Who controls cyberspace?

被引:4
|
作者
Choucri, Nazli [1 ]
Clark, David D. [2 ]
机构
[1] MIT, Cambridge, MA 02139 USA
[2] MIT, Comp Sci & Artificial Intelligence Lab, Cambridge, MA 02139 USA
关键词
Arab Spring; control-point analysis; cyberspace; Innocence of Muslims; international relations; Wikileaks; YouTube;
D O I
10.1177/0096340213501370
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
Until recently, cyberspace was considered largely a matter of low politics. But over the last decade, it has begun to shape the high politics of national security and other core concerns of national governments, as evidenced by the Wikileaks release of US classified information and the social media-influenced Arab Spring. The field of international relations has not kept pace with this emerging significance of cyberspace. As the international system and the empowered non-state groups and individuals of cyberspace shape one another, the potential collisions of law, policy, and the practice of governance have barely even been identified. Before the international community can begin to minimize the negative consequences of those inevitable collisions, it needs to understand how and where cyberspace and international relations intersect and influence one another. The authors provide two complementary systems for analyzing those intersections and influence points.
引用
收藏
页码:21 / 31
页数:11
相关论文
共 50 条
  • [31] Establishing Cyberspace Sovereignty
    Barcomb, Kris E.
    Krill, Dennis, I
    Mills, Robert F.
    Saville, Michael A.
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2012, 2 (03) : 26 - 38
  • [32] The Schizoids and Daydreamers in Cyberspace
    Khavidaki, Azam Dashti
    RUPKATHA JOURNAL ON INTERDISCIPLINARY STUDIES IN HUMANITIES, 2015, 7 (01): : 58 - 65
  • [33] Dealing with uncertainty in cyberspace
    van den Berg, Bibi
    COMPUTERS & SECURITY, 2024, 144
  • [34] Deterrence by denial in cyberspace
    Borghard, Erica D.
    Lonergan, Shawn W.
    JOURNAL OF STRATEGIC STUDIES, 2023, 46 (03) : 534 - 569
  • [35] Cybersecurity as the protection of cyberspace
    Adamson, Greg
    2021 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS21): TECHNOLOGICAL STEWARDSHIP & RESPONSIBLE INNOVATION, 2021,
  • [36] CYBERSECURITY WITHIN CYBERSPACE
    Capek, Jan
    Hola, Jana
    IDIMT-2016- INFORMATION TECHNOLOGY, SOCIETY AND ECONOMY STRATEGIC CROSS-INFLUENCES, 2016, 45 : 325 - 332
  • [37] Privacy Governance in Cyberspace
    Doneda, Danilo
    Almeida, Virgilio A. F.
    IEEE INTERNET COMPUTING, 2015, 19 (03) : 50 - 53
  • [38] A qualia representation of cyberspace
    Lacey, Timothy H.
    Mills, Robert F.
    Raines, Richard A.
    Oxley, Mark E.
    Bauer, Kenneth W.
    Rogers, Steven K.
    EVOLUTIONARY AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS II, 2008, 6964
  • [39] Cyberspace and virtual places
    Adams, PC
    GEOGRAPHICAL REVIEW, 1997, 87 (02) : 155 - 171
  • [40] Communication for Life in Cyberspace
    Cheon, Young-cheol
    ECUMENICAL REVIEW, 2020, 72 (02) : 242 - 254