IDEAS home Printed from https://ideas.repec.org/a/cog/poango/v6y2018i2p1-4.html
   My bibliography  Save this article

Global Cybersecurity: New Directions in Theory and Methods

Author

Listed:
  • Tim Stevens

    (Department of War Studies, King’s College London, UK)

Abstract

This thematic issue advocates a range of novel theoretical and methodological directions applicable to cybersecurity studies. Drawing on critical International Relations theory, Science and Technology Studies, participant observation, quantitative political science, and other social science methods and theory, the contributors advance modes of invigorating the exploration of cybersecurity as an assemblage of sociotechnical practices. In so doing, this issue seeks to enhance understanding of the politics and strategies of cybersecurity, one of the most complex and diverse technical and political challenges of our contemporary world.

Suggested Citation

  • Tim Stevens, 2018. "Global Cybersecurity: New Directions in Theory and Methods," Politics and Governance, Cogitatio Press, vol. 6(2), pages 1-4.
  • Handle: RePEc:cog:poango:v:6:y:2018:i:2:p:1-4
    as

    Download full text from publisher

    File URL: https://www.cogitatiopress.com/politicsandgovernance/article/view/1569
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Daniel R. McCarthy, 2018. "Privatizing Political Authority: Cybersecurity, Public-Private Partnerships, and the Reproduction of Liberal Political Order," Politics and Governance, Cogitatio Press, vol. 6(2), pages 5-12.
    2. Brandon Valeriano & Ryan C. Maness, 2018. "How We Stopped Worrying about Cyber Doom and Started Collecting Data," Politics and Governance, Cogitatio Press, vol. 6(2), pages 49-60.
    3. Myriam Dunn Cavelty, 2018. "Cybersecurity Research Meets Science and Technology Studies," Politics and Governance, Cogitatio Press, vol. 6(2), pages 22-30.
    4. Lizzie Coles-Kemp & Debi Ashenden & Kieron O'Hara, 2018. "Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen," Politics and Governance, Cogitatio Press, vol. 6(2), pages 41-48.
    5. Miguel Alberto Gomez & Eula Bianca Villar, 2018. "Fear, Uncertainty, and Dread: Cognitive Heuristics and Cyber Threats," Politics and Governance, Cogitatio Press, vol. 6(2), pages 61-72.
    6. Christopher Whyte, 2018. "Crossing the Digital Divide: Monism, Dualism and the Reason Collective Action is Critical for Cyber Theory Production," Politics and Governance, Cogitatio Press, vol. 6(2), pages 73-82.
    7. Jamie Collier, 2018. "Cyber Security Assemblages: A Framework for Understanding the Dynamic and Contested Nature of Security Provision," Politics and Governance, Cogitatio Press, vol. 6(2), pages 13-21.
    8. James Shires, 2018. "Enacting Expertise: Ritual and Risk in Cybersecurity," Politics and Governance, Cogitatio Press, vol. 6(2), pages 31-40.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ola Michalec & Sveta Milyaeva & Awais Rashid, 2022. "Reconfiguring governance: How cyber security regulations are reconfiguring water governance," Regulation & Governance, John Wiley & Sons, vol. 16(4), pages 1325-1342, October.
    2. Andrey Makarychev & Elizabeth Wishnick, 2022. "Anti-Pandemic Policies in Estonia and Taiwan: Digital Power, Sovereignty and Biopolitics," Social Sciences, MDPI, vol. 11(3), pages 1-23, March.
    3. Csenkey, Kristen & Bindel, Nina, 2021. "Post-Quantum Cryptographic Assemblages and the Governance of the Quantum Threat," SocArXiv 3ws6p, Center for Open Science.
    4. Mauslein Jacob A. & Pickering Jeffrey, 2021. "Rivalry Type and Cyber Operations: “Hot” Rivalries, “Cold” Rivalries, and Cyber Incidents, 1990–2009," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 27(2), pages 169-195, May.
    5. Steffen Wendzel & Cédric Lévy-Bencheton & Luca Caviglione, 2020. "Not all areas are equal: analysis of citations in information security research," Scientometrics, Springer;Akadémiai Kiadó, vol. 122(1), pages 267-286, January.
    6. Petar Radanliev & David Roure & Pete Burnap & Omar Santos, 2021. "Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things," The Review of Socionetwork Strategies, Springer, vol. 15(2), pages 381-411, November.
    7. Gomez, Miguel Alberto & Winger, Gregory, 2023. "Public Opinion and Alliance Commitments in Cybersecurity: An Attack Against All?," SocArXiv bcwhu, Center for Open Science.
    8. Burton Joe, 2019. "Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation," TalTech Journal of European Studies, Sciendo, vol. 9(3), pages 116-133, September.
    9. Ampratwum, Godslove & Osei-Kyei, Robert & Tam, Vivian W.Y., 2022. "Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review," International Journal of Critical Infrastructure Protection, Elsevier, vol. 39(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:cog:poango:v:6:y:2018:i:2:p:1-4. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: António Vieira (email available below). General contact details of provider: https://www.cogitatiopress.com/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.