Search database
Filter
19
Featured
Topics
Cybersecurity, Digital Safety, Privacy, Right to Privacy
6
Disinformation, Misinformation, Fake News
3
Cybercrimes
2
Social / Digital Media and ICTs in Disaster & Humanitarian Crisis Management & Prevention
2
Countering Hate Speech, Disinformation & Propaganda
2
Digital Divide, Digital Inequalities
1
Media & ICT Use in Authoritarian Regimes / Dictatorships
1
Surveillance, Surveillance Technologies, Spyware
1
Conflict-Sensitive Digital Technology Use & Social Media in Prevention & Transformation
1
Extremist & Terrorist Digital / Social Media Presence
1
Hate Speech, Hate Speech in Social Media
1
Internet / ICTs and Conflicts
1
Algorithms & Big Data
1
Digital Ethics, AI Ethics, Social Media Ethics, Data & Information Ethics
1
Artificial Intelligence
1
ICT Enterprises
1
Humanitarian Law
1
Mobile Money Cash Transfer Programmes
1
Ushahidi (Crowdsourcing Mapping Software)
1
Human Rights Protection
1
Conflict & War Photography
1
Election Campaigns: Social Media
1
Human Security
1
Computer Networks, Local Area Networks (LAN)
1
Software Security
1
Language
Document type
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type

Ein falscher Klick. Hackern auf der Spur: Warum der Cyberkrieg uns alle betrifft

Bonn: Bundeszentrale für politische Bildung (bpb), Sonderausg. (2023), 351 pp.
"Das Internet hat in den vergangenen Jahrzehnten einen historisch einzigartigen globalen Kommunikationsraum geschaffen. Doch zunehmend zeigen sich nicht nur die Möglichkeiten, sondern auch die Gefahren dieser Vernetzung: Kriminelle Hacker nutzen aktiv Sicherheitslücken aus, um Privatpersonen oder ... more
"Welche Rolle spielen nichtstaatliche Akteure, sogenannte "Proxys", in staatlichen Cyberkonflikten? Und wie unterscheidet sich regimetypenspezifisch das (De-)Eskalationsmanagement? Kerstin Zettl-Schabath vergleicht mithilfe eines umfassenden Datensatzes für die Jahre 2000-2019 die staatlichen Cyber ... more
"[...] this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas: ... more

The Digitalisation of Armed Conflicts: Three Humanitarian Priorities

Brussels: Brussels School of Governance, Centre for Security, Diplomacy and Strategy (2022), 5 pp.
"States should interpret – and apply – existing rules in a manner that ensures adequate and sufficient protection for civilians and civilian infrastructure, information and communication technology (ICT) systems and data in our ever-increasingly digitalised societies. Academia, tech companies, s ... more
"This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technolog ... more

Der unsichtbare Krieg: Wie die Digitalisierung Sicherheit und Stabilität in der Welt bedroht

Bonn: Bundeszentrale für politische Bildung (bpb), Sonderausg. (2020), 302 pp.
"Die Digitalisierung hat nicht nur zu tiefgreifenden Veränderungen der Lebens-, Arbeits- und Wirtschaftswelt geführt, sie hat auch massive Auswirkungen auf die internationale Politik. Diese Auswirkungen, so Yvonne Hofstetter, stellen die Sicherheitspolitik der Staaten vor massive Herausforderungen ... more

Understanding Cyber-Warfare: Politics, Policy and Strategy

London; New York: Routledge, 2nd ed. (2019), x, 296 pp.
"This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The second edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations (IR ... more

Information Warfare: New Security Challenge for Europe

Bratislava: Centre for European and North Atlantic Affairs (CENAA) (2017), 140 pp.
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do ... more

Digitale Diktatur: Totalüberwachung, Datenmissbrauch, Cyberkrieg

Bonn: Bundeszentrale für politische Bildung (bpb) (2015), 345 pp.
"Vom eigenen Staat auf Schritt und Tritt überwacht zu werden, ist eine Horrorvision für viele Menschen. Möglich wird dies auch durch den Spion in der Hosentasche. Smartphones kommunizieren ständig mit staatlichen Lauschern, ohne dass wir es wollen – und bemerken. Stefan Aust und Thomas Ammann ... more
"The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the vari ... more
"Based on the case study of the cyber war between Russia and Georgia in August 2008, this paper is a theoretical deliberation in an attempt to illustrate connection between the Digital Divide and cyber security. Through a qualitative study of cyber warfare between the two countries, one on the devel ... more
"The articles contained in this publication are dispatches from a new frontline in humanitarian action: the digital frontier. All are written by those observing, experiencing and attempting to respond to the challenges created by the digital revolution and the very real threats it is creating for hu ... more

Cybersecurity and Cyberwar: What Everyone Needs to Know

Oxford; New York: Oxford University Press (2014), viii, 306 pp.
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci ... more

Terror on the Internet: The New Arena, the New Challenges

Washington, DC: United States Institute of Peace Press (2006), 309 pp.
"In this timely and eye-opening volume, Gabriel Weimann reveals that terrorist organizations and their supporters maintain hundreds of Web sites, taking advantage of the unregulated, anonymous, and accessible nature of the Internet to target an array of messages to diverse audiences. Drawing on an e ... more