About: Critical Comments on Current Research Agenda in Cyber Security     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
rdfs:seeAlso
Description
  • The following article presents an alternative critical perspective of the cyber security research agenda. The article opens with criticism of the securitization discourse that uses analogies of historical events with events in cyber space. The author argues that such an approach is inappropriate, and that events of such impact are very unlikely to take place. The events that have already shaped our way of thinking - such as the Estonian attacks - caused significant damage to the respective country; nevertheless, the very same attack today would not do the same harm, thanks to the different level of critical infrastructure in Estonia. Another example, Stuxnet, is also an event of high impact, but with alow probability of happening in the future. Due to the complexity of the supporting operation of the attack, it would not lead to a cyber world war. The future will bring more complex, less visible, completely covered and precise operations that will take advantage of all cyber space features, rather than a cybergeddon comparable to some historical event or a nuclear scenario. The author proposes three directions of desired research agenda in the cyber security field. Firstly, the development of normative framework aimed at a better understanding of cyber events; secondly, a thorough research of cyber space leading to appropriate space conceptualization; and thirdly, the reevaluation of cyber warfare concept in the light of the cyber space novelty.
  • The following article presents an alternative critical perspective of the cyber security research agenda. The article opens with criticism of the securitization discourse that uses analogies of historical events with events in cyber space. The author argues that such an approach is inappropriate, and that events of such impact are very unlikely to take place. The events that have already shaped our way of thinking - such as the Estonian attacks - caused significant damage to the respective country; nevertheless, the very same attack today would not do the same harm, thanks to the different level of critical infrastructure in Estonia. Another example, Stuxnet, is also an event of high impact, but with alow probability of happening in the future. Due to the complexity of the supporting operation of the attack, it would not lead to a cyber world war. The future will bring more complex, less visible, completely covered and precise operations that will take advantage of all cyber space features, rather than a cybergeddon comparable to some historical event or a nuclear scenario. The author proposes three directions of desired research agenda in the cyber security field. Firstly, the development of normative framework aimed at a better understanding of cyber events; secondly, a thorough research of cyber space leading to appropriate space conceptualization; and thirdly, the reevaluation of cyber warfare concept in the light of the cyber space novelty. (en)
Title
  • Critical Comments on Current Research Agenda in Cyber Security
  • Critical Comments on Current Research Agenda in Cyber Security (en)
skos:prefLabel
  • Critical Comments on Current Research Agenda in Cyber Security
  • Critical Comments on Current Research Agenda in Cyber Security (en)
skos:notation
  • RIV/00216208:11230/14:10279714!RIV15-MSM-11230___
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • S
http://linked.open...iv/cisloPeriodika
  • 1
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 9202
http://linked.open...ai/riv/idVysledku
  • RIV/00216208:11230/14:10279714
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • threat analysis.; conceptualization of cyberspace; cyber war; critical analysis; securitization; Cyber security (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...odStatuVydavatele
  • CZ - Česká republika
http://linked.open...ontrolniKodProRIV
  • [8337AD2A04E9]
http://linked.open...i/riv/nazevZdroje
  • Obrana a strategie
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...UplatneniVysledku
http://linked.open...v/svazekPeriodika
  • 14
http://linked.open...iv/tvurceVysledku
  • Schmidt, Nikola
issn
  • 1214-6463
number of pages
http://bibframe.org/vocab/doi
  • 10.3849/1802-7199.14.2014.01.029-038
http://localhost/t...ganizacniJednotka
  • 11230
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 58 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software