Hacking Cyberspace

نویسنده

  • David J. Gunkel
چکیده

Knowledge about cyberspace is shaped and delimited by the questions we ask and the kinds of inquiries we pursue. Questioning, of course, is never objective or neutral. As Martin Heidegger demonstrates, a question, no matter how carefully articulated, necessarily harbors preconceptions and pre-understandings that direct and regulate inquiry (24). When we ask, for example, whether cyberspace portends a new world of opportunity that is uninhibited by the limitations of embodiment and physical existence, or a techno-dystopia of alienation and surveillance where digital artifacts supersede lived reality, or something in between these two extremes, our query already affiliates us with the terms and conditions of a well-established debate and employs a complex set of assumptions concerning the essence, function, and significance of technology (see Critical Art Ensemble; Mattelart). This network of preconditions and assumptions usually does not appear as such within the space of a specific inquiry but constitutes the epistemological context in which any significant investigation is and must be situated. To continue to operate on the basis of these established systems is certainly understandable, completely rational, and potentially useful. Doing so, however, necessitates adherence to exigencies and prejudices that often remain unexamined, unquestioned, and essentially unknown. If we are to know how we know cyberspace, we need to devise methods of investigation that target and question the network of preconditions and assumptions that already inform and delimit our modes of inquiry. What is required are procedures that do not simply conform to the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hacking Back: Not the Right Solution

In cyberspace attackers enjoy an advantage over defenders, which has popularized the concept of “active cyber defense”— offensive actions intended to punish or deter the adversary. This article argues active cyber defense is not a practical course of action to obtain tactical and strategic objectives. Instead, “aggressive cyber defense,” a proactive security solution, is a more appropriate opti...

متن کامل

Framework and principles for active cyber defense

This essay offers a broad view of active defense derived from the concept of active air and missile defense. This view admits a range of cyber defenses, many of which are widely deployed and considered essential in today’s threat environment. Instead of equating active defense to hacking back, this wider interpretation lends itself to distinguishing different types of active defense and the leg...

متن کامل

Research on Constructing an Internet - based Multi - step Security System

Due to the side effects of the increasing Internet population and the proliferation of new cyberspace culture on the current Internet culture, this research seeks to construct a multi-step security system as a counter measure. This multi-step security system utilizes the existing legacy security solution firewall, intrusion detection system, and intrusion prevention system and virus wall to pro...

متن کامل

Non-state Actors in Cyberspace Operations

The growing importance of cyberspace to modern society, and its increasing use as an arena for dispute, is becoming a national security concern for governments and armed forces globally. The special characteristics of cyberspace, such as its asymmetric nature, the lack of attribution, the low cost of entry, the legal ambiguity, and its role as an efficient medium for protest, crime, espionage a...

متن کامل

Why Clouds Give Me a Case of the Vapors

A ccording to Apple, “ ... certain celebrity accounts were compromised by a very targeted attack on user names, passwords, and security questions.”1 Didn’t we cover defensive privacy tactics in my January column?2 Color me dazed and confused! Hacking in cyberspace? Nothing like that’s ever happened before. (I’ve got another heads-up for you iPhone users—Siri talks about you behind your back. I’...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010