Cybersecurity in Humanities and Social Sciences / Loiseau, Hugo.

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via O'Reilly/Safari)
Main Authors: Loiseau, Hugo (Author), Ventre, Daniel (Author), Aden, Hartmut (Author)
Corporate Author: Safari, an O'Reilly Media Company
Format: eBook
Language:English
Published: Wiley-ISTE, 2020.
Edition:1st edition.

MARC

LEADER 00000cam a22000007a 4500
001 b12107199
006 m o d
007 cr |||||||||||
008 040821s2020 xx o 000 0 eng d
005 20240829150349.8
020 |z 9781786305398 
020 |z 9781119777564 
024 8 |a 9781786305398 
029 0 |a AU@  |b 000069704572 
029 1 |a AU@  |b 000072393354 
035 |a (OCoLC)safo1264230772 
035 |a (OCoLC)1264230772 
037 |a safo9781786305398 
040 |a AU@  |b eng  |c AU@  |d OCLCQ  |d TOH  |d OCLCQ  |d OCLCL  |d OCLCQ 
049 |a GWRE 
100 1 |a Loiseau, Hugo,  |e author. 
245 1 0 |a Cybersecurity in Humanities and Social Sciences /  |c Loiseau, Hugo. 
250 |a 1st edition. 
264 1 |b Wiley-ISTE,  |c 2020. 
300 |a 1 online resource (240 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
347 |a text file 
520 |a The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology, law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories? 
542 |f Copyright © 2020 by John Wiley & Sons  |g 2020 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title page (viewed November 17, 2020) 
700 1 |a Ventre, Daniel,  |e author. 
700 1 |a Aden, Hartmut,  |e author. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9781786305398/?ar  |z Full Text (via O'Reilly/Safari) 
915 |a 7 
936 |a BATCHLOAD 
956 |a O'Reilly-Safari eBooks 
956 |b O'Reilly Online Learning: Academic/Public Library Edition 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i ecfcfaa1-d1ef-52a6-bdac-092b83c0d816  |s c64b329c-9db2-5a3b-93ba-7d26619441f2 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |i web  |n 1