Reviews
Description
This book examines public policies on cybersecurity and their evolution over the past few decades in India. It shows how threats and vulnerabilities in the domain forced nation-states to introduce new policies to protect the digital eco systems. It charts the process of securitization of the cyberspace by the international system from the end of the previous century to present day. It also shows how the domain has become strategic interest for many states and the international bodies which eventually developed norms and policies to secure the domain.
Consequently, the book discusses the evolution of cybersecurity policy at global level by great powers, middle powers, and states of concerns and compares them with the Indian context. It also highlights the requirement of introducing/improving new cybersecurity guidelines to efficiently deal with emerging technologies such as 5G, Artificial Intelligence (AI), Big Data (BD), Blockchain, Internet of Things (IoT), and cryptocurrency.
The volume will be of great interest to scholars and researchers of cybersecurity, public policy, politics and South Asian studies.
EXTRA 10 % discount with code: EXTRA
The promotion ends in 21d.04:25:30
The discount code is valid when purchasing from 10 €. Discounts do not stack.
This book examines public policies on cybersecurity and their evolution over the past few decades in India. It shows how threats and vulnerabilities in the domain forced nation-states to introduce new policies to protect the digital eco systems. It charts the process of securitization of the cyberspace by the international system from the end of the previous century to present day. It also shows how the domain has become strategic interest for many states and the international bodies which eventually developed norms and policies to secure the domain.
Consequently, the book discusses the evolution of cybersecurity policy at global level by great powers, middle powers, and states of concerns and compares them with the Indian context. It also highlights the requirement of introducing/improving new cybersecurity guidelines to efficiently deal with emerging technologies such as 5G, Artificial Intelligence (AI), Big Data (BD), Blockchain, Internet of Things (IoT), and cryptocurrency.
The volume will be of great interest to scholars and researchers of cybersecurity, public policy, politics and South Asian studies.
Reviews