Digital Disaster, Cyber Security, and the Copenhagen School
نویسندگان
چکیده
This article is devoted to an analysis of cyber security, a concept that arrived on the post-Cold War agenda in response to a mixture of technological innovations and changing geopolitical conditions. Adopting the framework of securitization theory, the article theorizes cyber security as a distinct sector with a particular constellation of threats and referent objects. It is held that ‘‘network security’’ and ‘‘individual security’’ are significant referent objects, but that their political importance arises from connections to the collective referent objects of ‘‘the state,’’ ‘‘society,’’ ‘‘the nation,’’ and ‘‘the economy.’’ These referent objects are articulated as threatened through three distinct forms of securitizations: hypersecuritization, everyday security practices, and technifications. The applicability of the theoretical framework is then shown through a case-study of what has been labeled the first war in cyber space against Estonian public and commercial institutions in 2007.
منابع مشابه
The Roadmap for Cyber Crime Investigation
As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. This paper i...
متن کاملAnalyzing the Consequences of the UAE Creating Artificial Islands in The Persian Gulf (Considering the Copenhagen School)
In recent years, the United Arab Emirates has begun creating artificial islands in the Persian Gulf. These actions have sparked many concerns throughout the region, particularly from Iran. This study defines and analyzes the process of securitizing the creation of the UAE artificial islands in the Persian Gulf. Although, according to the Law of the Sea Convention, coastal states are entitled to...
متن کاملFour-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report
Cyber security education and outreach is a national priority. It is critical to encourage high school students to pursue studies in cyber security and related fields. High school outreach is a fundamental component of a cohesive cyber security education program. Most high school outreach programs in cyber security focus on short-term events such as a capture the flag contest or the CyberPatriot...
متن کاملMiddle School Students' Social Media Use
Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and “bring your own technology” initiatives, attention to these topics is becoming increasingly important. A total of 593 middle school students were surveyed about digital footprint...
متن کاملAn Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009