Author profile: Susan W. Brenner

Threat Morphing in Cyberspace

Susan W. Brenner • Mar 8 2010 • Articles

Much has been written about cybercrime, cyberterrorism and cyberwarfare, but very little has been written about how, and why, these evolving threat categories differ from their real-world analogues. This is unfortunate, because the differences between the threat categories mean that the laws and strategies devised to deal with real-world threats are often ineffectual in dealing with cyber-mediated threats.

Please Consider Donating

Before you download your free e-book, please consider donating to support open access publishing.

E-IR is an independent non-profit publisher run by an all volunteer team. Your donations allow us to invest in new open access titles and pay our bandwidth bills to ensure we keep our existing titles free to view. Any amount, in any currency, is appreciated. Many thanks!

Donations are voluntary and not required to download the e-book - your link to download is below.

Subscribe

Get our weekly email