How the United States Constructs Cyber-Threat Scenarios

被引:0
|
作者
Schmoldt, Janine [1 ]
机构
[1] Univ Erfurt, Fac Econ Law & Social Sci, Erfurt, Germany
关键词
cyberspace; speech act; securitisation; cyber-threat scenarios; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cyberwar has not taken place so far but it belongs to the realm of what could and might take place. Nevertheless, U.S military and the political establishment think that a cyberwar will take place. The U.S Presidents Clinton, Bush, Obama and Trump established cyberspace-threat-scenarios. The speech acts from the Presidents as well as the Presidential documents attempt to construct a threatening image of cyberspace. Whether or not cyberspace really poses a threat is thereby not relevant, it is just the speech act that constructs the threatening image. But why is cyberspace seen as a threat? Why is such a threatening image of cyberspace presented? This paper is devoted to these questions. In order to answer them, the Copenhagen School's Theory of Securitisation will be applied to cyberspace. This will be done since the Copenhagen School offers an explanation why certain issues will become existential threats: it is the act of "securitisation" that transforms certain issues through speech acts into a matter of national security.
引用
收藏
页码:361 / 368
页数:8
相关论文
共 50 条
  • [1] Is jihadism a cyber-threat?
    Torres Soriano, Manuel R.
    REVISTA DE OCCIDENTE, 2015, (406) : 20 - 34
  • [2] Cyber-Threat Proliferation
    Kellerman, Tom
    IEEE SECURITY & PRIVACY, 2010, 8 (03) : 70 - 73
  • [3] Limits to a cyber-threat
    Emerson, R. Guy
    CONTEMPORARY POLITICS, 2016, 22 (02) : 178 - 196
  • [4] Cyber-threat evolution: The year ahead
    Gostev, A., 1600, Elsevier Ltd (2012):
  • [5] Mitigation of Cyber-Threat on Dynamic State Estimation
    Almasabi, Saleh
    2023 4TH INTERNATIONAL CONFERENCE ON CLEAN AND GREEN ENERGY ENGINEERING, CGEE, 2023, : 1 - 5
  • [6] Social Process for Cyber-Threat Analysis (SPCTA)
    Brown, Harry, III
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 441 - 449
  • [7] Cyber-threat protection strategies for small businesses
    Carver, Michael
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2014, 247
  • [8] Cyber-threat landscape of border control infrastructures
    Chatzis, Petros
    Stavrou, Eliana
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, 36
  • [9] Cyber-threat landscape of border control infrastructures
    Chatzis, Petros
    Stavrou, Eliana
    International Journal of Critical Infrastructure Protection, 2022, 36
  • [10] Preventing unauthorized islanding: Cyber-threat analysis
    Simmons, Sharon
    Edwards, Dennis
    Wilde, Norman
    Just, Jiri
    Satyanarayana, Mahidhar
    PROCEEDINGS OF THE 2006 IEEE/SMC INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING, 2006, : 178 - +