Preparing for Digital Disruption.

By: Schrijvers, ErikContributor(s): Prins, Corien | Passchier, ReijerMaterial type: TextTextSeries: Research for Policy SeriesPublisher: Cham : Springer International Publishing AG, 2021Copyright date: �2021Edition: 1st edDescription: 1 online resource (85 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9783030778385Genre/Form: Electronic books.Additional physical formats: Print version:: Preparing for Digital DisruptionLOC classification: QA76.9.A25Online resources: Click to View
Contents:
Intro -- Persons Consulted -- Contents -- Abbreviations -- Chapter 1: Fighting Digital Fires -- 1.1 Incidents - Large and Small - Are a Fact of Life -- 1.2 Disruptions at the Heart of Society -- 1.3 There Is No Such Thing as 100% Security - But Are We Sufficiently Prepared for Disruption? -- 1.4 Structure of This Report -- References -- Chapter 2: Societal Disruption -- 2.1 Introduction -- 2.2 Societal Disruption -- 2.2.1 A Disruption of Everyday Life -- 2.2.2 'Serious' Disruption: Failure of Core Processes -- 2.2.3 Perceived Disruption -- 2.2.4 Duration of Disruption -- 2.3 Critical Infrastructure and Critical Processes -- 2.3.1 Critical Processes -- 2.4 Digital Disruption -- 2.5 Conclusion -- References -- Chapter 3: Digitization and Societal Disruption -- 3.1 Introduction -- 3.2 Our Growing Dependence on Digital Technology -- 3.2.1 Datafication -- 3.2.2 Computing Power -- 3.2.3 Connectivity -- 3.3 Chains, Networks and Complexity Transcending Borders -- 3.3.1 Chains and Networks16 -- 3.3.2 Beyond National Boundaries -- 3.3.3 Complexity -- 3.4 Geopolitics -- 3.4.1 Dependence on Large Foreign Providers -- 3.4.2 Malicious States -- 3.4.3 The Perfect Weapon -- 3.5 Conclusion -- References -- Chapter 4: Preparing for Digital Disruption -- 4.1 Introduction -- 4.2 Preparedness -- 4.2.1 Fall-Back Options -- 4.2.2 Isolation -- 4.2.3 Cyber Security Exercises -- 4.2.4 Provision of Information -- 4.3 Detection and Early-Warning Systems -- 4.3.1 Organizing the Exchange of Information -- 4.3.2 Strategic Information -- 4.3.3 Responsibilities -- 4.4 Responding to Incidents -- 4.4.1 Legal Powers -- 4.4.2 Combating Cross-Border Crises -- 4.4.3 Setting Priorities -- 4.5 Recovery &amp -- Reconstruction -- 4.5.1 Evaluating and Learning Lessons -- 4.5.2 Compensation -- 4.6 Conclusion -- References -- Chapter 5: Conclusions and Recommendations -- 5.1 Introduction.
5.2 New Types of Disruption -- 5.3 Centralized Setting of Standards and Coordination by Government -- 5.4 Focusing on Preparedness -- 5.5 Detection: A Clearer Picture of Dependencies -- 5.5.1 Insight into Dependencies -- 5.5.2 A New Approach to the Identification of Critical Infrastructure -- 5.5.3 Digital Triage -- 5.6 Mitigation: More Powers, Better Categorization of Incidents and Better European Coordination -- 5.6.1 Legal Powers and Competencies -- 5.6.2 Towards a Categorization of Incidents -- 5.6.3 European Coordination -- 5.7 Recovery &amp -- Reconstruction: Examine the Possibility of a Cyber Pool and Make Better Use of Data on Incidents -- 5.7.1 Cyber Pool -- 5.7.2 Make Better Use of Data on Incidents -- 5.8 Closing Words -- References.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Persons Consulted -- Contents -- Abbreviations -- Chapter 1: Fighting Digital Fires -- 1.1 Incidents - Large and Small - Are a Fact of Life -- 1.2 Disruptions at the Heart of Society -- 1.3 There Is No Such Thing as 100% Security - But Are We Sufficiently Prepared for Disruption? -- 1.4 Structure of This Report -- References -- Chapter 2: Societal Disruption -- 2.1 Introduction -- 2.2 Societal Disruption -- 2.2.1 A Disruption of Everyday Life -- 2.2.2 'Serious' Disruption: Failure of Core Processes -- 2.2.3 Perceived Disruption -- 2.2.4 Duration of Disruption -- 2.3 Critical Infrastructure and Critical Processes -- 2.3.1 Critical Processes -- 2.4 Digital Disruption -- 2.5 Conclusion -- References -- Chapter 3: Digitization and Societal Disruption -- 3.1 Introduction -- 3.2 Our Growing Dependence on Digital Technology -- 3.2.1 Datafication -- 3.2.2 Computing Power -- 3.2.3 Connectivity -- 3.3 Chains, Networks and Complexity Transcending Borders -- 3.3.1 Chains and Networks16 -- 3.3.2 Beyond National Boundaries -- 3.3.3 Complexity -- 3.4 Geopolitics -- 3.4.1 Dependence on Large Foreign Providers -- 3.4.2 Malicious States -- 3.4.3 The Perfect Weapon -- 3.5 Conclusion -- References -- Chapter 4: Preparing for Digital Disruption -- 4.1 Introduction -- 4.2 Preparedness -- 4.2.1 Fall-Back Options -- 4.2.2 Isolation -- 4.2.3 Cyber Security Exercises -- 4.2.4 Provision of Information -- 4.3 Detection and Early-Warning Systems -- 4.3.1 Organizing the Exchange of Information -- 4.3.2 Strategic Information -- 4.3.3 Responsibilities -- 4.4 Responding to Incidents -- 4.4.1 Legal Powers -- 4.4.2 Combating Cross-Border Crises -- 4.4.3 Setting Priorities -- 4.5 Recovery &amp -- Reconstruction -- 4.5.1 Evaluating and Learning Lessons -- 4.5.2 Compensation -- 4.6 Conclusion -- References -- Chapter 5: Conclusions and Recommendations -- 5.1 Introduction.

5.2 New Types of Disruption -- 5.3 Centralized Setting of Standards and Coordination by Government -- 5.4 Focusing on Preparedness -- 5.5 Detection: A Clearer Picture of Dependencies -- 5.5.1 Insight into Dependencies -- 5.5.2 A New Approach to the Identification of Critical Infrastructure -- 5.5.3 Digital Triage -- 5.6 Mitigation: More Powers, Better Categorization of Incidents and Better European Coordination -- 5.6.1 Legal Powers and Competencies -- 5.6.2 Towards a Categorization of Incidents -- 5.6.3 European Coordination -- 5.7 Recovery &amp -- Reconstruction: Examine the Possibility of a Cyber Pool and Make Better Use of Data on Incidents -- 5.7.1 Cyber Pool -- 5.7.2 Make Better Use of Data on Incidents -- 5.8 Closing Words -- References.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.