dc.contributor.author | McCarthy, Daniel R. | de |
dc.date.accessioned | 2022-02-02T12:02:59Z | |
dc.date.available | 2022-02-02T12:02:59Z | |
dc.date.issued | 2018 | de |
dc.identifier.issn | 2183-2463 | de |
dc.identifier.uri | https://www.ssoar.info/ssoar/handle/document/77110 | |
dc.description.abstract | Cybersecurity sits at the intersection of public security concerns about critical infrastructure protection and private security concerns around the protection of property rights and civil liberties. Public-private partnerships have been embraced as the best way to meet the challenge of cybersecurity, enabling cooperation between private and public sectors to meet shared challenges. While the cybersecurity literature has focused on the practical dilemmas of providing a public good, it has been less effective in reflecting on the role of cybersecurity in the broader constitution of political order. Unpacking three accepted conceptual divisions between public and private, state and market, and the political and economic, it is possible to locate how this set of theoretical assumptions shortcut reflection on these larger issues. While public-private partnerships overstep boundaries between public authority and private right, in doing so they reconstitute these divisions at another level in the organization of political economy of liberal democratic societies. | de |
dc.language | en | de |
dc.subject.ddc | Politikwissenschaft | de |
dc.subject.ddc | Political science | en |
dc.subject.other | capitalism; critical infrastructure protection; critical theory; cybersecurity; public-private partnerships | de |
dc.title | Privatizing Political Authority: Cybersecurity, Public-Private Partnerships, and the Reproduction of Liberal Political Order | de |
dc.description.review | begutachtet (peer reviewed) | de |
dc.description.review | peer reviewed | en |
dc.identifier.url | https://www.cogitatiopress.com/politicsandgovernance/article/view/1335 | de |
dc.source.journal | Politics and Governance | |
dc.source.volume | 6 | de |
dc.publisher.country | PRT | de |
dc.source.issue | 2 | de |
dc.subject.classoz | Allgemeines, spezielle Theorien und Schulen, Methoden, Entwicklung und Geschichte der Politikwissenschaft | de |
dc.subject.classoz | Basic Research, General Concepts and History of Political Science | en |
dc.rights.licence | Creative Commons - Namensnennung 4.0 | de |
dc.rights.licence | Creative Commons - Attribution 4.0 | en |
internal.status | formal und inhaltlich fertig erschlossen | de |
dc.type.stock | article | de |
dc.type.document | Zeitschriftenartikel | de |
dc.type.document | journal article | en |
dc.source.pageinfo | 5-12 | de |
internal.identifier.classoz | 10501 | |
internal.identifier.journal | 787 | |
internal.identifier.document | 32 | |
internal.identifier.ddc | 320 | |
dc.source.issuetopic | Global Cybersecurity: New Directions in Theory and Methods | de |
dc.identifier.doi | https://doi.org/10.17645/pag.v6i2.1335 | de |
dc.description.pubstatus | Veröffentlichungsversion | de |
dc.description.pubstatus | Published Version | en |
internal.identifier.licence | 16 | |
internal.identifier.pubstatus | 1 | |
internal.identifier.review | 1 | |
internal.dda.reference | https://www.cogitatiopress.com/politicsandgovernance/oai/@@oai:ojs.cogitatiopress.com:article/1335 | |
ssoar.urn.registration | false | de |