The securitization of cyberspace governance in Singapore/ Syed Mohammed Ad'ha Aljunied

By: Material type: TextTextPublication details: 2020Subject(s): Online resources: In: Asian Security: Vol 16, No. 3, 2020, pp. 343-362 (21A)Summary: This article examines how the Singaporean government has "securitized" cyberspace governance. It contributes value-add to the existing literature on securitization theory by evaluating the specific backgrounds and preexisting beliefs that securitizing actors bring with them to the securitization process. Taking the case of Singapore, this paper focuses on the military elites turned civilian politicans and policymakers that have been tasked with cyberspace governance. A discourse analysis shows how terminologies describing cyberspace as an "existential" issue and key personnel appointments with significant military backgrounds reflect the prevalance of military elites, terminologies, strategies that have become embedded within domestic cybersecurity governance structures.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Journal Article Mindef Library & Info Centre Journals SINGAPORE (Browse shelf(Opens below)) 1 Not for loan 66072-1001

This article examines how the Singaporean government has "securitized" cyberspace governance. It contributes value-add to the existing literature on securitization theory by evaluating the specific backgrounds and preexisting beliefs that securitizing actors bring with them to the securitization process. Taking the case of Singapore, this paper focuses on the military elites turned civilian politicans and policymakers that have been tasked with cyberspace governance. A discourse analysis shows how terminologies describing cyberspace as an "existential" issue and key personnel appointments with significant military backgrounds reflect the prevalance of military elites, terminologies, strategies that have become embedded within domestic cybersecurity governance structures.

There are no comments on this title.

to post a comment.