publication . Other literature type . Article . 2018

What kind of cyber security? Theorising cyber security and mapping approaches

Fichtner, Laura;
Open Access
  • Published: 01 Jan 2018
  • Publisher: HIIG - Alexander von Humboldt Institute for Internet and Society
Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances our understanding of how this shapes relationships between actors and of the values prioritised, promoted and inscribed into the concerned technologies.
Persistent Identifiers
free text keywords: Internet Policy, Social Sciences, Computer science, knowledge & systems, Commerce, communications & transportation, Cyber security, Securitisation, Internet governance, Ethics, Values, Computer Ethics, lcsh:Cybernetics, lcsh:Q300-390, lcsh:Information theory, lcsh:Q350-390, ddc:300, ddc:340, ddc:000, ddc:380
Related Organizations

Ani, U. P. D., He, H. M., & Tiwari, A. (2016). Human capability evaluation approach for cyber security in critical industrial infrastructure. In D. Nicholson (Ed.), Advances in Human Factors in Cybersecurity (501st ed., pp. 169 182). Cham, CH: Springer. doi1:0.1007/978-3-319-41932- 9_14 Baldwin, D. A. (1997). The concept of security. Review of International Studies, 23(1), 5 26.

Retrieved from Bhattacharya, A. (2016, October 12). Facebook is under fire for censorship again, this time for blocking an image of a mammogram. Quartz. Retrieved from Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner Pub. Retrieved from Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly, 53(4), 1155 1175. doi1:0.1111/j.1468- 2478.2009.00572.x Heath, A. (2017, June 28). Facebook s rules on hate speech leaked in new investigation.

Business Insider Deutschland. Retrieved from Hofmann, J., Katzenbach, C., & Gollatz, K. (2016). Between coordination and regulation: Finding the governance in Internet governance. New Media & Society, 19(9), 1406 1423.

doi:10.1177/1461444816639975 Krüger, P. S. (2016, March 17). Warum der Streit zwischen Apple und dem FBI so wichtig ist.

Any information missing or wrong?Report an Issue