Correspondence: A Cyber Disagreement

نویسندگان

  • Jon R. Lindsay
  • Lucas Kello
چکیده

Policymakers and pundits have been sounding alarms about internet insecurity for years, so the arst appearance of anything in International Security (IS) on this topic is a welcomed development. In the fall 2013 issue, Lucas Kello takes the security studies community to task for ignoring cyber perils, while Erik Gartzke argues that cyberwar is of limited political utility.1 Kello writes that “[t]he Clausewitzian philosophical framework misses the essence of the cyber danger and conceals its true signiacance: the virtual weapon is expanding the range of possible harms between the concepts of war and peace, with important consequences for national and international security” (p. 22). Gartzke counters, “War is fundamentally a political process, as Carl von Clausewitz famously explained. . . . The internet is generally an inferior substitute for terrestrial force in performing the functions of coercion or conquest” (p. 42). If Kello is right, then the long silence in IS on cybersecurity suggests that scholars have neglected a major transformation in security affairs. If Gartzke is right, then scholars can be forgiven their bemusement with inoated cyber rhetoric. In my investigations of American and Chinese activities, I have found cyber interventions to be more complicated and less effective than generally believed.2 Arguments from technology are common in cybersecurity discourse and have excited policymakers, so they should be taken seriously. Yet Kello’s characterization of the skeptical viewpoint as “more visceral than analytical” (p. 9) misrepresents the analytical literature that does exist. Kello insists that “scholarly inattention toward the cyber issue . . . must change” (ibid.), but he disparages the aeld while ignoring relevant scholarship. My commentary addresses the technological determinism of Kello’s argument and his Correspondence: A Cyber Disagreement

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Leak Location of Pipeline with Multibranch Based on a Cyber-Physical System

Xianming Lang 1 ID , Ping Li 2,* ID , Yan Li 1 and Hong Ren 3 1 School of Automation, Northwestern Polytechnical University, Xi’an 710072, China; [email protected] (X.L.); [email protected] (Y.L.) 2 School of Information and Control Engineering, Liaoning Shihua University, Fushun 113001, China 3 CNPC Northeast Refining & Chemical Engineering Co. Ltd. Shenyang Company, Shenyang 11016...

متن کامل

The Model of Structural Relationships of Cyber Aggression Based on Self-Control with the Mediation of Mobile Phone Addiction in Adolescents: A Descriptive Study

Background and Objectives: Increasingly, cyberbullying has become a common phenomenon eroding the social media environment. The present study was conducted with the aim of determining the structural relationship pattern of cyber aggression based on self-control with the mediation of mobile phone addiction in adolescents. Materials and Methods: In this descriptive study, the statistical populat...

متن کامل

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

The Model of Structural Relationships of Cyber-Aggression Based on Family Communication Pattern with the Mediating Role of Addiction to Internet

Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating  role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...

متن کامل

Evaluation of a complementary cyber education program for a pathophysiology class.

PURPOSE The goal of this study was to develop and evaluate a complementary cyber education program for a required pathophysiology class for nursing students. METHODS The cyber education program comprised electronic bulletin boards, correspondence material storage, an announcement section, a report submission section, reference sites, and statistics on learning rates. Twelve online lectures co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014