Where computer security meets national security

被引:48
作者
Nissenbaum H. [1 ]
机构
[1] Department of Culture and Communication, New York University, New York, NY
基金
美国国家科学基金会;
关键词
Computer security; Cyber-security; Securitization;
D O I
10.1007/s10676-005-4582-3
中图分类号
学科分类号
摘要
This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of "securitization," developed by the Copenhagen School of International Relations. © Springer 2005.
引用
收藏
页码:61 / 73
页数:12
相关论文
共 50 条
  • [31] The Need for Certification-Based Security Curriculum: A Matter of National Security
    Wallace, Gary L.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 840 - 843
  • [32] The Influence of Cyber Security Levels of South African Citizens on National Security
    van Vuuren, Joey Jansen
    Grobler, Marthie
    Zaaiman, Jannie
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 138 - 147
  • [33] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [34] Illicit Finance as a National Security Threat: Balancing Security and Unintended Consequences
    Nizzero, Maria
    RUSI JOURNAL, 2024, 169 (06) : 64 - 76
  • [35] Intellectual property theft and national security: Agendas and assumptions
    Halbert, Debora
    INFORMATION SOCIETY, 2016, 32 (04) : 256 - 268
  • [36] Cybersecurity and information security - what goes where?
    von Solms, Basie
    von Solms, Rossouw
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 2 - 9
  • [37] picoCTF 2013-Toaster Wars when interactive storytelling game meets the largest computer security competition
    Zhang, Kaiyang
    Dong, Shihao
    Zhu, Guoliang
    Corporon, Danielle
    McMullan, Tim
    Barrera, Salvador
    2013 IEEE INTERNATIONAL GAMES INNOVATION CONFERENCE (IGIC), 2013, : 293 - 299
  • [38] Research on Computer Security and Firewall Technology
    Chen, Ping
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 257 - 260
  • [39] Reasoning with Dynamic Domains and Computer Security
    Bai, Yun
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 93 - 95
  • [40] The Rise of Hardware Security in Computer Architectures
    Schaumont, Patrick
    Montuschi, Paolo
    COMPUTER, 2018, 51 (08) : 4 - 5