Cyberwars in the Middle East
eBook - ePub

Cyberwars in the Middle East

  1. 194 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Cyberwars in the Middle East

Book details
Table of contents
Citations

About This Book

Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz's structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other.On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists' political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle Eastand beyond, and to show the ripple effect of these attacks.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Cyberwars in the Middle East by Ahmed Al-Rawi in PDF and/or ePUB format, as well as other popular books in History & World History. We have over one million books available in our catalogue for you to explore.

Information

Year
2021
ISBN
9781978810129
Topic
History
Index
History

Table of contents

  1. Cover
  2. Series Page
  3. Title Page
  4. Copyright
  5. Dedication
  6. Contents
  7. Preface
  8. Introduction
  9. 1. Toward a Theoretical Framework of Cyberwars
  10. 2. Cyberwars and International Politics
  11. 3. U.S. Cyberoperations in the Middle East
  12. 4. Russian Trolls, Islam, and the Middle East
  13. 5. Cyberwars and Regional Politics
  14. 6. Arab Hackers and Electronic Armies
  15. Conclusion
  16. Appendix: Selected List of Arab Hacking Groups
  17. Notes
  18. References
  19. Index
  20. About the Author