National Security in the Information Age

Pub. Date: 2004-02-26
Publisher(s): Taylor & Francis
  • Free Shipping Icon

    Free Shipping on all Orders Over $35!*

    *excludes Marketplace items.

List Price: $57.95

Buy New

Usually Ships in 5-7 Business Days

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital eBook

Online: 180 Days
Downloadable: 180 Days
Online: 365 Days
Downloadable: 365 Days
Online: 365 Days
Downloadable: Lifetime Access

Used Textbook

We're Sorry
Sold Out


As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing concern. Political, economic and military leaders must manage and reduce the level of risk associated with threats from hostile states, malevolent nonstate actors such as organized terrorist groups or individual hackers, and high-tech accidents. The impact of the information technology revolution on warfare, global stability, governance, and even the meaning of existing security constructs like deterrence is significant. These essays examine the ways in which the information technology revolution has affected the logic of deterrence and crisis management, definitions of peace and war, democratic constraints on conflict, the conduct of and military organization for war, and the growing role of the private sector in providing security.

Table of Contents

Introduction: Security in the Information Technology Age
Managing Conflict in the Information Age
Integrated Security: A strategic response to anonymity and the problem of the few
Revolution's End: Information technology and crisis management
Organization and Conduct of Warfare in the Information Age
Wars of Disruption: International competition and information technology-driven military organizations
The Strategy and Tactics of Information Warfare
Governance in the Information Age
Information Warfare and Democratic Accountability
Information Warfare and Domestic Threats to American Security
Private Sector Incentives for Managing Security
Rewarding IT Security in the Marketplace
Concluding Reflections
Thinking About New Security Paradigms
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.