What kind of cyber security? Theorising cyber security and mapping approaches

被引:10
作者
Fichtner, Laura [1 ]
机构
[1] Univ Hamburg, Dept Informat, Hamburg, Germany
关键词
Cyber security; Securitisation; Internet governance; Ethics; Values; Computer Ethics;
D O I
10.14763/2018.2.788
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances our understanding of how this shapes relationships between actors and of the values prioritised, promoted and inscribed into the concerned technologies.
引用
收藏
页数:19
相关论文
共 46 条
[1]  
[Anonymous], 2008, COMPUTERWOCHE 0118
[2]  
[Anonymous], 2018, BBC NEWS JUN
[3]   The concept of security [J].
Baldwin, DA .
REVIEW OF INTERNATIONAL STUDIES, 1997, 23 (01) :5-26
[4]  
Bhattacharya A., 2016, QUARTZ 1012
[5]  
Buzan B., 1998, SECURITY NEW FRAMEWO
[6]   From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse [J].
Cavelty, Myriam Dunn .
INTERNATIONAL STUDIES REVIEW, 2013, 15 (01) :105-122
[7]  
CNN Library, 2018, CNN
[8]  
Cruz-Cunha M. M., 2015, HDB RES DIGITAL CRIM
[9]  
Daniel Ani U., 2016, ADV INHUMANFACTORS C, P169, DOI DOI 10.1007/978-3-319-41932-9_14
[10]  
Davis Joshua, 2008, WIRED