The Politics Of Cybersecurity In The Middle East

Download The Politics Of Cybersecurity In The Middle East full books in PDF, epub, and Kindle. Read online free The Politics Of Cybersecurity In The Middle East ebook anywhere anytime directly on your device. Fast Download speed and no annoying ads. We cannot guarantee that every ebooks is available!

The Politics of Cybersecurity in the Middle East

The Politics of Cybersecurity in the Middle East
Author :
Publisher : Oxford University Press
Total Pages : 304
Release :
ISBN-10 : 9780197651131
ISBN-13 : 0197651135
Rating : 4/5 (135 Downloads)

Book Synopsis The Politics of Cybersecurity in the Middle East by : James Shires

Download or read book The Politics of Cybersecurity in the Middle East written by James Shires and published by Oxford University Press. This book was released on 2022-05-01 with total page 304 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cybersecurity is a complex and contested issue in international politics. By focusing on the 'great powers'--the US, the EU, Russia and China--studies in the field often fail to capture the specific politics of cybersecurity in the Middle East, especially in Egypt and the GCC states. For these countries, cybersecurity policies and practices are entangled with those of long-standing allies in the US and Europe, and are built on reciprocal flows of data, capital, technology and expertise. At the same time, these states have authoritarian systems of governance more reminiscent of Russia or China, including approaches to digital technologies centred on sovereignty and surveillance. This book is a pioneering examination of the politics of cybersecurity in the Middle East. Drawing on new interviews and original fieldwork, James Shires shows how the label of cybersecurity is repurposed by states, companies and other organisations to encompass a variety of concepts, including state conflict, targeted spyware, domestic information controls, and foreign interference through leaks and disinformation. These shifting meanings shape key technological systems as well as the social relations underpinning digital development. But however the term is interpreted, it is clear that cybersecurity is an integral aspect of the region's contemporary politics.


The Politics of Cybersecurity in the Middle East Related Books

The Politics of Cybersecurity in the Middle East
Language: en
Pages: 304
Authors: James Shires
Categories: Political Science
Type: BOOK - Published: 2022-05-01 - Publisher: Oxford University Press

DOWNLOAD EBOOK

Cybersecurity is a complex and contested issue in international politics. By focusing on the 'great powers'--the US, the EU, Russia and China--studies in the fi
The Politics of Cybersecurity in the Middle East
Language: en
Pages: 312
Authors: James Shires
Categories: Political Science
Type: BOOK - Published: 2021-11 - Publisher: Oxford University Press, USA

DOWNLOAD EBOOK

Cybersecurity is a complex and contested issue in international politics. By focusing on the 'great powers'--the US, the EU, Russia and China--studies in the fi
Digital Authoritarianism in the Middle East
Language: en
Pages: 320
Authors: Marc Owen Jones
Categories: Political Science
Type: BOOK - Published: 2022-07-15 - Publisher: Oxford University Press

DOWNLOAD EBOOK

You are being lied to by people who don't even exist. Digital deception is the new face of information warfare. Social media has been weaponised by states and c
Cyberwars in the Middle East
Language: en
Pages: 135
Authors: Ahmed Al-Rawi
Categories: History
Type: BOOK - Published: 2021-07-16 - Publisher: Rutgers University Press

DOWNLOAD EBOOK

Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bott
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security
Language: en
Pages: 282
Authors: Dawson, Maurice
Categories: Computers
Type: BOOK - Published: 2022-02-04 - Publisher: IGI Global

DOWNLOAD EBOOK

Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system