837
Views
2
CrossRef citations to date
0
Altmetric
Articles

A sociosemiotic interpretation of cybersecurity in U.S. legislative discourse

, &

References

  • Anthony, L. 2018. AntConc (Version 3.5.7) [Computer Software]. Tokyo, Japan: Waseda University.
  • Bajčić, Martina. 2017. New Insights Into the Semantics of Legal Concepts and the Legal Dictionary. Amsterdam: John Benjamins.
  • Baker, Paul. 2006. Using Corpora in Discourse Analysis. London: Continuum.
  • Balzacq, Thierry. 2005. “The Three Faces of Securitization: Political Agency, Audience and Context.” European Journal of International Relations 11 (2): 171–201. doi: 10.1177/1354066105052960
  • Bhatia, Vijay K., and Christopher N. Candlin. 2008. “Interpretation Across Legal Systems and Cultures: A Critical Perspective.” In Legal Discourse Across Cultures and Systems, edited by Vijay K. Bhatia, Christopher N. Candlin, and Jan Engberg, 127–143. Hong Kong: Hong Kong University Press.
  • Biber, Douglas, Susan Conrad, and Randi Reppen. 1998. Corpus Linguistics: Investigating Language Structure and Use. New York: Cambridge University Press.
  • Brenner, Susan W. 2004. “U.S. Cybercrime Law: Defining Offenses.” Information Systems Frontiers 6 (2): 115–132. doi: 10.1023/B:ISFI.0000025780.94350.79
  • Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder: Lynne Rienner Publishers.
  • Caballero-Anthony, Mely. 2016. “Understanding Non-traditional Security.” In An Introduction to Non-traditional Security Studies: A Translational Approach, edited by Mely Caballero-Anthony, 3–19. London: Sage.
  • Carr, Madeline. 2016. “Public-Private Partnerships in National Cyber-security Strategies.” International Affairs 92 (1): 43–62. doi: 10.1111/1468-2346.12504
  • Cheng, Le, and Winnie Cheng. 2012. “Legal Interpretation: Meaning as Social Construction.” Semiotica 191: 427–448.
  • Cheng, Le, Winnie Cheng, and King-Kui Sin. 2014. “Revisiting Legal Terms: A Semiotic Perspective.” Semiotica 202: 167–182.
  • Cheng, Winnie, Chris Greaves, and Martin Warren. 2006. “From N-gram to Skipgram to Concgram.” International Journal of Corpus Linguistics 11 (4): 411–433. doi: 10.1075/ijcl.11.4.04che
  • Cheng, Le, Shifeng Ni, King Kui Sin, and Winnie Cheng. 2012. “A Sociosemiotic Approach to Fundamental Rights in China.” Semiotica 190: 41–55.
  • Cheng, Le, and Jiamin Pei. 2018. “Interpreting Cybersecurity Law: A Semiotic Perspective.” Journal of Zhejiang University (Humanities and Social Sciences) 48 (6): 121–139.
  • Cheng, Le, and King Kui Sin. 2009. “Legal Terms Across Communities: Divergence Behind Convergence in Law.” In Diversity and Tolerance in Socio-Legal Context: Explorations in the Semiotics of Law, edited by Anne Wagner and Vijay K. Bhatia, 181–190. Farnham: Ashgate.
  • Cheng, Le, and Xin Wang. 2018. “Cyber Asset in Judicial Discourses: A Socio-semiotic Interpretation.” Social Semiotics. Advance online publication. doi:10.1080/10350330.2018.1487110.
  • Cobley, Paul. 2001. “Introduction.” In The Routledge Companion to Semiotics and Linguistics, edited by Paul Cobley, 3–13. New York: Routledge.
  • Danesi, Marcel. 2009. “Explaining Change in Language: A Cybersemiotic Perspective.” Entropy 11: 1055–1072. doi: 10.3390/e11041055
  • Danesi, Marcel. 2010. “The History of Philosophy as Semiotic Process: A Note on John Deely’s Monumental Four Ages of Understanding.” Semiotica 178: 23–37.
  • Eichensehr, Kristen E. 2017. “Public-private Cybersecurity.” Texas Law Review 95 (3): 467–538.
  • Eroukhmanoff, Clara. 2017. “Securitisation Theory.” In International Relations Theory, edited by Stephen Mcglinchey, Rosie Walters, and Christian Scheinpflug, 104–110. Bristol: E-International Relations.
  • Goźdź-Roszkowski, Stanisław. 2011. Patterns of Linguistic Variation in American Legal English: A Corpus-Based Study. Frankfurt am Main: Peter Lang.
  • Greaves, Chris. 2009. ConcGram 1.0. A Phraseological Search Engine. Amsterdam: John Benjamins.
  • Hansen, Lene, and Helen Nissenbaum. 2009. “Digital Disaster, Cyber Security, and the Copenhagen School.” International Studies Quarterly 53: 1155–1175. doi: 10.1111/j.1468-2478.2009.00572.x
  • Jang-Jaccard, Julian, and Surya Nepal. 2014. “A Survey of Emerging Threats in Cybersecurity.” Journal of Computer and System Sciences 80 (5): 973–993. doi: 10.1016/j.jcss.2014.02.005
  • Kittichaisaree, Kriangsak. 2017. Public International Law of Cyberspace. Cham: Springer.
  • Kosseff, Jeff. 2016. “Positive Cybersecurity Law: Creating a Consistent and Incentive-based System.” Chapman Law Review 19 (2): 401–419.
  • Kosseff, Jeff. 2017. Cybersecurity Law. Hoboken, NJ: John Wiley & Sons.
  • Li, Jian, Le Cheng, and Winnie Cheng. 2016. “Deontic Meaning Making in Legislative Discourse.” Semiotica 209: 323–340.
  • McCarthy, Daniel R. 2018. “Privatizing Political Authority: Cybersecurity, Public-Private Partnerships, and the Reproduction of Liberal Political Order.” Politics and Governance 6 (2): 5–12. doi: 10.17645/pag.v6i2.1335
  • Mindt, Dieter. 1991. “Syntactic Evidence for Semantic Distinctions in English.” In English Corpus Linguistics: Studies in Honour of Jan Svartik, edited by Karin Aijmer and Bengt Altenberg, 182–196. London: Longman.
  • Sinclair, John. 2008a. “The Phrase, the Whole Phrase, and Nothing but the Phrase.” In Phraseology: An Interdisciplinary Perspective, edited by Sylviane Granger and Fanny Meuier, 407–410. Amsterdam: John Benjamins.
  • Sinclair, John. 2008b. “Preface.” In Phraseology: An Interdisciplinary Perspective, edited by Sylviane Granger and Fanny Meuier, xv–xviii. Amsterdam: John Benjamins.
  • Singer, P. W., and Allan Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press.
  • Solan, Lawrence M., and Tammy Gales. 2016. “Finding Ordinary Meaning in Law: The Judge, the Dictionary or the Corpus?” International Journal of Legal Discourse 1 (2): 253–276. doi: 10.1515/ijld-2016-0016
  • Solan, Lawrence M., and Peter M Tiersma. 2005. Speaking of Crime: The Language of Criminal Justice. Chicago: The University of Chicago Press.
  • Stevens, Tim. 2016. Cyber Security and the Politics of Time. Cambridge: Cambridge University Press.
  • Stevens, Tim. 2018. “Global Cybersecurity: New Directions in Theory and Methods.” Politics and Governance 6 (2): 1–4. doi: 10.17645/pag.v6i2.1569
  • Sun, Yuxiu, and Le Cheng. 2017. “Linguistic Variation and Legal Representation in Legislative Discourse: A Corpus-based Multi-dimensional Study.” International Journal of Legal Discourse 2 (2): 397–421. doi: 10.1515/ijld-2017-0017
  • Teubert, Wolfgang. 2005. “My Vision of Corpus Linguistics.” International Journal of Corpus Linguistics 10 (1): 1–13. doi: 10.1075/ijcl.10.1.01teu
  • Tropina, Tatiana, and Cormac Callanan. 2015. Self- and Co-regulation in Cybercrime, Cybersecurity and National Security. Cham: Springer.
  • Tumkevič, Agnija. 2017. “Cybersecurity in Central Eastern Europe: From Identifying Risks to Countering Threats.” Baltic Journal of Political Science 5: 73–88. doi: 10.15388/BJPS.2016.5.10337
  • Valeriano, Brandon, and Ryan C. Maness. 2018. “International Relations Theory and Cyber Security: Threat, Conflict and Ethnics in an Emergent Domain.” In The Oxford Handbook of International Political Theory, edited by Chris Brown, and Robyn Eckersley, 259–272. New York: Oxford University Press.
  • Van Leeuwen, Theo. 2005. Introducing Social Semiotics. New York: Routledge.
  • Veksler, Vladislav D., Norbou Buchler, Blaine E. Hoffman, Daniel N. Cassenti, Char Sample, and Shridat Sugrim. 2018. “Simulations in Cyber-security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.” Frontiers in Psychology 9: 1–12. doi: 10.3389/fpsyg.2018.00691
  • Watson, Scott. 2011. “The ‘Human’ as Referent Object? Humanitarianism as Securitization.” Security Dialogue 42 (1): 3–20. doi: 10.1177/0967010610393549
  • Yuan, Chuanyou. 2018. “A Battlefield or a Lecture Hall? A Contrastive Multimodal Discourse Analysis of Courtroom Trials.” Social Semiotics. Advance online publication. doi:10.1080/10350330.2018.1504653.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.