Cyber-noir: Cybersecurity and popular culture

@article{Shires2019CybernoirCA,
  title={Cyber-noir: Cybersecurity and popular culture},
  author={James Shires},
  journal={Contemporary Security Policy},
  year={2019},
  volume={41},
  pages={107 - 82}
}
  • James Shires
  • Published 22 September 2019
  • Computer Science
  • Contemporary Security Policy
ABSTRACT Cybersecurity experts foster a perception of cybersecurity as a gloomy underworld in which the good guys must resort to unconventional tactics to keep at bay a motley group of threats to the digital safety of unsuspecting individuals, businesses, and governments. This article takes this framing seriously, drawing on film studies scholarship that identifies certain aesthetic themes as associated with moral ambiguity in noir films. This article introduces the term “cyber-noir” to… 

50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers

  • L. Tanczer
  • Computer Science
    Contemporary Security Policy
  • 2019
An international political sociology framework is applied and a conceptual framework (the Möbius strip) is proposed to situate the moral valence of hackers on a flexible model to provide insight into the ontological and normative complexities that define the study of hackers, as well as the perception of IT and cybersecurity professionals.

Manipulating uncertainty: cybersecurity politics in Egypt

The article argues that cybersecurity provides a way for the Egyptian government and opposition activists to “manipulate uncertainty” to their advantage, and highlights the role of uncertainty as a driver of cycles of innovation and response in contentious politics, including those that center on cybersecurity.

Corruption as a cybersecurity threat in conditions of the new world's order

The research purpose of the paper is to determine current issues and prospective of ensuring cybersecurity under the fight against corruption as its threat in pandemic and post-pandemic world conditions.

Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem

The stakes of this debate are not simply conceptual but institutional, and the contradiction between the nature of the problem and the bureaucratic solution has the potential to complicate both intelligence and cybersecurity.

Cyber security meets security politics: Complex technology, fragmented politics, and networked science

The intellectual history is provided to situate this literature in its broader evolutionary context and conclude that it is a vibrant and diverse biotope that is benefitting from its interdisciplinarity, its relevance for policy, and its cognizance of the interplay between technological possibilities and political choices of state actors.

New Questions for an Old Alliance: NATO in Cyberspace and American Public Opinion

Cybersecurity poses new questions for old alliances. These questions emerge with special force in the case of the North Atlantic Treaty Organization (NATO). The Russian Federation wields

Twenty-five years of cyber threats in the news: a study of Swedish newspaper coverage (1995-2019)

This study finds the meaning of “hacking” in the media to be more diversified and nuanced than previously assumed and provides insights into media representations of particular cyber threats.

A different cup of TI? The added value of commercial threat intelligence

It is found that value in this market is understood differently than prior work on quality metrics has assumed, and that poor coverage and small volume appear less of a problem to customers.

A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security

Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be

References

SHOWING 1-10 OF 148 REFERENCES

From Cyber‐Bombs to Political Fallout: Threat Representations with an Impact in the Cyber‐Security Discourse

This article explores the constitutive effects of different threat representations in the broader cyber-security discourse and focuses not solely on discursive practices by “visible” elite actors, but also on how a variety of less visible actors inside and outside of government shape a reservoir of acceptable threat representations that influence everyday practices of cyber- security.

Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats

It is argued that cyber-doom scenarios are the latest manifestation of fears about “technology-out-of-control” in Western societies, that they are unrealistic, and that they encourage the adoption of counterproductive, even dangerous policies.

Hackers and the contested ontology of cyberspace

This article analyzes the transformation in our conception of hacking over the past few decades to the current point where hackers are conceived as miscreants, vandals, criminals, and even

Enacting Expertise: Ritual and Risk in Cybersecurity

It is proposed that cybersecurity expertise is best understood as a skilled performance which satisfies decision-makers’ demands for risk management, and that the ritualized physical separation between disinterested knowledge-sharing and commercial advertisement at cybersecurity conferences enacts an ideal of “pure cybersecurity expertise rarely encountered elsewhere.

Family Resemblance or Family Argument ? Three Perspectives on Cybersecurity and their Interactions

It is concluded that only by understanding both family resemblances and family arguments between these three conceptions of cybersecurity can be established dialogues between the various communities working on urgent cybersecurity problems.

Digital Disaster, Cyber Security, and the Copenhagen School

An analysis of cyber security, a concept that arrived on the post-Cold War agenda in response to a mixture of technological innovations and changing geopolitical conditions, theorizes cyber security as a distinct sector with a particular constellation of threats and referent objects.

Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate

This paper analyzes the US cyber-terror discourse from a constructivist security studies angle, and speculates on characteristics that are responsible for the rapid and considerable political impact of the widespread conceptualization of aspects of information technology as a security problem in the 1990s.

Toward a Human-Centric Approach to Cybersecurity

  • Ronald J. Deibert
  • Political Science, Computer Science
    Ethics & International Affairs
  • 2018
This essay presents an alternative approach to cybersecurity that is derived from the tradition of “human security,” which prioritizes the individual, and views networks as part of the essential foundation for the modern exercise of human rights.

Globalized-In-Security: the Field and the Ban-Opticon

T discourses that the United States and its closest allies 2 have put forth asserting the necessity to globalize security have taken on an unprecedented intensity and reach. They justify themselves

Canada’s cyber security and the changing threat landscape

Echoing the Paris School’s critique of securitization, it is argued that the Canadian discourse of cyber security needs to consider institutional routines and the hidden work of security professionals alongside the ‘securitizing moves’ of prominent speech acts.
...