2013
DOI: 10.1177/0967010613478323
|View full text |Cite
|
Sign up to set email alerts
|

Analogical reasoning and cyber security

Abstract: This article is an attempt to interrogate some of the predominant forms of analogical reasoning within current cyber-security discourse, with a view to clarifying their unstated premises, major strengths and, vitally, points of conceptual failure. It seeks to improve dialogue between and across the various epistemic communities involved with cyber-security policy. As we seek to adapt to the new security realities of the information age, it is incumbent upon scholars and strategists to address the benefits of c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 62 publications
(39 citation statements)
references
References 64 publications
0
39
0
Order By: Relevance
“…It is little wonder that we attempt to classify […] the unfamiliar present and unknowable future in terms of a more familiar past, but we should remain mindful of the limitations of analogical reasoning in cyber security (Betz and Stevens 2013). …”
Section: Resultsmentioning
confidence: 99%
“…It is little wonder that we attempt to classify […] the unfamiliar present and unknowable future in terms of a more familiar past, but we should remain mindful of the limitations of analogical reasoning in cyber security (Betz and Stevens 2013). …”
Section: Resultsmentioning
confidence: 99%
“…This study employs a combination of rhetorical analysis of key texts that have deployed the cyber Pearl Harbor analogy over the past 25 years with a quantitative content analysis of U.S. newspaper articles in which the analogy appears during the same time period. In each case, analysis was informed by theoretical insights from the critical constructivist tradition of scholarship in security studies (Peoples & Vaughan-Williams 2010), including other scholarship that has explored the role of language and rhetoric in U.S. cyber security discourse (Bendrath 2001(Bendrath , 2003(Bendrath , 2007Dunn Cavelty 2008;Eriksson 2002;Hansen & Nissenbaum 2009;Lawson 2012;Betz & Stevens 2013).…”
Section: Sources and Methodsmentioning
confidence: 99%
“…The inventor of the term 'cyberspace' -science fiction author William Gibson -stated early on that cyberspace was an 'evocative and essentially meaningless' buzzword (Betz and Stevens 2013). Although this still holds true, it is hard to avoid the term altogether.…”
Section: Instrumentalising Cybersecurity To Preserve Government Contrmentioning
confidence: 98%