611
Views
0
CrossRef citations to date
0
Altmetric
Articles

Cybersecurity discourses and their policy implications

ORCID Icon
Pages 318-335 | Received 13 Mar 2022, Accepted 16 Oct 2022, Published online: 02 Feb 2023

References

  • Balzacq, Thierry. 2005. “The Three Faces of Securitization: Political Agency, Audience and Context.” European Journal of International Relations 11 (2): 121–201. doi:10.1177/1354066105052960
  • Balzacq, Thierry, ed. 2010. Securitization Theory: How Security Problems Emerge and Dissolve. New York: Routledge.
  • Balzacq, Thierry. 2015. “The “Essence” of Securitization: Theory, Ideal Type, and a Sociological Science of Security.” International Relations 29 (1): 103–113. doi:10.1177/0047117814526606b
  • Balzacq, Thierry, and Myriam Dunn Cavelty. 2016. “A Theory of Actor-Network for Cyber-Security.” European Journal of International Security 1 (2): 176–198. doi:10.1017/eis.2016.8
  • Balzacq, Thierry, and Stefano Guzzini. 2015. “Introduction: What Kind of Theory – If Any – Is Securitization?” International Relations 29 (1): 97–102. doi:10.1177/0047117814526606a
  • Barnard-Wills, David, and Debi Ashenden. 2012. “Securing Virtual Space: Cyber War, Cyber Terror, and Risk.” Space and Culture 15 (2): 110–123. doi:10.1177/1206331211430016
  • Barthes, Roland. 1981. “Theory of Text.” In Untying the Text: A Post-Structuralist Reader, edited by Robert Young, 31–48. London: Routledge & Kegan Paul.
  • Bay, Morten. 2016. “What is Cybersecurity? In Search of an Encompassing Definition for the Post-Snowden Era.” French Journal For Media Research 6: 1–28.
  • Bigo, Didier. 2002. “Security and Immigration: Toward a Critique of the Governmentality of Unease.” Alternatives 27 (Suppl. 1): 63–92. doi:10.1177/03043754020270S105
  • Boeke, Sergei. 2018. “National Cyber Crisis Management: Different European Approaches.” Governance 31 (3): 449–464. doi:10.1111/gove.12309
  • Booth, Ken. 2007. Theory of World Security. Cambridge: Cambridge University Press.
  • Bourdieu, Pierre. 1990. The Logic of Practice. Stanford: Stanford University Press.
  • Brito, Jerry, and Tate Watkins. 2011. “Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy.” Harvard National Security Journal 3: 39–84.
  • Brzostek, Juliusz. 2018. Interview by Author. Warsaw, 26 November.
  • Buchanan, Ben. 2017. The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations. New York: Oxford University Press.
  • Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder: Lynne Rienner Publishers.
  • Choucri, Nazli. 2012. Cyberpolitics in International Relations. Cambridge: MIT Press.
  • Christou, George. 2019. “The Collective Securitisation of Cyberspace in the European Union.” West European Politics 42 (2): 278–301. doi:10.1080/01402382.2018.1510195
  • Clarke, Richard A., and Robert Knake. 2010. Cyberwar: The Next Threat to National Security and What to Do About It. New York: Ecco.
  • Corry, Olaf. 2012. “Securitisation and “Riskification”: Second-Order Security and the Politics of Climate Change.” Millennium: Journal of International Studies 40 (2): 235–258. doi:10.1177/0305829811419444
  • De Wilde, Pieter. 2011. “No Polity for Old Politics? A Framework for Analyzing the Politicization of European Integration.” Journal of European Integration 33 (5): 559–575. doi:10.1080/07036337.2010.546849
  • Deibert, Ronald J. 2002. “Circuits of Power: Security in the Internet Environment.” In Information Technologies and Global Politics: The Changing Scope of Power and Governance, edited by James Rosenau, and J. P. Sing, 115–142. New York: State University of New York Press.
  • Deibert, Ronald J. 2018. “Toward a Human-Centric Approach to Cybersecurity.” Ethics and International Affairs 32 (4): 411–424. doi:10.1017/S0892679418000618
  • Deibert, Ronald J., and Rafal Rohozinski. 2010. “Risking Security: Policies and Paradoxes of Cyberspace Security.” International Political Sociology 4 (1): 15–32. doi:10.1111/j.1749-5687.2009.00088.x
  • Dunn Cavelty, Myriam. 2008. Cyber-Security and Threat Politics. US Efforts to Secure the Information Age. Oxford: Routledge.
  • Dunn Cavelty, Myriam. 2013. “From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse.” International Studies Review, 105–122. doi:10.1111/misr.12023
  • Dunn Cavelty, Myriam. 2018. “Cybersecurity Research Meets Science and Technology Studies.” Politics and Governance 6 (2): 22–30. doi:10.17645/pag.v6i2.1385
  • Dunn Cavelty, Myriam, and Florian J. Egloff. 2019. “The Politics of Cybersecurity: Balancing Different Roles of the State.” St Antony’s International Review 15 (1): 37–57.
  • Dunn Cavelty, Myriam, and Andreas Wenger. 2022. “Introduction: Cyber Security Between Socio-Technological Uncertainty and Political Fragmentation.” In Cyber Security Politics. Socio-Technological Transformations and Political Fragmentation, edited by Myriam Dunn Cavelty, and Andreas Wenger, 1–14. Oxford: Routledge.
  • Entman, Robert. 1993. “Framing: Toward Clarification of a Fractured Paradigm.” Journal of Communication 43 (4): 51–58. doi:10.1111/j.1460-2466.1993.tb01304.x
  • Eriksson, Johan. 2001a. “Cyberplagues, IT, and Security: Threat Politics in the Information Age.” Journal of Contingencies and Crisis Management 9 (4): 211–222. doi:10.1111/1468-5973.00171
  • Foucault, Michel. 1971. “Orders of Discourse.” Social Science Information 10 (2): 7–30. doi:10.1177/053901847101000201
  • Friis, Karsten, and Erik Reichborn-Kjennerub. 2016. “From Cyber Threats to Cyber Risks.” In Conflict in Cyber Space, edited by Karsten Friis, and Jens Ringsmose, 27–44. London: Routledge.
  • Gamble, Andrew. 2000. Politics and Fate. Cambridge: Polity Press.
  • Goffman, Erving. 1974. Frame Analysis: An Essay on the Organization of the Experience. New York: Harper.
  • Guitton, Clement. 2013. “Cyber Insecurity as a National Threat: Overreaction from Germany, France and the UK?” European Security 22 (1): 21–35. doi:10.1080/09662839.2012.749864
  • Haddad, Christian, and Clemens Binder. 2019. “Governing Through Cybersecurity: National Policy Strategies, Globalized (In-)Security and Sociotechnical Visions of the Digital Society.” ÖSterreich Zeitschrift für Soziologie 44: 115–134. doi:10.1007/s11614-019-00350-7
  • Halliday, Michael. 1978. Language as Social Semiotic. London: Edward Arnold.
  • Hansen, Lene, and Helen Nissenbaum. 2009. “Digital Disaster, Cyber Security, and the Copenhagen School.” International Studies Quarterly 53 (4): 1155–1175. doi:10.1111/j.1468-2478.2009.00572.x
  • Huysmans, Jef. 2011. “What’s in an Act? On Security Speech Acts and Little Security Nothings.” Security Dialogue 42 (4-5): 371–383. doi:10.1177/0967010611418713
  • Kaider, Robert. 2015. “The Birth of Cyberwar.” Political Geography 46: 11–20. doi:10.1016/j.polgeo.2014.10.001
  • Kilicki, Wojciech. 2019. Interview by Author. Warsaw, 8 February.
  • Kingdon, John W. 2003. Agendas, Alternatives, and Public Policies. New York: Harper Collins College Publishers.
  • Kośla, Robert. 2019. Interview by author. Warsaw, 10 October.
  • Laclau, Ernest, and Chantal Mouffe. 1985. Hegemony and Socialist Strategy. London: Verso.
  • Lacy, Mark, and Daniel Prince. 2018. “Securitization and the Global Politics of Cybersecurity.” Global Discourse 8 (1): 100–115. doi:10.1080/23269995.2017.1415082
  • Lawson, Sean T. 2020. Cybersecurity Discourse in the United States: Cyber-Doom Rhetoric and Beyond. New York: Routledge.
  • Lee, Robert M., and Thomas Rid. 2014. “OMG Cyber! Thirteen Reasons Why Hype Makes for Bad Policy.” RUSI Journal 159 (5): 4–12. doi:10.1080/03071847.2014.969932
  • Lobato, Luisa Cruz, and Kai Michael Kenkel. 2015. “Discourses of Cyberspace Securitization in Brazil and in the United States.” Revista Brasileira de Política Internacional 58 (2): 23–43. doi:10.1590/0034-7329201500202
  • Mazzucato, Mariana. 2015. The Entrepreneurial State: Debunking Public vs. Private Sector Myths. New York: PublicAffairs.
  • Ministry of Administration and Digitisation, Internal Security Agency. 2013. Cyberspace Protection Policy of the Republic of Poland. Warsaw.
  • National Security Bureau. 2015. Doktryna cyberbezpieczeństwa Rzeczypospolitej Polskiej. Warszawa: Biuro Bezpieczeństwa Narodowego.
  • Nissenbaum, Helen. 2005. “Where Computer Security Meets National Security.” Ethics and Information Technology 7: 61–73. doi:10.1007/s10676-005-4582-3
  • Pinch, Trevor, and Wiebe Bijker. 1984. “The Social Construction of Facts and Artefacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other.” Social Studies of Science 14: 399–441. doi:10.1177/030631284014003004
  • Polish Act on the National Cybersecurity System. 2018. “Dz.U. 2018 poz. 1560, Ustawa o Krajowym Systemie Cyberbezpieczeństwa.”
  • Quigley, Kevin, Calvin Burns, and Kristen Stallard. 2015. “Cyber Gurus: A Rhetorical Analysis of the Language of Cybersecurity Specialists and the Implications for Security Policy and Critical Infrastructure Protection.” Government Information Quarterly 32 (2): 108–117. doi:10.1016/j.giq.2015.02.001
  • Ralf, Bendrath. 2001. “The Cyberwar Debate: Perception and Politics in U.S. Critical Infrastructure Protection.” Information & Security: An International Journal 7: 80–103. doi:10.11610/isij.0705
  • Saco, Diana. 1999. “Colonizing Cyberspace: ‘National Security’ and the Internet.” In Cultures of Insecurity: States, Communities, and the Production of Danger, edited by Jutta Weldes, Mark Laffey, Hugh Gusterson, and Raymond Duvall, 261–292. Minneapolis: University of Minnesota Press.
  • Salter, Mark B. 2008. “Imagining Numbers: Risk, Quantification, and Aviation Security.” Security Dialogue 39 (2-3): 243–266. doi:10.1177/0967010608088777
  • Saussure, Ferdinand de. 2011. Course in General Linguistics. Edited by Charles Bally, Albert Sechehaye, Perry Meisel and Haun Saussy. Translated by Wade Baskin. New York: Columbia University Press.
  • Shafqat, Narmeen, and Ashraf Masood. 2016. “Comparative Analysis of Various National Cyber Security Strategies.” International Journal of Computer Science and Information Security 14 (1): 129–136.
  • Shires, James. 2019. “Family Resemblance or Family Argument? Three Perspectives on Cybersecurity and Their Interactions.” St Antony’s International Review 15 (1): 18–36.
  • Streżyńska, Anna. 2018. Interview by Author. Warsaw, 19 July.
  • Stritzel, Holger. 2001. “Towards a Theory of Securitization: Copenhagen and Beyond.” European Journal of International Relations 13 (3): 357–383. doi:10.1177/1354066107080128
  • Stritzel, Holger. 2011. “Security, the Translation.” Security Dialogue 42 (4-5): 343–355. doi:10.1177/0967010611418998
  • Stritzel, Holger. 2012. “Securitization, Power, Intertextuality: Discourse Theory and the Translations of Organized Crime.” Security Dialogue 43 (6): 549–567. doi:10.1177/0967010612463953
  • Stritzel, Holger. 2014. Security in Translation: Securitization Theory and the Localization of Threat. New York: Palgrave Macmillan.
  • Swinfen Green, Jeremy. 2015. Cyber Security. An Introduction for Non-Technical Managers. Oxford: Routledge.
  • Watson, Scott D. 2012. ““Framing” the Copenhagen School: Integrating the Literature on Threat Construction.” Millennium: Journal of International Studies 40 (2): 279–301.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.