Listing 1 - 10 of 40 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Considers the possibility of opening up economies and societies of the Third World to democracy; specifically the role of civil society in contributing to democracy and the varieties of civil society and state-society relations in distinct Third World areas.
Choose an application
Choose an application
Fake news, scandale Facebook-Cambridge Analytica, virus WannaCry : de la propagande djihadiste à l'ingérence électorale et de la manipulation ciblée à la cyber-attaque tous azimuts, le nouveau conflit mondial a commencé. Il a pour champ de bataille virtuel Internet. Il change la donne politique, bouleverse l'ordre géopolitique, multiplie les capacités et les formes d'agression. Il abolit la distinction entre la guerre et la paix, la sécurité et la liberté, les oligarchies et la démocratie. De Moscou à Washington, en passant par Tel Aviv, Téhéran, Londres ou Paris, mais aussi des laboratoires secrets de la Silicon Valley aux agences de renseignement du Vieux-Continent, voici, enfin révélée, la vraie face cachée de la globalisation numérique. Dévoilant les acteurs, les épisodes et les dessous des cartes de cette lutte planétaire, décryptant l'état des forces et des enjeux, des risques et des menaces, dessinant les scénarios de demain, ce livre sans précédent, informé et percutant, nous place face à l'urgence de rompre avec l'ignorance ou la passivité. Un grand document qui se lit comme un thriller. Un cri d'alerte indispensable sur notre proche avenir. Un manuel de résistance à la guerre permanente de l'information.
Choose an application
"Security concerns have mushroomed. Increasingly numerous areas of life are governed by security policies and technologies. Security Unbound argues that when insecurities pervade how we relate to our neighbours, how we perceive international politics, how governments formulate policies, at stake is not our security but our democracy. Security is not in the first instance a right or value but a practice that challenges democratic institutions and actions. We are familiar with emergency policies in the name of national security challenging parliamentary processes, the space for political dissent, and fundamental rights. Yet, security practice and technology pervade society heavily in very mundane ways without raising national security crises, in particular through surveillance technology and the management of risks and uncertainties in many areas of life. These more diffuse security practices create societies in which suspicion becomes a default way of relating and governing relations, ranging from neighbourhood relations over financial transactions to cross border mobility. Security Unbound demonstrates that governing through suspicion poses serious challenges to democratic practice. Some of these challenges are familiar, such as the erosion of the right to privacy; others are less so, such as the post-human challenge to citizenship.Security unbound provokes us to see that the democratic political stake today is not our security but preventing insecurity from becoming the organising principle of political and social life"--
Privacy, Right of. --- Democracy --- Electronic surveillance --- Information technology --- Social psychology --- Social control --- Social aspects --- Political aspects --- Electronic surveillance - Social aspects --- Electronic surveillance - Political aspects --- Information technology - Social aspects --- Information technology - Political aspects
Choose an application
Will information technology help reinvent government? It might, but only if it is correctly managed. This book provides a new model for management of information age reform, based on international case-studies drawn from the US, UK, mainland Europe, and developing countries. It offers practical guidance and analytical insights and will be of value to practitioners, students, educators and researchers in both public administration and information systems.
Public administration --- Administrative agencies --- Information technology --- Agencies, Administrative --- Executive agencies --- Government agencies --- Regulatory agencies --- Administrative law --- Data processing. --- Data processing --- Political aspects. --- Law and legislation --- Administrative agencies - Data processing - Case studies --- Public administration - Data processing --- Information technology - Political aspects
Choose an application
Using espionage as a test case, The End of Intelligence criticizes claims that the recent information revolution has weakened the state, revolutionized warfare, and changed the balance of power between states and non-state actors-and it assesses the potential for realizing any hopes we might have for reforming intelligence and espionage. Examining espionage, counterintelligence, and covert action, the book argues that, contrary to prevailing views, the information revolution is increasing the power of states relative to non-state actors and threatening privacy more than secrecy. Arguing that in
Polemology --- INTELLIGENCE SERVICE --- ESPIONAGE --- INFORMATION TECHNOLOGY--POLITICAL ASPECTS --- Espionage. --- Information society -- Political aspects. --- Information technology -- Political aspects. --- Intelligence service. --- Power (Social sciences). --- Intelligence service --- Espionage --- Information society --- Information technology --- Power (Social sciences) --- Government - General --- Law, Politics & Government --- Political Institutions & Public Administration - General --- Empowerment (Social sciences) --- Political power --- Exchange theory (Sociology) --- Political science --- Social sciences --- Sociology --- Consensus (Social sciences) --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Spies --- Counter intelligence --- Counterespionage --- Counterintelligence --- Intelligence community --- Secret police (Intelligence service) --- Public administration --- Research --- Disinformation --- Secret service --- Political aspects
Choose an application
Contributions de spécialistes montrant comment le développement des réseaux sociaux dans le mode arabe a permis l'apparition de nouvelles formes d'expression contestataire et d'engagement politique ou citoyen : le militantisme amazigh au Maroc, le cyberactivisme des journalistes tunisiens avant et après la révolution du 14 janvier 2011, le cyberactivisme tunisien en matière de don d'organes, etc.
Cyberspace --- Internet --- Electronic villages (Computer networks) --- Cyberespace --- Communautés virtuelles --- Social aspects --- Aspect social --- Information technology --- Political activists --- Political participation --- Social movements --- Political aspects --- Technological innovations --- Réseaux sociaux (Internet) --- Militantisme --- Aspect politique --- Communautés virtuelles --- Information technology - Political aspects - Africa, North --- Internet - Political aspects - Africa, North --- Political activists - Africa, North --- Political participation - Africa, North --- Social movements - Technological innovations - Africa, North --- Information technology - Political aspects - Arab countries --- Internet - Political aspects - Arab countries --- Political activists - Arab countries --- Political participation - Arab countries --- Social movements - Technological innovations - Arab countries
Listing 1 - 10 of 40 | << page >> |
Sort by
|