Cybersecurity’s Can of Worms
ABSTRACT
Security frameworks are reassessed and recreated in response to political paradigm shifts or revolutions, as was the case at the abrupt end of the Cold War. The two decades since however, have seen the advent of a different type of revolution, namely that of information and communication technologies, leading to a world interconnected and globalised as never before. The daily reliance on cyberspace and its criminal usage by some raises questions of security for individuals, states and international systems alike. Given this level of dependence and interdependence it is surprising to note how little these aspects feature in current security frameworks. The aim of this paper is to address cybersecurity in relation to Hansen and Nissenbaum’s view of the Copenhagen School and as a result to propose an initial alternative model.
AUTHORS
Centre for Doctoral Training in Cyber Security University of Oxford
Oxford, United Kingdom
Jantje Silomon is a DPhil (PhD) student in cyber security at the University of Oxford. Her main research interest is cyber security, with a focus on malware weaponization. She has previously worked in both academia and the private sector.
Department of Informatics, King’s College London Strand
London UK
Richard E Overill obtained his BSc and PhD degrees from the University of Leicester, UK. He has held the positions of Special Lecturer in Computing Methods and Senior Analyst, Lecturer in Computer Science, and Senior Lecturer in Computer Science, all based at King’s College London, University of London. As well as holding the designations of Chartered IT Professional, Chartered Mathematician, Chartered Scientist and Chartered Engineer, he is a Fellow of the British Computer Society, the Institute of Mathematics and its Applications, and the UK Higher Education Academy. His research output includes over 85 refereed papers in international journals, international conference proceedings, and edited volumes, covering topics in computational quantum theory, high-performance computing, and, since 1995, many aspects of information security including fraud detection, information warfare, cybercrime and digital forensics. He is currently joint Principal Investigator of a two-year project funded by the US Office of Naval Research entitled ‘Strategy and the Network Society’, in collaboration with colleagues from the Department of War Studies at King’s College London.
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive