2017
DOI: 10.1057/s41311-017-0088-y
|View full text |Cite
|
Sign up to set email alerts
|

Cyberweapons: power and the governance of the invisible

Abstract: This article explores the non-emergence of a global governance regime for cyberweapons.Cyberweapons are malicious software entities deployed to cause harm to adversaries' computer networks and systems. They threaten the integrity and functionality of digital systems that enable global circuits of communication and exchange, with significant potential impacts on social, economic and political order. Using a power-analytical approach, this article identifies four areas in which power works to constrain regime fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 69 publications
0
6
0
3
Order By: Relevance
“…in deren Sinne handeln. Die bis hierhin noch nicht erwähnte Debatte um mögliche Cyberwaffenkontrollregime verdeutlicht ebenfalls die Bedeutung situativer Aspekte für eine Analyse von Macht im Cyberspace (Liff 2012;Hansel et al 2018;Stevens 2018): Ob und wann verschiedene Akteure oder auch technische Werkzeuge zu offensiven oder defensiven Machtressourcen werden, hängt in erster Linie vom jeweiligen Kontext, bzw. der Motivation des Akteurs ab.…”
Section: Agenda-setting Durch Proxies Auf Internationaler Ebene Als Machtfunktionunclassified
“…in deren Sinne handeln. Die bis hierhin noch nicht erwähnte Debatte um mögliche Cyberwaffenkontrollregime verdeutlicht ebenfalls die Bedeutung situativer Aspekte für eine Analyse von Macht im Cyberspace (Liff 2012;Hansel et al 2018;Stevens 2018): Ob und wann verschiedene Akteure oder auch technische Werkzeuge zu offensiven oder defensiven Machtressourcen werden, hängt in erster Linie vom jeweiligen Kontext, bzw. der Motivation des Akteurs ab.…”
Section: Agenda-setting Durch Proxies Auf Internationaler Ebene Als Machtfunktionunclassified
“…Last, military analogies like cyberweapons, cyberoffence, cyberdefence are just different words for well-known computer tools and information assurance concepts. For example, a cyberweapon is simply software, and software has particular characteristics, many of which are diametrically opposed to the image of a weapon that can be directed at a target of choice with foreseeable effects (Stevens, 2018). Cyberdefence in turn may suggest military personnel doing martial things, but military networks are protected by the same basic concepts as any other type of network; and we are back to the everyday, normal, unexceptional practices of IT security professionals.…”
Section: Securitization Theory and Cybersecuritymentioning
confidence: 99%
“…As such, cyber studies possess an incredible broad substantive remit. At the highest level, we might consider this remit to include the dynamics of technology adoption across global society (Choucri, 2012), the role of governments in problematizing and meeting cyber challenges (see among others, Knake, 2010;Nye, 2014;Stevens, 2017), the resultant management of international security and the fundamental institutional, technological and societal prerequisites of security.…”
Section: The Shape and Focus Of Digital Studies Researchmentioning
confidence: 99%