What's in a Name? Metaphors and Cybersecurity

@article{Branch2021WhatsIA,
  title={What's in a Name? Metaphors and Cybersecurity},
  author={Jordan Branch},
  journal={International Organization},
  year={2021},
  volume={75},
  pages={39 - 70}
}
  • Jordan Branch
  • Published 24 September 2020
  • Computer Science
  • International Organization
Abstract For more than a decade, the United States military has conceptualized and discussed the Internet and related systems as “cyberspace,” understood as a “domain” of conflict like land, sea, air, and outer space. How and why did this concept become entrenched in US doctrine? What are its effects? Focusing on the emergence and consolidation of this terminology, I make three arguments about the role of language in cybersecurity policy. First, I propose a new, politically consequential… 

A conceptual critique of remote warfare

ABSTRACT This paper presents a conceptual critique of “remote warfare.” It argues that “remote warfare” is more of a trendy term than a robust concept. In support of this assessment, this paper makes

Two explanations for the paucity of cyber-military, cross-domain operations

This article investigates why states have launched so few cross-domain operations—in this case, operations between cyber and military domains—when they have launched so many cyberattacks. I explore

Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem

The stakes of this debate are not simply conceptual but institutional, and the contradiction between the nature of the problem and the bureaucratic solution has the potential to complicate both intelligence and cybersecurity.

Windmills of the Mind: Higher-Order Forms of Disinformation in International Politics

  • James Shires
  • Sociology
    2021 13th International Conference on Cyber Conflict (CyCon)
  • 2021
It is argued that the relevance of second, third, and higher orders of disinformation will only increase as more experienced actors draw on the material, successes, and lessons of previous campaigns, and offensive and defensive policy implications are argued.

Politics by many other means: The comparative strategic advantages of operational domains

ABSTRACT The land, sea, air, space, and cyber domains have distinct operational characteristics. Specialization in the means of using or threatening force is not just a technical issue because

Risk and uncertainty can be analyzed in cyberspace

This work analyzes the formulation of state perceptions of risk and uncertainty and seeks to establish a heuristic within which risk and Uncertainty can be analyzed.

Beyond Cybercrime: New Perspectives on Crime, Harm and Digital Technologies

This special issue comprises 10 journal articles and one book review. Collectively, the contributions broaden our theoretical and conceptual understandings of the technology–harm nexus and provide

Desecuritising cybersecurity: towards a societal approach

A mobile app that automates the very labor-intensive and therefore time-heavy and expensive and expensive process of manually cataloging and cataloging all the components of a cyberattack to ensure that it is safe and efficient to be used.

Islamic-Based Digital Ethics: The Phenomenon of Online Consumer Data Security

This paper seeks to explain the problem of widespread consumer data theft and the significance of online consumer data privacy in a review of Islamic values-based digital ethics. This research

No Shortcuts

Over the past decade, numerous states have declared cyberspace as a new domain of warfare, sought to develop a military cyber strategy and establish a cyber command. These developments have led to

References

SHOWING 1-10 OF 247 REFERENCES

Place and Cyberspace

For cyberlibertarians, the other shoe is rapidly dropping. In a curious inversion, those who argued less than a decade ago that cyberspace was a place all its own - and therefore unregulable by

Cyberspace As/And Space

The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the

Putting the "war" in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States

It is argued that the war metaphor and nuclear deterrence analogy are neither natural nor inevitable and that abandoning them would open up new possibilities for thinking more productively about the full spectrum of cyber security challenges, including the as-yet unrealized possibility of cyber war.

Western Frontier or Feudal Society?: Metaphors and Perceptions of Cyberspace

The Article examines how metaphors influence perceptions of cyberspace. Among other things, the Article studies the comparison of cyberspace to the American western frontier and the metaphor's

Against Sovereignty in Cyberspace

In discussing the historical origins of sovereignty, Jens Bartelson (2018, 510) wrote, “Making sense of sovereignty . . . entails making sense of its component terms—supreme authority and

What if Cyberspace Were for Fighting?

Abstract This essay explores the ethical and legal implications of prioritizing the militarization of cyberspace as part of a roundtable on “Competing Visions for Cyberspace.” Our essay uses an ideal

Cyberpolitics in International Relations

Cyberspace is widely acknowledged as a fundamental fact of daily life in today's world. Until recently, its political impact was thought to be a matter of low politics -- background conditions and

Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

Abstract : For most military analysts, the term deterrence brings to mind the notion of nuclear deterrence. We think of how two opposing states attempt to deter their adversaries through creating a

Metaphors for cyber security.

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008, that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches.

Digital Disaster, Cyber Security, and the Copenhagen School

An analysis of cyber security, a concept that arrived on the post-Cold War agenda in response to a mixture of technological innovations and changing geopolitical conditions, theorizes cyber security as a distinct sector with a particular constellation of threats and referent objects.
...