|
0429841973 |
|
9780429841965 |
|
0429841965 |
|
9780429841958 |
|
0429841957 |
|
9780429453199 |
|
0429453191 |
|