2008
DOI: 10.1080/19393550802178565
|View full text |Cite
|
Sign up to set email alerts
|

Hacking the Nation-State: Security, Information Technology and Policies of Assurance∗

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…In their efforts to regulate the use of cyberspace within their own borders, states have enacted multiple legislations and instituted new structures and actors (Betz and Stevens 2011). Fundamentally, it has become apparent that states cannot assure the security of information systems alone; instead, responsibility for information security needs to be dispersed across all stakeholders, because the majority of cyberspace is owned and operated by private companies (Bronk 2008). Thus, states will often need to request that private actors operating in their territories take the necessary actions to prevent or terminate detrimental international cyber conduct.…”
Section: Fragmentation Of Authoritymentioning
confidence: 99%
“…In their efforts to regulate the use of cyberspace within their own borders, states have enacted multiple legislations and instituted new structures and actors (Betz and Stevens 2011). Fundamentally, it has become apparent that states cannot assure the security of information systems alone; instead, responsibility for information security needs to be dispersed across all stakeholders, because the majority of cyberspace is owned and operated by private companies (Bronk 2008). Thus, states will often need to request that private actors operating in their territories take the necessary actions to prevent or terminate detrimental international cyber conduct.…”
Section: Fragmentation Of Authoritymentioning
confidence: 99%
“…In their efforts to regulate the use of cyberspace within their own borders, states have enacted multiple legislations and instituted new structures and actors (Betz and Stevens 2011). Fundamentally, it has become apparent that states cannot assure the security of information systems alone; instead, responsibility for information security needs to be dispersed across all stakeholders, because the majority of cyberspace is owned and operated by private companies (Bronk 2008). Thus, states will often need to request that private actors operating in their territories take the necessary actions to prevent or terminate detrimental international cyber conduct.…”
Section: Fragmentation Of Authoritymentioning
confidence: 99%
“…This case illustrates that seemingly no system is completely secure. Both individuals interacting with a seemingly secure network as well as network structures themselves always bear a certain degree of vulnerability (Bronk, 2008). Hence, personal data that is stored up to ten years certainly is not safe.…”
Section: Marblementioning
confidence: 99%