What kind of cyber security? Theorising cyber security and mapping approaches

Article English OPEN
Fichtner (Laura);
(2018)
  • Publisher: Alexander von Humboldt Institute for Internet and Society
  • Journal: Internet Policy Review (issn: 2197-6775, eissn: 2197-6775)
  • Publisher copyright policies & self-archiving
  • Related identifiers: doi: 10.14763/2018.2.788
  • Subject: Securitisation | Computer science, knowledge & systems | Cyber security | Cybernetics | Values | Computer Ethics | Ethics | Commerce, communications & transportation | Internet Policy | Social Sciences | Q350-390 | Q300-390 | Information theory | Internet governance
    • ddc: ddc:380 | ddc:000 | ddc:340 | ddc:300

Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involv... View more
  • References (4)

    Ani, U. P. D., He, H. M., & Tiwari, A. (2016). Human capability evaluation approach for cyber security in critical industrial infrastructure. In D. Nicholson (Ed.), Advances in Human Factors in Cybersecurity (501st ed., pp. 169 182). Cham, CH: Springer. doi1:0.1007/978-3-319-41932- 9_14 Baldwin, D. A. (1997). The concept of security. Review of International Studies, 23(1), 5 26.

    Retrieved from https://www.cambridge.org/core/journals/review-of-internationalstudies/article/the-concept-of-security/67188B6038200A97C0B0A370FDC9D6B8 Bhattacharya, A. (2016, October 12). Facebook is under fire for censorship again, this time for blocking an image of a mammogram. Quartz. Retrieved from https://qz.com/807427/facebook-fb-is-under-fire-forcensorship-again-this-time-for-blocking-an-image-of-a-mammogram/ Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner Pub. Retrieved from https://books.google.de/books/about/Security.html?id=j4BGr-Elsp8C&redir_esc=y Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly, 53(4), 1155 1175. doi1:0.1111/j.1468- 2478.2009.00572.x Heath, A. (2017, June 28). Facebook s rules on hate speech leaked in new investigation.

    Business Insider Deutschland. Retrieved from http://www.businessinsider.de/facebook-hate-speech-rules-leaked-2017-6?r=US&IR=T Hofmann, J., Katzenbach, C., & Gollatz, K. (2016). Between coordination and regulation: Finding the governance in Internet governance. New Media & Society, 19(9), 1406 1423.

    doi:10.1177/1461444816639975 Krüger, P. S. (2016, March 17). Warum der Streit zwischen Apple und dem FBI so wichtig ist.

  • Related Organizations (2)
  • Metrics
Share - Bookmark