Cybersecurity in Switzerland

Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leadi...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Dunn Cavelty, Myriam (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2014.
Σειρά:SpringerBriefs in Cybersecurity,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03668nam a22005175i 4500
001 978-3-319-10620-5
003 DE-He213
005 20151103131600.0
007 cr nn 008mamaa
008 141011s2014 gw | s |||| 0|eng d
020 |a 9783319106205  |9 978-3-319-10620-5 
024 7 |a 10.1007/978-3-319-10620-5  |2 doi 
040 |d GrThAP 
050 4 |a QA75.5-76.95 
072 7 |a UBL  |2 bicssc 
072 7 |a LAW099000  |2 bisacsh 
082 0 4 |a 343.0999  |2 23 
100 1 |a Dunn Cavelty, Myriam.  |e author. 
245 1 0 |a Cybersecurity in Switzerland  |h [electronic resource] /  |c by Myriam Dunn Cavelty. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014. 
300 |a X, 75 p. 2 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Cybersecurity,  |x 2193-973X 
505 0 |a Foreword -- List of Abbreviations -- Introduction -- Global Cyber-security Policy Evolution -- Phase 1: The Four Pillar Model for Information Assurance (1997-2004) -- Phase 2: Reporting and Analysis Center for Information Assurance (MELANI) (2004-2010) -- Phase 3: Consolidation and Cyber-Risk Strategy (2011-2014) -- Conclusion. 
520 |a Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leading up to these strategy documents. The peculiarities of the Swiss political system, which influence the way cyber-security can be designed and practiced in Switzerland are considered, as well as the bigger, global influences and driving factors that shaped the Swiss approach to cyber-security. It shows that throughout the years, the most important influence on the Swiss policy-approach was the international level, or rather the developments of a cyber-security policy in other states. Even though many of the basic ideas about information-sharing and public-private partnerships were influenced by (amongst others) the US approach to critical infrastructure protection, the peculiarities of the Swiss political system has led to a particular “Swiss solution”, which is based on the federalist structures and subsidiary principles, characterized by stability and resilience to external shocks in the form of cyber-incidents. Cybersecurity in Switzerland will be a stimulating read for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers. It contains not only specific material on an interesting case,  but also a wealth of background information on different variations of cyber-security, as well as on information-sharing and public-private partnerships. 
650 0 |a Computer science. 
650 0 |a Computer security. 
650 0 |a Computers. 
650 0 |a Law and legislation. 
650 0 |a Public international law. 
650 0 |a Criminology. 
650 1 4 |a Computer Science. 
650 2 4 |a Legal Aspects of Computing. 
650 2 4 |a Public International Law. 
650 2 4 |a Criminology & Criminal Justice. 
650 2 4 |a Systems and Data Security. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319106199 
830 0 |a SpringerBriefs in Cybersecurity,  |x 2193-973X 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-10620-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)