A theory of actor-network for cyber-security/ Thierry Balzacq
Material type: TextPublication details: 2016Subject(s): In: European Journal of International Security Vol 1 Issue 2, July 2016 pp.176-198Summary: The aim of this article to propose a new theorisation of cyber security through ANT concepts. The article situated cyber-security research in the wider field of security studies. Second the article argued that cyber-threats should be investigated and adressed within the space they enact three overlapping forms networks, regions, and fluids. Third the article demonstrated malware challenges the consistency of networks and the sovereign boundries set by regions at the same time re-enact them.Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Journal Article | Mindef Library & Info Centre Journals | CYBER SECURITY (Browse shelf(Opens below)) | 1 | Not for loan | 53589-1001 |
Browsing Mindef Library & Info Centre shelves, Shelving location: Journals Close shelf browser (Hides shelf browser)
CYBER SECURITY Nato's cyber defence: strategic challenges and institutional adaption/ | CYBER SECURITY Public-private partnerships in national cyber-security strategies/ | CYBER SECURITY Cyber security future trends/ | CYBER SECURITY A theory of actor-network for cyber-security/ | CYBER SECURITY No silver bullet : effective cyber security | CYBER SECURITY eLearning: changing the security landscape/ | CYBER SECURITY Concerns persist with US cyber security/ |
The aim of this article to propose a new theorisation of cyber security through ANT concepts. The article situated cyber-security research in the wider field of security studies. Second the article argued that cyber-threats should be investigated and adressed within the space they enact three overlapping forms networks, regions, and fluids. Third the article demonstrated malware challenges the consistency of networks and the sovereign boundries set by regions at the same time re-enact them.
There are no comments on this title.
Log in to your account to post a comment.