{"id":38887,"date":"2021-04-10T10:15:40","date_gmt":"2021-04-10T09:15:40","guid":{"rendered":"https:\/\/www.istegroup.com\/?post_type=product&#038;p=38887"},"modified":"2024-01-03T13:44:05","modified_gmt":"2024-01-03T13:44:05","slug":"la-cybersecurite-en-sciences-humaines-et-sociales","status":"publish","type":"product","link":"https:\/\/www.istegroup.com\/fr\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/","title":{"rendered":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales"},"content":{"rendered":"<p>La question des m\u00e9thodes de recherche en sciences humaines et sociales (SHS) en mati\u00e8re de cybers\u00e9curit\u00e9 reste encore \u00e0 explorer. Pour les SHS, ce nouveau ph\u00e9nom\u00e8ne, complexe et multiforme, g\u00e9n\u00e8re des lectures diff\u00e9rentes mais compl\u00e9mentaires : politiques, strat\u00e9giques, militaires, \u00e9conomiques ou juridiques. Se pose donc la question des m\u00e9thodes de recherche pour analyser les causes et les cons\u00e9quences, humaines et mat\u00e9rielles, de la cybers\u00e9curit\u00e9.<\/p>\n<p>Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9. Il pr\u00e9sente les disciplines des SHS auxquelles la cybers\u00e9curit\u00e9 s\u2019int\u00e9resse, et pr\u00e9cise comment d\u00e9limiter l\u2019objet cybers\u00e9curit\u00e9 pour le traiter analytiquement par les SHS. Il r\u00e9pond enfin \u00e0 la question de savoir quelle plus-value peut \u00eatre apport\u00e9e par les SHS \u00e0 l\u2019\u00e9tude de la cybers\u00e9curit\u00e9 dans un cadre multidisciplinaire.<\/p>\n<p><a class=\"button\" style=\"margin-right: 10%\" href=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/757_La-cybersecurite-en-sciences-humaines-et-sociales_Loiseau_TOC.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Table des mati\u00e8res<\/a><a class=\"button\" style=\"margin-left: 10%\" href=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/757_La-cybersecurite-en-sciences-humaines-et-sociales_Loiseau_Premiere-partie.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Introduction<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>La question des m\u00e9thodes de recherche en sciences humaines et sociales (SHS) en mati\u00e8re de cybers\u00e9curit\u00e9 reste encore \u00e0 explorer. Pour les SHS, ce nouveau ph\u00e9nom\u00e8ne, complexe et multiforme, g\u00e9n\u00e8re des lectures diff\u00e9rentes mais compl\u00e9mentaires : politiques, strat\u00e9giques, militaires, \u00e9conomiques ou juridiques. Se pose donc la question des m\u00e9thodes de recherche pour analyser les causes [&hellip;]<\/p>\n","protected":false},"featured_media":38898,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"product_brand":[],"product_cat":[3262],"product_tag":[],"class_list":{"0":"post-38887","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-non-classe","8":"first","9":"instock","10":"shipping-taxable","11":"purchasable","12":"product-type-variable"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group<\/title>\n<meta name=\"description\" content=\"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group\" \/>\n<meta property=\"og:description\" content=\"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\" \/>\n<meta property=\"og:site_name\" content=\"ISTE Group\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T13:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"451\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\",\"url\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\",\"name\":\"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.istegroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg\",\"datePublished\":\"2021-04-10T09:15:40+00:00\",\"dateModified\":\"2024-01-03T13:44:05+00:00\",\"description\":\"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage\",\"url\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg\",\"contentUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg\",\"width\":300,\"height\":451,\"caption\":\"Livre scientifique - La cybers\u00e9curit\u00e9 en sciences humaines et sociales - Hugo Loiseau, Daniel Ventre, Hartmut Aden\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.istegroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/www.istegroup.com\/fr\/nouveautes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"La cybers\u00e9curit\u00e9 en sciences humaines et sociales\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.istegroup.com\/#website\",\"url\":\"https:\/\/www.istegroup.com\/\",\"name\":\"ISTE Group\",\"description\":\"\u00c9diteur des Sciences\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.istegroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group","description":"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/","og_locale":"fr_FR","og_type":"article","og_title":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group","og_description":"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.","og_url":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/","og_site_name":"ISTE Group","article_modified_time":"2024-01-03T13:44:05+00:00","og_image":[{"width":300,"height":451,"url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/","url":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/","name":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group","isPartOf":{"@id":"https:\/\/www.istegroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage"},"image":{"@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage"},"thumbnailUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg","datePublished":"2021-04-10T09:15:40+00:00","dateModified":"2024-01-03T13:44:05+00:00","description":"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage","url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg","contentUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg","width":300,"height":451,"caption":"Livre scientifique - La cybers\u00e9curit\u00e9 en sciences humaines et sociales - Hugo Loiseau, Daniel Ventre, Hartmut Aden"},{"@type":"BreadcrumbList","@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.istegroup.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/www.istegroup.com\/fr\/nouveautes\/"},{"@type":"ListItem","position":3,"name":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales"}]},{"@type":"WebSite","@id":"https:\/\/www.istegroup.com\/#website","url":"https:\/\/www.istegroup.com\/","name":"ISTE Group","description":"\u00c9diteur des Sciences","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.istegroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product\/38887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/media\/38898"}],"wp:attachment":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/media?parent=38887"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_brand?post=38887"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_cat?post=38887"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_tag?post=38887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}