Cybersecurity in humanities and social sciences : (Record no. 12745)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04510cam a2200589 i 4500 |
001 - CONTROL NUMBER | |
control field | on1202266852 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125543.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 201029s2020 enk ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DG1 |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | DG1 |
Modifying agency | OCLCO |
-- | UKAHL |
-- | OCLCF |
-- | N$T |
-- | YDX |
-- | OCLCQ |
-- | OCLCO |
-- | OCLCQ |
-- | UPM |
-- | OCLCQ |
-- | WSU |
-- | OCLCO |
-- | OCLCL |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119777588 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119777585 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119777571 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119777577 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781786305398 |
Qualifying information | (print) |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781119777588 |
Source of number or code | doi |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000068213023 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1202266852 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
245 00 - TITLE STATEMENT | |
Title | Cybersecurity in humanities and social sciences : |
Remainder of title | a research methods approach / |
Statement of responsibility, etc. | edited by Hugo Loiseau, Daniel Ventre, Hartmut Aden. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | London, UK : |
Name of producer, publisher, distributor, manufacturer | ISTE, Ltd. ; |
Place of production, publication, distribution, manufacture | Hoboken, NJ : |
Name of producer, publisher, distributor, manufacturer | Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | Cybersecurity set ; |
Volume/sequential designation | volume 1 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | The "Science" of Cybersecurity in the Human and Social Sciences -- Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity -- Cybersecurity and Data Protection -- Research Strategies and Limitations in a Legal and Public Policy Perspective -- Researching State-sponsored Cyber-espionage -- Moving from Uncertainty to Risk -- Qualitative Document Analysis for Cybersecurity and Information Warfare Research -- Anti-feminist Cyber-violence as a Risk Factor. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from PDF title page (John Wiley, viewed October 29, 2020). |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories? |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Security |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | S�ecurit�e informatique. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
Source of heading or term | fast |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Loiseau, Hugo, |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Ventre, Daniel, |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Aden, Hartmut, |
Relator term | editor. |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | Cybersecurity in humanities and social sciences (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCFDQhCd99y4786RHKVv7Md |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Cybersecurity set ; |
Volume/sequential designation | v. 1. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a> |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH37733941 |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH37733434 |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 2649530 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 16873254 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 301897681 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.