Where computer security meets national security

被引:48
作者
Nissenbaum H. [1 ]
机构
[1] Department of Culture and Communication, New York University, New York, NY
基金
美国国家科学基金会;
关键词
Computer security; Cyber-security; Securitization;
D O I
10.1007/s10676-005-4582-3
中图分类号
学科分类号
摘要
This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of "securitization," developed by the Copenhagen School of International Relations. © Springer 2005.
引用
收藏
页码:61 / 73
页数:12
相关论文
共 50 条
  • [21] Machine learning for computer security
    Chan, Philip K.
    Lippmann, Richard P.
    JOURNAL OF MACHINE LEARNING RESEARCH, 2006, 7 : 2669 - 2672
  • [22] Aspects of computer security: A primer
    Steve Langer
    Brent Stewart
    Journal of Digital Imaging, 1999, 12 : 114 - 131
  • [23] NCSecMM: A National Cyber Security Maturity Model for an Interoperable "National Cyber Security" Framework
    El Kettani, Mohamed Dafir Ech-Cherif
    Debbagh, Taieb
    9TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS, 2009, : 236 - +
  • [24] Where Are We Looking for Security Concerns? Understanding Android Security Static Analysis
    Schmeelk, Suzanna
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 2, 2020, 1070 : 467 - 483
  • [25] The National Security Implications of Cyberbiosecurity
    George, Asha M.
    FRONTIERS IN BIOENGINEERING AND BIOTECHNOLOGY, 2019, 7 (MAR)
  • [26] A Security System for National Network
    Park, Woo Young
    Kim, Sang Hyun
    Vu, Duy-Son
    Song, Chang Han
    Jung, Hee Soo
    Jo, Hyeon
    INTELLIGENT COMPUTING, VOL 3, 2022, 508 : 789 - 803
  • [27] Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor
    Meng, Dan
    Hou, Rui
    Shi, Gang
    Tu, Bibo
    Yu, Aimin
    Zhu, Ziyuan
    Jia, Xiaoqi
    Wen, Yu
    Yang, Yun
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1571 - 1583
  • [28] Intelligence, Cyberspace, and National Security
    Gilad, Amitai
    Pecht, Eyal
    Tishler, Asher
    DEFENCE AND PEACE ECONOMICS, 2021, 32 (01) : 18 - 45
  • [29] Computer Security and Audits as a Measure to Protect Our Information
    Alarcon Cotrina, William Elvis
    Delgado Canales, Modesto Emerson
    Gutierrez Marino, Enrique Michael
    Crespo Buquich, Diego Andres
    Ogosi Auqui, Jose Antonio
    INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2, 2023, 579 : 511 - 520
  • [30] When Machine Learning meets Security Issues: A survey
    Guan, Zhenyu
    Bian, Liangxu
    Shang, Tao
    Liu, Jianwei
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SAFETY FOR ROBOTICS (ISR), 2018, : 158 - 165