Securing Virtual Space

@article{BarnardWills2012SecuringVS,
  title={Securing Virtual Space},
  author={David Barnard-Wills and Debi Ashenden},
  journal={Space and Culture},
  year={2012},
  volume={15},
  pages={110 - 123}
}
This article uses a governmentality and discourse analysis approach to analyze cyber security policy literature. It examines the problems of construction of virtual space and current efforts to secure this space political and technologically. It extracts a model of cyber security discourse that constructs cyberspace as ungovernable, unknowable, a cause of vulnerability, inevitably threatening, and a home to threatening actors. 

The materiality of cyberthreats: securitization logics in popular visual culture

This article traces securitization logics in popular visual culture to show how these representations make sense of technical incidents politically via material objects, showing a shift from depicting computers themselves as the main threat to the manipulation of data as exercise of power and finally, the wielding of code as weapon to create physical damage.

Canada’s cyber security and the changing threat landscape

Echoing the Paris School’s critique of securitization, it is argued that the Canadian discourse of cyber security needs to consider institutional routines and the hidden work of security professionals alongside the ‘securitizing moves’ of prominent speech acts.

Cyber Security and the Politics of Time

This book explores how cyber security communities understand the past, present and future, thereby shaping cyber security as a political practice and describes how these visions of future cyber security are sustained in the communities that articulate them.

Cyber Conflict Bibliography, 2015 Update

The purpose of this bibliography, originally prepared for the Future of Cyber Warfare symposium held at The George Washington University Law School in April 2012, is to provide scholarly and other

Cyber-noir: Cybersecurity and popular culture

  • James Shires
  • Computer Science
    Contemporary Security Policy
  • 2019
It is argued that the concept of cyber-noir helps explain the persistence of practices that blur legal, moral, and professional lines between legitimate and malicious activity in cyberspace.

Cybersecurity, Bureaucratic Vitalism and European Emergency

This paper analyses European modes of governing geared toward securing vital, emergent cyber-systems in the face of the interconnected emergency and develops the concept of ‘bureaucratic vitalism’ to get at the tension between the hierarchical organization and reductive knowledge frames of security apparatuses.

Manipulating uncertainty: cybersecurity politics in Egypt

The article argues that cybersecurity provides a way for the Egyptian government and opposition activists to “manipulate uncertainty” to their advantage, and highlights the role of uncertainty as a driver of cycles of innovation and response in contentious politics, including those that center on cybersecurity.

Apocalyptic Visions: Cyber War and the Politics of Time

This article contributes to the literature on representations of ‘cyber war’, specifically cyber war as a potential form of inter-state war or strategic terrorism. It argues that cyber war can be

Conceptualising conflicts in cyberspace

ABSTRACTThe article conceptualises political conflict in cyberspace. Thus far, scholarship has focussed on the analysis of (unilateral) cyberattacks, measuring their scope and impact, especially in

Cybersecurity, race, and the politics of truth

This article explores the racial politics underwriting cybersecurity’s recent human turn toward the issues of online disinformation and ‘foreign influence’ in US politics. Through a case study of the

References

SHOWING 1-10 OF 49 REFERENCES

Pattern of Global Cyber War and Crime: A Conceptual Framework

Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats

This paper looks at one set of issues – those related to cyber-terrorism and cyber attacks on critical infrastructure and their implications for national security.

Security: A New Framework for Analysis

Security Analysis: Conceptual Apparatus The Military Sector The Environmental Sector The Economic Sector The Societal Sector The Political Sector How Sectors are Synthesized by Actors.

The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection

“Cyberwar” has become a growth market in the US. While ten years ago the term would hardly have made sense to any expert, in the meantime attacks on computer networks and their implications for

Invitation to Terror—The Expanding Empire of the Unknown

Frank Furedi London, Continuum UK, 2007, xxxvi+204 pp., ISBN 978-0-8264-9957-8 Although by no means a new concern, terrorism has held a particular place in public discourse on security issues since...

Where Computer Security Meets National Security1

  • H. Nissenbaum
  • Computer Science
    Ethics and Information Technology
  • 2005
A comparative evaluation of two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack utilizes the theoretical construct of “securitization,” developed by the Copenhagen School of International Relations.

CYBERCRIME AND THE CULTURE OF FEAR

This article maps out the conceptual origins of cybercrime in social science fiction and other ‘faction’ genres to explore the relationship between rhetoric and reality in the production of knowledge

Contemporary Security Studies

Contemporary Security Studies provides an introduction to Security Studies. It features a wide breadth and depth of coverage of the different theoretical approaches to the study of security and the

Cyber-Conflict and Global Politics

1 Introduction: New Media and the Reconfiguration of Power in Global Politics Athina Karatzogianni Part I Transforming Media and Global Conflict 2. War and the New Media Paradox Hall Gardner 3. The

Cyberwar is coming

Abstract The information revolution and related organizational innovations are altering the nature of conflict and the kinds of military structures, doctrines, and strategies that will be needed.