Cybersecurity’s Can of Worms

ABSTRACT

Security frameworks are reassessed and recreated in response to political paradigm shifts or revolutions, as was the case at the abrupt end of the Cold War. The two decades since however, have seen the advent of a different type of revolution, namely that of information and communication technologies, leading to a world interconnected and globalised as never before. The daily reliance on cyberspace and its criminal usage by some raises questions of security for individuals, states and international systems alike. Given this level of dependence and interdependence it is surprising to note how little these aspects feature in current security frameworks. The aim of this paper is to address cybersecurity in relation to Hansen and Nissenbaum’s view of the Copenhagen School and as a result to propose an initial alternative model.


AUTHORS

Centre for Doctoral Training in Cyber Security University of Oxford
Oxford, United Kingdom

Jantje Silomon is a DPhil (PhD) student in cyber security at the University of Oxford. Her main research interest is cyber security, with a focus on malware weaponization. She has previously worked in both academia and the private sector.

Department of Informatics, King’s College London Strand
London UK

Richard E Overill obtained his BSc and PhD degrees from the University of Leicester, UK. He has held the positions of Special Lecturer in Computing Methods and Senior Analyst, Lecturer in Computer Science, and Senior Lecturer in Computer Science, all based at King’s College London, University of London. As well as holding the designations of Chartered IT Professional, Chartered Mathematician, Chartered Scientist and Chartered Engineer, he is a Fellow of the British Computer Society, the Institute of Mathematics and its Applications, and the UK Higher Education Academy. His research output includes over 85 refereed papers in international journals, international conference proceedings, and edited volumes, covering topics in computational quantum theory, high-performance computing, and, since 1995, many aspects of information security including fraud detection, information warfare, cybercrime and digital forensics. He is currently joint Principal Investigator of a two-year project funded by the US Office of Naval Research entitled ‘Strategy and the Network Society’, in collaboration with colleagues from the Department of War Studies at King’s College London.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com