当前位置: X-MOL 学术Internet Policy Review › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
What kind of cyber security? Theorising cyber security and mapping approaches
Internet Policy Review ( IF 3.6 ) Pub Date : 2018-05-15 , DOI: 10.14763/2018.2.788
Laura Fichtner

Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances our understanding of how this shapes relationships between actors and of the values prioritised, promoted and inscribed into the concerned technologies.

中文翻译:

什么样的网络安全?理论上的网络安全和映射方法

在有关安全和网络安全的概念性工作的基础上,本文探讨了如何构建不同的网络安全方法。它概述了结构组件并提出了四种常见方法。他们每个人都为参与者扮演了不同的角色,并受到隐私,经济秩序和国家安全等不同价值观的激励和辩护。当政策制定者选择了网络安全政策或举措时,对基本方法的分析将增强我们对这如何影响参与者之间的关系以及优先考虑,促进和铭记相关技术价值的理解。
更新日期:2018-05-15
down
wechat
bug