Cybersecurity in humanities and social sciences: A research methods approach (Record no. 1678)

MARC details
000 -LEADER
fixed length control field 02546nam a2200253 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250716134120.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250716b2020|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119777571
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Loiseau, Hugo
Relator term Editor
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Ventre, Daniel
Relator term Co-Editor
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Aden, Hartmut
Relator term Co-Editor
245 ## - TITLE STATEMENT
Title Cybersecurity in humanities and social sciences: A research methods approach
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2020.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xiv, 214p.
500 ## - GENERAL NOTE
General note The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Cybersecurity in the Human and Social Sciences
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Typologies, Taxonomies and Ontologies of Cybersecurity
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Cybersecurity and Information Warfare Research
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9820912
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) 005.8 (Online Access) EB0106 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha