309
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

The bioinformational dilemma: where bioinformational diplomacy meets cyberbiosecurity

References

  • Adalja, Amesh A., Matthew Watson, Eric S. Toner, Anita Cicero, and Thomas V. Inglesby. 2019. “Characteristics of Microbes Most Likely to Cause Pandemics and Global Catastrophes.” In Global Catastrophic Biological Risks, edited by T. Inglesby and A. Adalja, 1–20. Cham: Springer.
  • Azhar, Hussain, Syed Ali, Madiha Ahmed, and Hussain Sheharyar. 2018. “The Anti-Vaccination Movement: A Regression in Modern Medicine.” Cureus 10 (7): e2919. doi:10.7759/cureus.2919.
  • Badalič, Vasja. 2021. “The War Against Vague Threats: The Redefinitions of Imminent Threat and Anticipatory Use of Force.” Security Dialogue 52 (2): 174–191. doi:10.1177/0967010620921006.
  • Balzacq, Thierry. 2005. “The Three Faces of Securitization: Political Agency, Audience and Context.” European Journal of International Relations 11 (2): 171–201. doi:10.1177/1354066105052960.
  • Bassalo, Marcelo C., Rongming Liu, and Ryan T. Gill. 2016. “Directed Evolution and Synthetic Biology Applications to Microbial Systems.” Current Opinion in Biotechnology 39: 126–133. doi:10.1016/j.copbio.2016.03.016.
  • Bates, Jo, Yu-Wei Lin, and Paula Goodale. 2016. “Data Journeys: Capturing the Socio-Material Constitution of Data Objects and Flows.” Big Data & Society 3 (2): 2053951716654502. doi:10.1177/2053951716654502.
  • Bengtsson, Louise, Stefan Borg, and Mark Rhinard. 2019. “Assembling European Health Security: Epidemic Intelligence and the Hunt for Cross-Border Health Threats.” Security Dialogue 50 (2): 115–130. doi:10.1177/0967010618813063.
  • Berger, Kavita M., and Phyllis A. Schneck. 2019. “National and Transnational Security Implications of Asymmetric Access to and Use of Biological Data.” Frontiers in Bioengineering and Biotechnology 7: 21. doi:10.3389/fbioe.2019.00021.
  • Brouillette, Dan R., and Daniel H. Yergin. 2020. A Conversation With Dan R. Brouillette. Council on Foreign Relations. 9 October 2020. [Accessed on 6 February 2022]. https://www.cfr.org/event/conversation-dan-r-brouillette.
  • Brown, Michael E., Owen R. Cote, Sean M. Lynn-Jones, and Steven E. Miller. 2004. Offense, Defense and War. Cambridge: MIT Press.
  • Buchanan, Ben. 2016. “The Life Cycles of Cyber Threats.” Survival 58 (1): 39–58. doi:10.1080/00396338.2016.1142093.
  • Cave, Danielle. 2020. “Data Driven: How COVID-19 and Cyberspace are Changing Spycraft.” Australian Foreign Affairs 9: 29–52.
  • CBD (Convention on Biological Diversity). 2021. Report of the Subsidiary Body on Scientific, Technical and Technological Advice on its Twenty-Fourth Meeting (Part I), (Publication CBD/SBSTTA/24/11, Convention on Biological Diversity.
  • Cerny, Philip G. 2000. “The New Security Dilemma: Divisibility, Defection and Disorder in the Global Era.” Review of International Studies 26 (4): 623–646. doi:10.1017/S0260210500006239.
  • Church, George M., and Ed Regis. 2014. Regenisis: How Synthetic Biology Will Reinvent Nature and Ourselves. New York: Basic Books.
  • Cobb, Ryan E., Ning Sun, and Huimin Zhao. 2013. “Directed Evolution as a Powerful Synthetic Biology Tool.” Methods 60 (1): 81–90. doi:10.1016/j.ymeth.2012.03.009.
  • Corn, Colonel Gary P. 2019. “Cyber National Security: Navigating Gray-Zone Challenges in and Through Cyberspace.” In Complex Battlespaces, edited by Christopher M. Ford, and Winston S. Williams, 345–430. Oxford: Oxford University Press.
  • Csurgai, Gyula. 2018. “The Increasing Importance of Geoeconomics in Power Rivalries in the Twenty-First Century.” Geopolitics 23 (1): 38–46. doi:10.1080/14650045.2017.1359547.
  • Davies, Sara E. 2008. “Securitizing Infectious Disease.” International Affairs 84 (2): 295–313. doi:10.1111/j.1468-2346.2008.00704.x.
  • Davies, Sara E., Adam Kamradt-Scott, and Simon Rushton. 2015. Disease Diplomacy: International Norms and Global Health Security. Balitmore, MD: JHU Press.
  • Davies, Sara E., and Clare Wenham. 2020. “Why the COVID-19 Response Needs International Relations.” International Affairs 96 (5): 1227–1251. doi:10.1093/ia/iiaa135.
  • De Maio, Nicola, Conor Walker, Rui Borges, Lukas Weilguny, Greg Slodkowicz, and Nick Goldman. 2020. “Issues with SARS-CoV-2 Sequencing Data.”
  • Dixon, Thom. 2019. “Mapping the Potential Impact of Synthetic Biology on Australian Foreign Policy.” Australian Journal of International Affairs 73 (3): 270–288. doi:10.1080/10357718.2019.1584154.
  • Dixon, Thom. 2021. “The Grey Zone of Cyber-Biological Security.” International Affairs 97 (3): 685–702. doi:10.1093/ia/iiab041.
  • Dixon, Thomas A., Thomas C. Williams, and Isak S. Pretorius. 2021. “Sensing the Future of Bio-Informational Engineering.” Nature Communications 12 (1): 1–12. doi:10.1038/s41467-020-20314-w.
  • Dron, Louis, Vinusha Kalatharan, Alind Gupta, Jonas Haggstrom, Nevine Zariffa, Andrew D. Morris, Paul Arora, and Jay Park. 2022. “Data Capture and Sharing in the COVID-19 Pandemic: A Cause for Concern.” The Lancet Digital Health 4 (10): e748–e756. doi:10.1016/S2589-7500(22)00147-9.
  • Duncan, S. E., R. Reinhard, R. C. Williams, F. Ramsey, W. Thomason, K. Lee, N. Dudek, S. Mostaghimi, E. Colbert, and R. Murch. 2019. “Cyberbiosecurity: A New Perspective on Protecting US Food and Agricultural System.” Frontiers in Bioengineering and Biotechnology 7: 63. doi:10.3389/fbioe.2019.00063.
  • Elbe, Stefan. 2021. “Bioinformational Diplomacy: Global Health Emergencies, Data Sharing and Sequential Life.” European Journal of International Relations 27 (3): 657–681. doi:10.1177/13540661211008204.
  • Elbe, Stefan, Anne Roemer-Mahler, and Christopher Long. 2014. “Securing Circulation Pharmaceutically: Antiviral Stockpiling and Pandemic Preparedness in the European Union.” Security Dialogue 45 (5): 440–457. doi:10.1177/0967010614530072.
  • Floyd, Rita. 2011. “Can Securitization Theory be Used in Normative Analysis? Towards a Just Securitization Theory.” Security Dialogue 42 (4-5): 427–439. doi:10.1177/0967010611418712.
  • Glaser, Charles L. 1997. “The Security Dilemma Revisited.” World Politics 50 (1): 171–201. doi:10.1017/S0043887100014763.
  • Goldblat, Jozef. 1997. “The Biological Weapons Convention: An Overview.” International Review of the Red Cross (1961-1997) 37 (318): 251–265. doi:10.1017/S0020860400084679.
  • Graham, Mark, Bernie Hogan, Ralph K. Straumann, and Ahmed Medhat. 2014. “Uneven Geographies of User-Generated Information: Patterns of Increasing Informational Poverty.” Annals of the Association of American Geographers 104 (4): 746–764. doi:10.1080/00045608.2014.910087.
  • Gronvall, Gigi Kwik. 2016. Synthetic Biology: Safety, Security and Promise. Baltimore: Health Security Press.
  • Gryphon Scientific and Rhodium Group. 2019. China’s Biotechnology Development: The Role of US and Other Foreign Engagement. Washington: US-China Economic and Security Review Commission.
  • Guttieres, Donovan, Shannon Stewart, Jacqueline Wolfrum, and Stacy L. Springs. 2019. “Cyberbiosecurity in Advanced Manufacturing Models.” Frontiers in Bioengineering and Biotechnology 210: 1–8. doi:10.3389/fbioe.2019.00210.
  • Inglesby, Thomas V., and Amesh A. Adalja, eds. 2019. Global Catastrophic Biological Risks. Cham: Springer.
  • Jacobson, Barbara Rosen, Katharina E. Höne, and Jovan Kurbalija. 2018. Data Diplomacy: Updating Diplomacy to the Big Data Era. Geneva: Diplo Foundation.
  • Jervis, Robert. 1978. “Cooperation Under the Security Dilemma.” World Politics 30 (2): 167–214. doi:10.2307/2009958.
  • Jervis, Robert. 2017. Perception and Misperception in International Politics. Princeton, NJ: Princeton University Press.
  • Kaltofen, Carolin, and Michele Acuto. 2018. “Science Diplomacy: Introduction to a Boundary Problem.” Global Policy 9: 8–14. doi:10.1111/1758-5899.12621.
  • Kassam, Natasha, and Darren Lim. 2021. “Future Shock: How to Prepare for a China-Led World.” Australian Foreign Affairs 11: 31–53.
  • Katz, Rebecca, and Erin Sorrell. 2014. “Preparedness and Resilience in Public Health Emergencies.” In Routledge Handbook of Global Health Security, edited by Simon Rushton and Jeremy Youde, 201–214. Abingdon: Routledge.
  • Kemp, Luke, Laura Adam, Christian R. Boehm, Rainer Breitling, Rocco Casagrande, Malcolm Dando, Appolinaire Djikeng, et al. 2020. “Point of View: Bioengineering Horizon Scan 2020.” Elife 9: e54489. doi:10.7554/eLife.54489.
  • Lallie, Harjinder Singh, Lynsay A. Shepherd, Jason RC Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, and Xavier Bellekens. 2021. “Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks During the Pandemic.” Computers & Security 105: 102248. doi:10.1016/j.cose.2021.102248.
  • Larsson, D. G., and Carl-Fredrik Flach. 2021. “Antibiotic Resistance in the Environment.” Nature Reviews Microbiology 20: 257–269. doi:10.1038/s41579-021-00649-x.
  • Lee, Jenny J., and John P. Haupt. 2020. “Winners and Losers in US-China Scientific Research Collaborations.” Higher Education 80 (1): 57–74. doi:10.1007/s10734-019-00464-7.
  • Lim, Darren J., and Victor Ferguson. 2020. “Conscious Decoupling: The Technology Security Dilemma.” In China Dreams (China Story Yearbook 2019), edited by Jane Golley, Ben Hillman, Linda Jaivin, and Sharon Strange. ANU Press. doi:10.22459/CSY.
  • Lipson, Charles. 1984. “International Cooperation in Economic and Security Affairs.” World Politics 37 (1): 1–23. doi:10.2307/2010304.
  • Ma'ayan, Avi. 2017. “Complex Systems Biology.” Journal of the Royal Society Interface 14 (134): 20170391. doi:10.1098/rsif.2017.0391.
  • McEntire, David A. 2007. “International Relations and Disasters: Illustrating the Relevance of the Discipline to the Study and Profession of Emergency Management.” In Disciplines, Disasters and Emergency Management: The Convergence and Divergence of Concepts, Issues and Trends from the Research Literature, edited by David A McEntire, 170–177. Springfield: Charles C. Thomas Publisher.
  • Moisio, Sami. 2019. “Re-Thinking Geoeconomics: Towards a Political Geography of Economic Geographies.” Geography Compass 13 (10): e12466. doi:10.1111/gec3.12466.
  • Moorthy, Vasee, Henao Restrepo, Ana Maria, Preziosi Marie-Pierre, and Swaminathan Soumya. 2020. “Data Sharing for Novel Coronavirus (COVID-19).” Bulletin of the World Health Organization 98 (3): 150. doi:10.2471/BLT.20.251561.
  • Mowlana, Hamid. 1997. Global Information and World Communication: New Frontiers in International Relations. London: Sage.
  • Murch, Randall S., William K. So, Wallace G. Buchholz, Sanjay Raman, and Jean Peccoud. 2018. “Cyberbiosecurity: An Emerging new Discipline to Help Safeguard the Bioeconomy.” Frontiers in Bioengineering and Biotechnology 39: 1–6. doi:10.3389/fbioe.2018.00039.
  • NASEM. 2018b. Governance of Dual use Research in the Life Sciences. Washington DC: National Academies Press.
  • NASEM. 2020. Safeguarding the Bioeconomy. Washington DC: National Academies Press.
  • NASEM (National Academies of Science, Engineering and Medicine). 2018a. Biodefense in the Age of Synthetic Biology. Washington DC: National Academies Press.
  • Needham, Kirsty. 2021. “Exclusive: China Gene Firm Providing Worldwide COVID Tests Worked with Chinese Military.” Reuters, January 30. https://www.reuters.com/article/us-china-genomics-military-exclusive-idUSKBN29Z0HA.
  • Norris, Pippa. 2000. “Information Poverty and the Wired World.” Harvard International Journal of Press/Politics 5 (3): 1–6. doi:10.1177/1081180X00005003001.
  • Nunes, João. 2014. “The Politics of Health Security.” In Routledge Handbook of Global Health Security, edited by S. Rushton, and J. Youde, 60–70. Oxon: Routledge.
  • Parry, Bronwyn, and Beth Greenhough. 2017. Bioinformation. Cambridge: John Wiley & Sons.
  • Peccoud, Jean, Jenna E. Gallegos, Randall Murch, Wallace G. Buchholz, and Sanjay Raman. 2018. “Cyberbiosecurity: From Naive Trust to Risk Awareness.” Trends in Biotechnology 36 (1): 4–7. doi:10.1016/j.tibtech.2017.10.012.
  • Richardson, Lauren C., Nancy D. Connell, Stephen M. Lewis, Eleonore Pauwels, and Randy S. Murch. 2019. “Cyberbiosecurity: A Call for Cooperation in a New Threat Landscape.” Frontiers in Bioengineering and Biotechnology 7: 99. doi:10.3389/fbioe.2019.00099.
  • Rodriguez-Morales, Alfonso J., D. Katterine Bonilla-Aldana, Graciela Josefina Balbin-Ramon, Ali A. Rabaan, Ranjit Sah, Alberto Paniz-Mondolfi, Pasquale Pagliano, and Silvano Esposito. 2020. “History is Repeating Itself: Probable Zoonotic Spillover as the Cause of the 2019 Novel Coronavirus Epidemic.” Le Infezioni in Medicina 28 (1): 3–5.
  • Rosato, Sebastian. 2021. Intentions in Great Power Politics. New Haven, CT: Yale University Press.
  • Rovetta, Alessandro. 2021. “Reliability of Google Trends: Analysis of the Limits and Potential of Web Infoveillance During COVID-19 Pandemic and for Future Research.” Frontiers in Research Metrics and Analytics 6: 28. doi:10.3389/frma.2021.670226.
  • Sapaty, Peter Simon. 2019. “Conflict and Emergency Management in a Post-Liberal World.” International Relations and Diplomacy 7 (1): 14–36.
  • Schneier, Bruce. 2012. “Securing Medical Research: A Cybersecurity Point of View.” Science 336 (6088): 1527–1529. doi:10.1126/science.1224321.
  • Scholvin, Sören, and Mikael Wigell. 2018. “Power Politics by Economic Means: Geoeconomics as an Analytical Approach and Foreign Policy Practice.” Comparative Strategy 37 (1): 73–84. doi:10.1080/01495933.2018.1419729.
  • Schwille, Petra. 2017. “Biology and the Art of Abstraction.” Biophysical Reviews 9 (4): 273–275. doi:10.1007/s12551-017-0277-3.
  • Sedyaningsih, Endang R., Siti Isfandari, Triono Soendoro, and Siti Fadilah Supari. 2008. “Towards Mutual Trust, Transparency and Equity in Virus Sharing Mechanism: The Avian Influenza Case of Indonesia.” Annals Academy of Medicine Singapore 37 (6): 482.
  • Sjöstedt, Roxanna. 2008. “Exploring the Construction of Threats: The Securitization of HIV/AIDS in Russia.” Security Dialogue 39 (1): 7–29. doi:10.1177/0967010607086821.
  • Snowden, Frank M. 2019. Epidemics and Society. New Haven: Yale University Press.
  • Tang, Shiping. 2010. A Theory of Security Strategy for Our Time. New York: Palgrave Macmillan.
  • Tang, Chih-Mao. 2018. Small States and Hegemonic Competition in Southeast Asia: Pursuing Autonomy, Security and Development Amid Great Power Politics. London: Routledge.
  • US Bipartisan Commission on Biodefense Study Panel. 2019. Cyberbio Convergence: Characterizing the Multiplicative Threat. 17 September. Accessed 10 July 2021. https://www.youtube.com/watch?v=uQn_xw18Lxc&t=245s.
  • Van Langenhove, Luk. 2016. “Science Diplomacy: New Global Challenges, New Trend.” RISIS Commentary 82: 1–4.
  • Vickers, Claudia E., and Paul S. Freemont. 2022. “Pandemic Preparedness: Synthetic Biology and Publicly Funded Biofoundries Can Rapidly Accelerate Response Time.” Nature Communications 13 (1): 1–4. doi:10.1038/s41467-021-27699-2.
  • Vinatzer, Boris A., Lenwood S. Heath, Hussain MJ Almohri, Michael J. Stulberg, Christopher Lowe, and Song Li. 2019. “Cyberbiosecurity Challenges of Pathogen Genome Databases.” Frontiers in Bioengineering and Biotechnology 7: 106. doi:10.3389/fbioe.2019.00106.
  • Watson, C. 2022. “Rise of the Preprint: How Rapid Data Sharing During COVID-19 has Changed Science Forever.” Nature Medicine 28: 2–5. doi:10.1038/s41591-021-01654-6.
  • Webb, Amy, and Andrew Hessel. 2022. The Genesis Machine: How to Rewrite Life in the age of Synthetic Biology. New York: Hachette Book Group.
  • Wintle, Bonnie C., Christian R. Boehm, Catherine Rhodes, Jennifer C. Molloy, Piers Millett, Laura Adam, Rainer Breitling, et al. 2017. “Point of View: A Transatlantic Perspective on 20 Emerging Issues in Biological Engineering.” Elife 6: e30247. doi:10.7554/eLife.30247.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.