04381nam 22005175 450 991073328710332120230808014301.010.1515/9783111210544(CKB)5840000000262817(DE-B1597)649990(DE-B1597)9783111210544(EXLCZ)99584000000026281720230808h20232023 fg engur|||||||||||txtrdacontentcrdamediacrrdacarrierNaming, Defining, Phrasing Strong Asymmetrical Dependencies A Textual Approach /ed. by Jeannine Bischoff, Stephan Conermann, Marion GymnichBerlin ;Boston : De Gruyter, [2023]©20231 online resource (VI, 313 p.)Dependency and Slavery Studies ,2701-1127 ;83-11-121139-8 Frontmatter -- Contents -- Naming, Defining, Phrasing Strong Asymmetrical Dependencies: Introduction -- A ‘Grammar of Asymmetrical Dependency’ for Early Scandinavia (to c. 1350) -- Servant or Slave: The Old Persian Words Bandaka, Marika and Daha and their Cognates in Middle Iranian Languages -- Naming Eunuchs in Islamicate Societies -- Searching for the Captive Monk: Late Antique Slavery and Syrian Ascetical Theology and Practice -- Narrating ‘White Slavery’ in and out of Fiction, 1854–1880 -- The Slave Who Made It: Narratives of Manumitted Slaves in the Greek World -- Captured, Abducted, Sold: The Muslim Rennewart in the Middle High German Epic Poem Willehalm -- From Slave to Queen: Hurrem Sultan’s Agenda in Her Narration of Love (1526–1548) -- Women in the Sachsenspiegel: Gender and Asymmetrical Dependencies -- Differing Narratives of the Case of the Jaham Brothers and its Aftermath: Enslavement, Emancipation and their Legacies in Martinique -- Slavery and Beyond through the Lens of Judicial Reasoning – Criminal Justice and Human Rights Approaches and Perspectives -- IndexAn examination of the terms used in specific historical contexts to refer to those people in a society who can be categorized as being in a position of ‘strong asymmetrical dependency’ (including slavery) provides insights into the social categories and distinctions that informed asymmetrical social interactions. In a similar vein, an analysis of historical narratives that either justify or challenge dependency is conducive to revealing how dependency may be embedded in (historical) discourses and ways of thinking. The eleven contributions in the volume approach these issues from various disciplinary vantage points, including theology, global history, Ottoman history, literary studies, and legal history. The authors address a wide range of different textual sources and historical contexts – from medieval Scandinavia and the Fatimid Empire to the history of abolition in Martinique and human rights violations in contemporary society. While the authors contribute innovative insights to ongoing discussions within their disciplines, the articles were also written with a view to the endeavor of furthering Dependency Studies as a transdisciplinary approach to the study of human societies past and present.SOCIAL SCIENCE / SlaverybisacshSlavery.narratives.SOCIAL SCIENCE / Slavery.800Bischoff Jeannine, ctbhttps://id.loc.gov/vocabulary/relators/ctbBischoff Jeannine, edthttp://id.loc.gov/vocabulary/relators/edtBrink Stefan, ctbhttps://id.loc.gov/vocabulary/relators/ctbBrüggen Elke, ctbhttps://id.loc.gov/vocabulary/relators/ctbConermann Stephan, ctbhttps://id.loc.gov/vocabulary/relators/ctbConermann Stephan, edthttp://id.loc.gov/vocabulary/relators/edtCzygan Christiane, ctbhttps://id.loc.gov/vocabulary/relators/ctbEnnis Ruth, ctbhttps://id.loc.gov/vocabulary/relators/ctbGymnich Marion, edthttp://id.loc.gov/vocabulary/relators/edtDE-B1597DE-B1597BOOK9910733287103321Naming, Defining, Phrasing Strong Asymmetrical Dependencies3396838UNINA06326nam 2200721 450 991013501450332120231107063336.01-119-22461-61-119-22460-81-119-16231-9(CKB)4330000000008994(EBL)4585272(SSID)ssj0001695554(PQKBManifestationID)16544919(PQKBTitleCode)TC0001695554(PQKBWorkID)15049637(PQKB)25090308(Au-PeEL)EBL4585272(CaPaEBR)ebr11234255(CaONFJC)MIL978145(OCoLC)953458699(CaSebORM)9781119085294(MiAaPQ)EBC4585272(EXLCZ)99433000000000899420160802h20162016 uy 0engur|n|---|||||txtccrHow to measure anything in cybersecurity risk /Douglas W. Hubbard, Richard Seiersen1st editionHoboken, New Jersey :Wiley,2016.©20161 online resource (299 p.)THEi Wiley ebooksIncludes index.1-119-08529-2 Includes bibliographical references and index.How to Measure Anything in Cybersecurity Risk; Contents; Foreword; Foreword; Acknowledgments; About the Authors; Introduction; Why This Book, Why Now?; What Is This Book About?; What to Expect; Is This Book for Me?; We Need More Than Technology; New Tools for Decision Makers; Our Path Forward; Part I Why Cybersecurity Needs Better Measurements for Risk; Chapter 1 The One Patch Most Needed in Cybersecurity; The Global Attack Surface; The Cyber Threat Response; A Proposal for Cybersecurity Risk Management; Notes; Chapter 2 A Measurement Primer for Cybersecurity; The Concept of MeasurementExplaining the Elements of the Loss Exceedance CurveGenerating the Inherent and Residual Loss Exceedance Curves; Where Does the Risk Tolerance Curve Come from?; Supporting the Decision: A Return on Mitigation; Where to Go from Here; Notes; Chapter 4 The Single Most Important Measurement in Cybersecurity; The Analysis Placebo: Why We Can't Trust Opinion Alone; How You Have More Data Than You Think; When Algorithms Beat Experts; Some Research Comparing Experts and Algorithms; Why Does This Happen?; So What? Does This Apply to Cybersecurity?; Tools for Improving the Human ComponentThe Subjective Probability ComponentThe Expert Consistency Component; The Collaboration Component; The Decomposition Component; Summary and Next Steps; Notes; Chapter 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk; Scanning the Landscape: A Survey of Cybersecurity Professionals; What Color Is Your Risk? The Ubiquitous-and Risky-Risk Matrix; The Psychology of Scales and the Illusion of Communication; How the Risk Matrix Doesn't Add Up; Amplifying Effects: More Studies Against the Risk Matrix (As If We Needed More); Exsupero Ursus and Other FallaciesBeliefs about the Feasibility of Quantitative Methods: A Hard TruthSame Fallacy: More Forms; The Target Breach as a Counter to Exsupero Ursus; Communication and Consensus Objections; Conclusion; Notes; Part II Evolving the Model of Cybersecurity Risk; Chapter 6 Decompose It Unpacking the Details; Decomposing the Simple One-for-One Substitution Model; Just a Little More Decomposition; A Few Decomposition Strategies to Consider; More Decomposition Guidelines: Clear, Observable, Useful; Decision Analysis: An Overview of How to Think about a Problem; Avoiding "Over-Decomposition"A Summary of Some Decomposition RulesA ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything , author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.THEi Wiley ebooks.CyberterrorismCyberspaceSecurity measuresRisk managementCyberterrorism.CyberspaceSecurity measures.Risk management.658.4/78BUS061000COM053000bisacshHubbard Douglas W.1962-878024Seiersen RichardMiAaPQMiAaPQMiAaPQBOOK9910135014503321How to measure anything in cybersecurity risk2290477UNINA