Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cybersecurity in humanities and social sciences: a research methods approach
Bookmark Share

Text

Cybersecurity in humanities and social sciences: a research methods approach

Loiseau, Hugo - Personal Name; Ventre, Daniel - Personal Name; Aden, Hartmut - Personal Name;

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?

Table of contents
Introduction
1 The “Science” of Cybersecurity in the Human and Social Sciences: Issues and Reflections
1.1. Introduction
1.2. A method?
1.3. Data?
1.4. One or more definition(s)?
1.5. Conclusion
1.6. References
2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity
2.1. Introduction
2.2. Definition
2.3. Typology
2.4. Taxonomy
2.5. Ontologies
2.6. Conclusion
2.7. References
3 Cybersecurity and Data Protection – Research Strategies and Limitations in a Legal and Public Policy Perspective
3.1. Introduction
3.2. Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime?
3.3. Methodological approaches and challenges for the study of cybersecurity – legal and public policy perspectives
3.4. Conclusion and outlook
3.5. References
4 Researching State-sponsored Cyber-espionage
4.1. Defining cybersecurity and cyber-espionage
4.2. Taxonomies of cyber-threats
4.3. The structure of this chapter
4.4. The significance of state-sponsored cyber-espionage
4.5. Research themes in state-sponsored cyber-espionage
4.6. Theorizing state-sponsored cyber-espionage in the social sciences
4.7. Research methodologies into state-sponsored cyber-espionage
4.8. Intellectual precision and objectivity in state-sponsored cyber-espionage research
4.9. Detecting state actors in cyber-espionage research
4.10. Identifying specific state actors in cyber-espionage research
4.11. Conclusion: researching a transformational subject
4.12. References
5 Moving from Uncertainty to Risk: The Case of Cyber Risk
5.1. Introduction
5.2. The scientific approach to move from uncertainty to risk
5.3. Learning about the data: the exploratory phase
5.4. Data cleansing
5.5. Statistical exploration on the various variables of the dataset
5.6. Univariate modeling for the relevant variables
5.7. Multivariate and dynamic modeling
5.8. Conclusion
5.9. Acknowledgments
5.10. References
6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research
6.1. Introduction
6.2. Information warfare and cybersecurity
6.3. Researching information warfare and cybersecurity
6.4. Qualitative research methodologies for information warfare and cybersecurity
6.5. An analysis of national cybersecurity strategies
6.6. An analysis of the alignment of South Africa’s Cybercrimes Bill to international legislation
6.7. An analysis of the influence of classical military philosophy on seminal information warfare texts
6.8. Reflections on qualitative document analysis for information warfare and cybersecurity research
6.9. Conclusion
6.10. References
7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France
7.1. Introduction
7.2. Localization of an online field
7.3. Online–offline continuum
7.4. Continuum between security and insecurity
7.5. Conclusion
7.6. References
List of Authors
Index
Other titles from ISTE in Information Systems, Web and Pervasive Computing
End User License A


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8072 LOI c
b0002482
Available
Detail Information
Series Title
-
Call Number
005.8072 LOI c
Publisher
Hoboken : Wiley-ISTE., 2020
Collation
xiv, 209 hlm.; ilus.; 24 cm
Language
English
ISBN/ISSN
9781786305398
Classification
005.8072
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Computer security
Computer security -- research
Specific Detail Info
-
Statement of Responsibility
Hugo Loiseau, Daniel Ventre, and Hartmut Aden
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?