This book adopts a policy-based approach toward internet governance. It broadens the definition of internet governance and reintroduces the question of who governs the actual activity that occurs on the Internet by examining the policy process affecting the Internet's infrastructure, technical protocols, software applications, and content.
This book adopts a policy-based approach toward internet governance. It broadens the definition of internet governance and reintroduces the question of who governs the actual activity that occurs on the Internet by examining the policy process affecting the Internet's infrastructure, technical protocols, software applications, and content.
Robert J. Domanski is an instructor of political science and computer science at the City University of New York.
Inhaltsangabe
Chapter 1-Framing the Question, "Who Governs the Internet?" Chapter 2-A Brief History of the Internet as Told Through Four Policy Layers Chapter 3-Who Governs the Infrastructure? Chapter 4-Who Governs the Technical Protocols? Chapter 5-Who Governs the Applications? Chapter 6-Who Governs the Content? Chapter 7-Analysis of the National Strategy to Secure Cyberspace (NSSC) Problem Definition: How to Defend the Nation's Critical Cyber Assets from Attack? The Policymaking Process and Policy Design Behind the National Strategy to Secure Cyberspace (NSSC) Implementation and the Emerging Bureaucratic Regime Cybersecurity Policy and Politics in the Obama Administration Cybersecurity Policy In Action: What Actually Happens in the Face of a Cyberattack? What This Case Study on U.S. National Cybersecurity Policy Demonstrates: The Primacy of Private Commercial Firms Chapter 8-Internet Policymaking Moving Forward
Chapter 1-Framing the Question, "Who Governs the Internet?" Chapter 2-A Brief History of the Internet as Told Through Four Policy Layers Chapter 3-Who Governs the Infrastructure? Chapter 4-Who Governs the Technical Protocols? Chapter 5-Who Governs the Applications? Chapter 6-Who Governs the Content? Chapter 7-Analysis of the National Strategy to Secure Cyberspace (NSSC) Problem Definition: How to Defend the Nation's Critical Cyber Assets from Attack? The Policymaking Process and Policy Design Behind the National Strategy to Secure Cyberspace (NSSC) Implementation and the Emerging Bureaucratic Regime Cybersecurity Policy and Politics in the Obama Administration Cybersecurity Policy In Action: What Actually Happens in the Face of a Cyberattack? What This Case Study on U.S. National Cybersecurity Policy Demonstrates: The Primacy of Private Commercial Firms Chapter 8-Internet Policymaking Moving Forward
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309