2013
DOI: 10.1080/19331681.2012.759059
|View full text |Cite
|
Sign up to set email alerts
|

Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0
3

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(37 citation statements)
references
References 17 publications
0
34
0
3
Order By: Relevance
“…This would require developing sophisticated cyber weapons, communicating these capabilities to potential adversaries in the cyber realm, and being willing to follow through with action that may harm civilians, lead to escalatory retaliation, and provide enemies with digital technologies they did not have before the attack. Yet this type of thinking is an enduring one as more high-profile data breaches, usually espionage campaigns or disruptive information operations and rarely physical degradations continue to proliferate and be misconstrued in popular narratives (Lawson, 2013). According to the data, offensive posturing and digital arms races that the US may set into motion as policy could be self-defeating policies (Craig & Valeriano, 2016).…”
Section: Expanding Cyber Security Datamentioning
confidence: 99%
“…This would require developing sophisticated cyber weapons, communicating these capabilities to potential adversaries in the cyber realm, and being willing to follow through with action that may harm civilians, lead to escalatory retaliation, and provide enemies with digital technologies they did not have before the attack. Yet this type of thinking is an enduring one as more high-profile data breaches, usually espionage campaigns or disruptive information operations and rarely physical degradations continue to proliferate and be misconstrued in popular narratives (Lawson, 2013). According to the data, offensive posturing and digital arms races that the US may set into motion as policy could be self-defeating policies (Craig & Valeriano, 2016).…”
Section: Expanding Cyber Security Datamentioning
confidence: 99%
“…Eschatological discourses of cyber war are perhaps symptomatic of this apocalyptic aesthetic but they also derive from a long-standing antipathy or ambivalence to the sociopolitical effects of technology. As scholars of the social construction of cyber security threats have observed, concerns about information technology are older than we sometimes recognise (Cavelty, 2008;Lawson, 2012Lawson, , 2013, even if they have taken on an urgency hitherto unprecedented in its global intensity. Disquiet about the 'information revolution' and its supposed benefits has, even before the last two decades of massive Internet growth, raised critical questions about the political basis of such claims (Webster and Robins, 1986) and identified the constraining logics instantiated by the ideology of the information revolution itself (Slack, 1984).…”
Section: Cyber War and Apocalyptic (Post)modernitymentioning
confidence: 99%
“…Discourses of cyber security-of which 'cyber war' is a distinct subset-are heavily reliant on the articulation of catastrophic 'cyber doom' scenarios to mobilise political resources (Cavelty, 2008;Lawson, 2013). Strategic cyber war is also framed in ways prioritising the catastrophic nature of these scenarios, although their nature and character remain poorly understood.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the question is whether states are putting the right agencies and organisations forward to combat the right threats (Dunn Cavelty 2014). Many researchers warn about the danger of 'threat inflation' and the unhelpful language of national security and warfare (Brito and Watkins 2011;Betz and Stevens 2011;Libicki 2012;Rid 2013;Lawson 2013). This does not mean that all of the Internet has been securitised or militarised, but policymakers are increasingly looking at cyberspace through different eyes.…”
Section: Internet Security Versus National Securitymentioning
confidence: 99%