A Case-Study on American Perspectives on Cyber and Security

被引:0
作者
Jantunen, Saara
Huhtinen, Aki-Mauri
机构
来源
PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY | 2011年
关键词
cyber; securitization; strategic communication; linguistics;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2009, the Cybersecurity Act of 2009 was introduced to U.S. Congress while the media were reporting about China's role in the Ghostnet-network. In 2010, WikiLeaks and selected newspapers published confidential documents, stirring up a cybersecurity debate. This article discusses these narratives in the context of securitization. The methodology consists of linguistic theory, namely the systemic functional language theory, and the securitization theory of the Copenhagen School. The analysis realizes as examination of the structures and evaluations of the action descriptions referring to the threat. As a result we can see that cyber discourse is a synonym to threat discourse. The agenda of cyber discourse is not purely about security, but is a reflection of the battle over cyber authority and the question of its status as a battle space.
引用
收藏
页码:163 / 171
页数:9
相关论文
共 19 条
[1]  
[Anonymous], 2003, BOMBS BANDWIDTH EMER
[2]  
[Anonymous], BOMBS BANDWIDTH EMER
[3]  
[Anonymous], CYB POL REV ASS TRUS
[4]  
[Anonymous], 2004, INTRO FUNCTIONAL GRA, DOI DOI 10.4324/9780203783771
[5]  
Beckford M, 2010, TELEGRAPH 1130
[6]  
Buzan B., 1998, Security: a new framework for analysis, DOI DOI 10.1515/9781685853808
[7]  
China Economic and Security Review Commission, 2008, 2008 REP C
[8]  
COLLINS N, 2010, TELEGRAPH 1201
[9]  
CSIS, 2008, SEC CYB 44 PRES SEC CYB 44 PRES
[10]  
James F, 2010, WIKILEAKS IS TERROR