Show simple item record

[journal article]

dc.contributor.authorValeriano, Brandonde
dc.contributor.authorManess, Ryan C.de
dc.date.accessioned2021-11-25T13:05:12Z
dc.date.available2021-11-25T13:05:12Z
dc.date.issued2018de
dc.identifier.issn2183-2463de
dc.identifier.urihttps://www.ssoar.info/ssoar/handle/document/75992
dc.description.abstractModerate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water’s edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field.de
dc.languageende
dc.subject.ddcPolitikwissenschaftde
dc.subject.ddcPolitical scienceen
dc.subject.ddcTechnik, Technologiede
dc.subject.ddcTechnology (Applied sciences)en
dc.subject.othercyber conflict; cyber security; cyber strategy; data collection; quantitative methodsde
dc.titleHow We Stopped Worrying about Cyber Doom and Started Collecting Datade
dc.description.reviewbegutachtet (peer reviewed)de
dc.description.reviewpeer revieweden
dc.identifier.urlhttps://www.cogitatiopress.com/politicsandgovernance/article/view/1368de
dc.source.journalPolitics and Governance
dc.source.volume6de
dc.publisher.countryPRTde
dc.source.issue2de
dc.subject.classozFriedens- und Konfliktforschung, Sicherheitspolitikde
dc.subject.classozPeace and Conflict Research, International Conflicts, Security Policyen
dc.subject.classozTechnikfolgenabschätzungde
dc.subject.classozTechnology Assessmenten
dc.rights.licenceCreative Commons - Namensnennung 4.0de
dc.rights.licenceCreative Commons - Attribution 4.0en
internal.statusformal und inhaltlich fertig erschlossende
dc.type.stockarticlede
dc.type.documentZeitschriftenartikelde
dc.type.documentjournal articleen
dc.source.pageinfo49-60de
internal.identifier.classoz10507
internal.identifier.classoz20800
internal.identifier.journal787
internal.identifier.document32
internal.identifier.ddc320
internal.identifier.ddc600
dc.source.issuetopicGlobal Cybersecurity: New Directions in Theory and Methodsde
dc.identifier.doihttps://doi.org/10.17645/pag.v6i2.1368de
dc.description.pubstatusVeröffentlichungsversionde
dc.description.pubstatusPublished Versionen
internal.identifier.licence16
internal.identifier.pubstatus1
internal.identifier.review1
internal.dda.referencehttps://www.cogitatiopress.com/politicsandgovernance/oai/@@oai:ojs.cogitatiopress.com:article/1368
ssoar.urn.registrationfalsede


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record