This study uses a combinative method of quantitative and qualitative discourse analysis applying the discourse-historical approach (DHA), based on a self-built special corpus composed of the U.S. laws, policies and strategy documents that are directly related to critical information infrastructure protection (CIIP); through a Word List ranked by frequency, it is found that there seems to be a coherent securitizing system which has been formed in the U.S. CIIP legislative practices, with some specific considerations in the CIIP policy-making process including the strategy for risk management. By further investigating the internal institutional relationships and institutional mechanisms with corpus tools, four discursive features and strategies of the U.S. CIIP institutional discourse can be discovered: the leading role of private and specific institutions in public-private cooperation; the coexisting characteristics of generality and precision in the process of object definition; the center-divergent institutional settings in executing CIIP execution; and the coordinating discourse patterns for CIIP within the U.S. legislation. Those discursive practices concerning different institutional actors can be further explained in the broader context of the U.S. social reality. This study is not only helpful in better understanding the legal practices in U.S. cybersecurity, but also provides some meaningful insights on CIIP legislation to policy makers in other countries as well as at the international level.
This corpus-based study conducts detailed discourse analysis in the domain of enterprise cyber governance in the covid-19 era, with a self-built corpus containing textual discourse resources from nine typical digital technology companies and a reference corpus containing related official publications of the U.S. and the EU. Employing Fairclough’s three-dimensional model with steps of description, interpretation and explanation as the analytical framework, the authors investigate the discourse construction process for cyber governance in the business environment after the breakout of covid-19 epidemic. Based on theme and sample analysis, it is shown that the main concerns of the enterprise cyber governance discourse in the covid-19 era contain data breaches, information security, products and services, customers’ privacy and cyber espionage, and enterprises utilize a series of discursive strategies to (re)contextualize the linguistic realization. Combined with Halliday’s sociosemiotic theory, certain discursive practices are further explained in the social semiotic system as a whole, including the tenor, field and mode under the context of covid-19 epidemic. The contextual analysis proves that such strategies serve as the channels to legitimate the authority of the addressors (enterprises) over the cybersecurity of the main addressees (customers), which is further realized in certain context (situation), including two types of bidirectional relationships enterprises, customers and governments. The findings confirm that the linkage between a signifier and its signified can be realized by contextualization and (re)contextualization, and certain discourse can be materially realized by integrating the semiotic resources in the broader social context. This interdisciplinary study not only provides valuable insights for the domain of discourse and sociosemiotic studies, but also creates a new approach to the studies of cyber governance in the synchronic context.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.