本体论可见性与网络冲突:建立威胁的视觉问题

IF 1.4 3区 社会学 Q2 INTERNATIONAL RELATIONS Alternatives Pub Date : 2021-05-01 DOI:10.1177/03043754211024583
Jonathon Whooley
{"title":"本体论可见性与网络冲突:建立威胁的视觉问题","authors":"Jonathon Whooley","doi":"10.1177/03043754211024583","DOIUrl":null,"url":null,"abstract":"This paper builds on the work of scholars working on ontological security, cyber security, and computer science to understand the problem of threat assessment and vision before, during, and after cyber-attacks. The previous use of ontological security theory (OST) has been limited because it has relied upon an overly simplistic vision of threat assessment at the international, state, and individual level. While previous scholars have examined the background, latent, or assumed visions of security threats as interpreted by agents and how their conditions do or do not effectively capture the anxieties of populations and practitioners this piece seeks to put these issues in conversation. In conceiving of ‘the state’ and ‘threat’ this piece examines the notion of vision, because as states conceive of threats in terms of terrorism (overt and theatrical) and cyber (covert and private) a mismatch of responses is noted. This piece reads the current cyber security landscape (2009-2019) in the United States through a lens of repeated and rambunctious cyber-threats and attacks and a largely passive response by the US citizenry through OST alongside: (1) the literature on computer science dealing with the concept of ontology, (2) the traditional threat framework found in the terrorism literature around response to threat with a comparison to the cyber-conflict literature, an (3) examination of the interplay between the public and government around the visibility and salience of cyberthreats.","PeriodicalId":46677,"journal":{"name":"Alternatives","volume":null,"pages":null},"PeriodicalIF":1.4000,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1177/03043754211024583","citationCount":"1","resultStr":"{\"title\":\"Ontological (In)visibility and Cyber Conflict: The Problem of Sight and Vision in Establishing Threat\",\"authors\":\"Jonathon Whooley\",\"doi\":\"10.1177/03043754211024583\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper builds on the work of scholars working on ontological security, cyber security, and computer science to understand the problem of threat assessment and vision before, during, and after cyber-attacks. The previous use of ontological security theory (OST) has been limited because it has relied upon an overly simplistic vision of threat assessment at the international, state, and individual level. While previous scholars have examined the background, latent, or assumed visions of security threats as interpreted by agents and how their conditions do or do not effectively capture the anxieties of populations and practitioners this piece seeks to put these issues in conversation. In conceiving of ‘the state’ and ‘threat’ this piece examines the notion of vision, because as states conceive of threats in terms of terrorism (overt and theatrical) and cyber (covert and private) a mismatch of responses is noted. This piece reads the current cyber security landscape (2009-2019) in the United States through a lens of repeated and rambunctious cyber-threats and attacks and a largely passive response by the US citizenry through OST alongside: (1) the literature on computer science dealing with the concept of ontology, (2) the traditional threat framework found in the terrorism literature around response to threat with a comparison to the cyber-conflict literature, an (3) examination of the interplay between the public and government around the visibility and salience of cyberthreats.\",\"PeriodicalId\":46677,\"journal\":{\"name\":\"Alternatives\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.4000,\"publicationDate\":\"2021-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1177/03043754211024583\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Alternatives\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.1177/03043754211024583\",\"RegionNum\":3,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"INTERNATIONAL RELATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Alternatives","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1177/03043754211024583","RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 1

摘要

本文建立在本体论安全、网络安全和计算机科学学者的工作基础上,以理解网络攻击之前、期间和之后的威胁评估和视觉问题。以往对本体论安全理论(OST)的使用受到了限制,因为它依赖于对国际、国家和个人层面的威胁评估的过于简单化的看法。虽然以前的学者已经研究了由代理人解释的安全威胁的背景、潜在或假设的愿景,以及他们的条件如何有效地捕捉到人口和从业者的焦虑,但这篇文章试图将这些问题置于对话中。在构思“国家”和“威胁”时,这篇文章考察了视觉的概念,因为当国家从恐怖主义(公开的和戏剧性的)和网络(隐蔽的和私人的)的角度来构思威胁时,会注意到反应的不匹配。这篇文章通过反复和猖獗的网络威胁和攻击以及美国公民通过OST的主要被动反应,解读了美国当前的网络安全形势(2009-2019)。(1)处理本体论概念的计算机科学文献;(2)围绕应对威胁的恐怖主义文献中发现的传统威胁框架,并与网络冲突文献进行比较;(3)围绕网络威胁的可见性和显著性对公众和政府之间相互作用的检查。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Ontological (In)visibility and Cyber Conflict: The Problem of Sight and Vision in Establishing Threat
This paper builds on the work of scholars working on ontological security, cyber security, and computer science to understand the problem of threat assessment and vision before, during, and after cyber-attacks. The previous use of ontological security theory (OST) has been limited because it has relied upon an overly simplistic vision of threat assessment at the international, state, and individual level. While previous scholars have examined the background, latent, or assumed visions of security threats as interpreted by agents and how their conditions do or do not effectively capture the anxieties of populations and practitioners this piece seeks to put these issues in conversation. In conceiving of ‘the state’ and ‘threat’ this piece examines the notion of vision, because as states conceive of threats in terms of terrorism (overt and theatrical) and cyber (covert and private) a mismatch of responses is noted. This piece reads the current cyber security landscape (2009-2019) in the United States through a lens of repeated and rambunctious cyber-threats and attacks and a largely passive response by the US citizenry through OST alongside: (1) the literature on computer science dealing with the concept of ontology, (2) the traditional threat framework found in the terrorism literature around response to threat with a comparison to the cyber-conflict literature, an (3) examination of the interplay between the public and government around the visibility and salience of cyberthreats.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Alternatives
Alternatives INTERNATIONAL RELATIONS-
CiteScore
2.30
自引率
15.40%
发文量
19
期刊介绍: A peer-reviewed journal, Alternatives explores the possibilities of new forms of political practice and identity under increasingly global conditions. Specifically, the editors focus on the changing relationships between local political practices and identities and emerging forms of global economy, culture, and polity. Published in association with the Center for the Study of Developing Societies (India).
期刊最新文献
What Do We Know About People’s Politics? Testing a New Framework for Understanding Different Conceptions of Politics Running in Place: “Czeching” out the W/E(a)stern Performative Presidential Geoprostitution Discoursive Region Building in Latvia: The Case for a Contemporary Identity Search Civil-military Relations in Mexico: From One-Party Dominance to Post-Transitional Insecurity Sovereignty, Discipline, Governmentality, and Pastorate: The Ménage à Quatre of Contemporary Authoritarian and Right-Wing Populist Power
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1