How We Stopped Worrying about Cyber Doom and Started Collecting Data
Autor: | Ryan C. Maness, Brandon Valeriano |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2018 |
Předmět: |
data collection
Public Administration Sociology and Political Science Technology (Applied sciences) Politikwissenschaft Friedens- und Konfliktforschung Sicherheitspolitik 0211 other engineering and technologies Peace and Conflict Research International Conflicts Security Policy 02 engineering and technology Geopolitics Computer security computer.software_genre cyber conflict cyber security cyber strategy quantitative methods Task (project management) Cyberwarfare lcsh:Political science (General) Technology Assessment Political science 050602 political science & public administration Technikfolgenabschätzung lcsh:JA1-92 021110 strategic defence & security studies Technik Technologie Field (Bourdieu) 05 social sciences Perspective (graphical) Witness 0506 political science Humanity ddc:320 computer ddc:600 |
Zdroj: | Politics and Governance, Vol 6, Iss 2, Pp 49-60 (2018) Politics and Governance Global Cybersecurity: New Directions in Theory and Methods |
ISSN: | 2183-2463 |
Popis: | Moderate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water’s edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field. |
Databáze: | OpenAIRE |
Externí odkaz: |