Preparing for Digital Disruption

This open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infrastructure. The increasing use of digital technology implies new and significant vulnerabilities for ou...

Full description

Saved in:
Bibliographic Details
Main Author: Schrijvers, Erik (auth)
Other Authors: Prins, Corien (auth), Passchier, Reijer (auth)
Format: Electronic Book Chapter
Language:English
Published: Springer Nature 2021
Series:Research for Policy
Subjects:
Online Access:OAPEN Library: download the publication
OAPEN Library: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 oapen_2024_20_500_12657_50947
005 20211013
003 oapen
006 m o d
007 cr|mn|---annan
008 20211013s2021 xx |||||o ||| 0|eng d
020 |a 978-3-030-77838-5 
020 |a 9783030778385 
040 |a oapen  |c oapen 
024 7 |a 10.1007/978-3-030-77838-5  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UR  |2 bicssc 
072 7 |a UB  |2 bicssc 
072 7 |a JPS  |2 bicssc 
072 7 |a JKV  |2 bicssc 
072 7 |a JPP  |2 bicssc 
100 1 |a Schrijvers, Erik  |4 auth 
700 1 |a Prins, Corien  |4 auth 
700 1 |a Passchier, Reijer  |4 auth 
245 1 0 |a Preparing for Digital Disruption 
260 |b Springer Nature  |c 2021 
300 |a 1 electronic resource (74 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Research for Policy 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a This open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infrastructure. The increasing use of digital technology implies new and significant vulnerabilities for our society. However, it is striking that almost all cyber-security measures taken by governments, international bodies and other major players are aimed at preventing incidents. But there is no such thing as total digital security. Whether inside or outside the digital domain, incidents can and will occur and may lead to disruption. While a raft of provisions, crisis contingency plans and legal regulations are in place to deal with the possibility of incidents in the 'real world', no equivalence exists for the digital domain and digital disruption. Hence, this book uniquely discusses several specific policy measures government and businesses should take in order to be better prepared to deal with a digital disruption and prevent further escalation. 
536 |a Northern Arizona University 
540 |a Creative Commons  |f by/4.0/  |2 cc  |4 http://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Computer security  |2 bicssc 
650 7 |a Information technology: general issues  |2 bicssc 
650 7 |a International relations  |2 bicssc 
650 7 |a Crime & criminology  |2 bicssc 
650 7 |a Public administration  |2 bicssc 
653 |a Cyber Attacks 
653 |a Crisis Contingency Planning 
653 |a Crisis Management 
653 |a Critical Infrastructures 
653 |a Critical Information Infrastructures 
653 |a Cyber Insurance 
653 |a Cyber Security Policy 
653 |a Cyber War 
653 |a Disaster 
653 |a Open Access 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/id/1876f555-1283-4c1b-ab5b-ba1abe77a26c/978-3-030-77838-5.pdf  |7 0  |z OAPEN Library: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/handle/20.500.12657/50947  |7 0  |z OAPEN Library: description of the publication