2018
DOI: 10.17645/pag.v6i2.1385
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Research Meets Science and Technology Studies

Abstract: This article sets out to show how different understandings of technology as suggested by Science and Technology Studies (STS) help reveal different political facets of cybersecurity. Using cybersecurity research as empirical site, it is shown that two separate ways of understanding cybertechnologies are prevalent in society. The primary one sees cybertechnologies as apolitical, flawed, material objects that need to be fixed in order to create more security; the other understands them as mere political tools in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
13
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 42 publications
(15 citation statements)
references
References 16 publications
0
13
0
2
Order By: Relevance
“…Cybersecurity refers to a link between different indicators such as measures of risk evaluation, methodologies for risk management, skills and policies to reach the general target -improvement of asset, sensitive information or data security. Moreover, the important part is to ensure that the feedback about the confidentiality, availability and compliance of information is gathered and provided to responsible institutions (Cavelty, 2018). An efficient strategy for cybersecurity requires a high-level engagement of all accountable elements in the organization.…”
Section: Cyber Security Conceptmentioning
confidence: 99%
“…Cybersecurity refers to a link between different indicators such as measures of risk evaluation, methodologies for risk management, skills and policies to reach the general target -improvement of asset, sensitive information or data security. Moreover, the important part is to ensure that the feedback about the confidentiality, availability and compliance of information is gathered and provided to responsible institutions (Cavelty, 2018). An efficient strategy for cybersecurity requires a high-level engagement of all accountable elements in the organization.…”
Section: Cyber Security Conceptmentioning
confidence: 99%
“…Security, so the literature says, is entrenched in symbolic and cultural contexts, which generate meanings for actors and audiences through relational dynamics. Lene Hansen, who has most prominently theorized the role of images in securitization processes 9 PJAC New Series 7 (1/2018): 7-28 important and need special attention, they do not have the power to securitize anything by themselves. Rather, pictures depend "upon someone or somebody -a securitizing actor -who holds that the image demonstrates a threat-defense urgency and calls for an immediate response" 10 .…”
Section: The Approachmentioning
confidence: 99%
“…He suggested focusing on a third understanding to bridge the gap between each other: technology is defined as the embodiment of social knowledge. He believes that, corresponding to this, research on cyber politics will benefit from two innovations: cyber security as the focus of social practice (making and stabilizing by spreading knowledge about vulnerabilities) and the use of practical attention and elimination of these loopholes [6]. Ahlawat P studied the problem of node capture from an adversarial perspective.…”
Section: Introductionmentioning
confidence: 99%