Preparing for Digital Disruption.

This open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infrastructure. The increasing use of digital technology implies new and significant vulnerabilities for ou...

Full description

Saved in:
Bibliographic Details
Superior document:Research for Policy
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2021.
©2021.
Year of Publication:2021
Language:English
Series:Research for Policy
Physical Description:1 online resource (85 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993546060004498
ctrlnum (CKB)5360000000050058
(MiAaPQ)EBC6736371
(Au-PeEL)EBL6736371
(OCoLC)1272954527
(oapen)https://directory.doabooks.org/handle/20.500.12854/72286
(PPN)258055618
(EXLCZ)995360000000050058
collection bib_alma
record_format marc
spelling Schrijvers, Erik.
Preparing for Digital Disruption.
Springer Nature 2021
Cham : Springer International Publishing AG, 2021.
©2021.
1 online resource (85 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Research for Policy
Description based on publisher supplied metadata and other sources.
This open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infrastructure. The increasing use of digital technology implies new and significant vulnerabilities for our society. However, it is striking that almost all cyber-security measures taken by governments, international bodies and other major players are aimed at preventing incidents. But there is no such thing as total digital security. Whether inside or outside the digital domain, incidents can and will occur and may lead to disruption. While a raft of provisions, crisis contingency plans and legal regulations are in place to deal with the possibility of incidents in the ‘real world’, no equivalence exists for the digital domain and digital disruption. Hence, this book uniquely discusses several specific policy measures government and businesses should take in order to be better prepared to deal with a digital disruption and prevent further escalation.
English
Northern Arizona University
Computer security bicssc
Information technology: general issues bicssc
International relations bicssc
Crime & criminology bicssc
Public administration bicssc
Cyber Attacks
Crisis Contingency Planning
Crisis Management
Critical Infrastructures
Critical Information Infrastructures
Cyber Insurance
Cyber Security Policy
Cyber War
Disaster
Open Access
3-030-77837-1
Prins, Corien, 1961-
Passchier, Reijer.
language English
format eBook
author Schrijvers, Erik.
spellingShingle Schrijvers, Erik.
Preparing for Digital Disruption.
Research for Policy
author_facet Schrijvers, Erik.
Prins, Corien, 1961-
Passchier, Reijer.
author_variant e s es
author2 Prins, Corien, 1961-
Passchier, Reijer.
author2_variant c p cp
r p rp
author2_role TeilnehmendeR
TeilnehmendeR
author_sort Schrijvers, Erik.
title Preparing for Digital Disruption.
title_full Preparing for Digital Disruption.
title_fullStr Preparing for Digital Disruption.
title_full_unstemmed Preparing for Digital Disruption.
title_auth Preparing for Digital Disruption.
title_new Preparing for Digital Disruption.
title_sort preparing for digital disruption.
series Research for Policy
series2 Research for Policy
publisher Springer Nature
Springer International Publishing AG,
publishDate 2021
physical 1 online resource (85 pages)
isbn 3-030-77838-X
3-030-77837-1
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25
illustrated Not Illustrated
oclc_num 1272954527
work_keys_str_mv AT schrijverserik preparingfordigitaldisruption
AT prinscorien preparingfordigitaldisruption
AT passchierreijer preparingfordigitaldisruption
status_str n
ids_txt_mv (CKB)5360000000050058
(MiAaPQ)EBC6736371
(Au-PeEL)EBL6736371
(OCoLC)1272954527
(oapen)https://directory.doabooks.org/handle/20.500.12854/72286
(PPN)258055618
(EXLCZ)995360000000050058
carrierType_str_mv cr
hierarchy_parent_title Research for Policy
is_hierarchy_title Preparing for Digital Disruption.
container_title Research for Policy
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1787548474681589760
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02998nam a22006133i 4500</leader><controlfield tag="001">993546060004498</controlfield><controlfield tag="005">20231110213153.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#cnu||||||||</controlfield><controlfield tag="008">220207s2021 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-030-77838-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5360000000050058</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6736371</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6736371</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1272954527</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/72286</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)258055618</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995360000000050058</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schrijvers, Erik.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Preparing for Digital Disruption.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Springer Nature</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (85 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Research for Policy </subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infrastructure. The increasing use of digital technology implies new and significant vulnerabilities for our society. However, it is striking that almost all cyber-security measures taken by governments, international bodies and other major players are aimed at preventing incidents. But there is no such thing as total digital security. Whether inside or outside the digital domain, incidents can and will occur and may lead to disruption. While a raft of provisions, crisis contingency plans and legal regulations are in place to deal with the possibility of incidents in the ‘real world’, no equivalence exists for the digital domain and digital disruption. Hence, this book uniquely discusses several specific policy measures government and businesses should take in order to be better prepared to deal with a digital disruption and prevent further escalation.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="536" ind1=" " ind2=" "><subfield code="a">Northern Arizona University</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">International relations</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crime &amp; criminology</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public administration</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Crisis Contingency Planning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Crisis Management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Critical Infrastructures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Critical Information Infrastructures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Insurance</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Security Policy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber War</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Disaster</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Open Access</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-030-77837-1</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prins, Corien,</subfield><subfield code="d">1961-</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Passchier, Reijer.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Research for Policy </subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-11-11 04:51:54 Europe/Vienna</subfield><subfield code="d">00</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2021-10-16 21:32:29 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338130590004498&amp;Force_direct=true</subfield><subfield code="Z">5338130590004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338130590004498</subfield></datafield></record></collection>