2014
DOI: 10.1080/03071847.2014.969932
|View full text |Cite
|
Sign up to set email alerts
|

OMG Cyber!

Abstract: In the film War Games (1983), ateenage hacker accidentally tricksJoshua-acomputer thatcontrols the US nucleararsenal-intoplaying war. Image courtesy of Everett Collection/REX.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 0 publications
0
7
0
2
Order By: Relevance
“…First, such reports inform decisions at both the strategic and tactical level. Intelligence reports take highly technical data, combine the information with the interpretations of analysts, and give a bottom line to fill knowledge gaps in the government and guide action...Simply put: many of these reports are incomplete or inaccurate" [21].…”
Section: Methodsmentioning
confidence: 99%
“…First, such reports inform decisions at both the strategic and tactical level. Intelligence reports take highly technical data, combine the information with the interpretations of analysts, and give a bottom line to fill knowledge gaps in the government and guide action...Simply put: many of these reports are incomplete or inaccurate" [21].…”
Section: Methodsmentioning
confidence: 99%
“…Hansen and Nissenbaum (2009) have argued influentially that cybersecurity, as an emerging discourse in international security, is the product of a technical computer security discourse plus securitization: the framing of international political issues as problems of security (Buzan, Waever, & Wilde, 1997). A large literature has critically examined the securitization of cyberspace (e.g., Barnard-Wills & Ashenden, 2012;Bendrath, 2001; Lee & Rid, 2014;Zajko, 2015), highlighting that cybersecurity threats are the contingent result of particular communications to a receptive audience. As Dunn Cavelty has shown, this securitization is not dependent on a single speech act, but has a complex genealogy (2008a, 2008b), and relies on less visible actors to shape threat perceptions (2013).…”
Section: Legitimate and Malicious Activity In Cyberspacementioning
confidence: 99%
“…Tím je koncept "cyber", u kterého byly dopady jeho nadměrné popularity dobře zmapovány. 50 Níže je diskutováno několik konkrétních způsobů, jakými pragmatismus ohledně konceptu hybridní války může škodit nebo škodí bezpečnosti a obraně, ne nutně v pořadí závažnosti.…”
Section: Následky Paradoxuunclassified