IDEAS home Printed from https://ideas.repec.org/a/cog/poango/v6y2018i2p73-82.html
   My bibliography  Save this article

Crossing the Digital Divide: Monism, Dualism and the Reason Collective Action is Critical for Cyber Theory Production

Author

Listed:
  • Christopher Whyte

    (L. Douglas Wilder School of Government and Public Affairs, Virginia Commonwealth University, USA)

Abstract

In studying topics in cyber conflict and cyber-security governance, scholars must ask—arguably more so than has been the case with any other emergent research agenda—where the epistemological and ontological value of different methods lies. This article describes the unique, dual methodological challenges inherent in the multifaceted program on global cyber-security and asks how problematic they are for scholarly efforts to construct knowledge about digital dynamics in world affairs. I argue that any answer to this question will vary depending on how one perceives the social science enterprise. While traditional dualistic perspectives on social science imply unique challenges for researcher, a monistic perspective of Weberian objectivity does not. Regardless of one’s perspective, however, the most important steps to be taken at the level of the research program are clearly those focused on constructing the trappings of community. To this end, I outline steps that might be taken to develop a range of community-building and -supporting mechanisms that can simultaneously support a micro-foundational approach to research and expose community elements to one another. Doing this stands to better opportunities for the production of knowledge and direct researchers towards fruitful avenues whilst shortening gaps between the ivory tower and the real world.

Suggested Citation

  • Christopher Whyte, 2018. "Crossing the Digital Divide: Monism, Dualism and the Reason Collective Action is Critical for Cyber Theory Production," Politics and Governance, Cogitatio Press, vol. 6(2), pages 73-82.
  • Handle: RePEc:cog:poango:v6:y:2018:i:2:p:73-82
    DOI: 10.17645/pag.v6i2.1338
    as

    Download full text from publisher

    File URL: https://www.cogitatiopress.com/politicsandgovernance/article/view/1338
    Download Restriction: no

    File URL: https://libkey.io/10.17645/pag.v6i2.1338?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Barnett, Michael & Duvall, Raymond, 2005. "Power in International Politics," International Organization, Cambridge University Press, vol. 59(1), pages 39-75, January.
    2. Nye, Joseph S., 2014. "The Regime Complex for Managing Global Cyber Activities," Scholarly Articles 12308565, Harvard Kennedy School of Government.
    3. King, Gary & Pan, Jennifer & Roberts, Margaret E., 2013. "How Censorship in China Allows Government Criticism but Silences Collective Expression," American Political Science Review, Cambridge University Press, vol. 107(2), pages 326-343, May.
    4. Rosato, Sebastian, 2003. "The Flawed Logic of Democratic Peace Theory," American Political Science Review, Cambridge University Press, vol. 97(4), pages 585-602, November.
    5. Mark Blaug, 1975. "Kuhn Versus Lakatos, or Paradigms Versus Research Programmes in the History of Economics," History of Political Economy, Duke University Press, vol. 7(4), pages 399-433, Winter.
    6. Nazli Choucri & Stuart Madnick & Jeremy Ferwerda, 2014. "Institutions for Cyber Security: International Responses and Global Imperatives," Information Technology for Development, Taylor & Francis Journals, vol. 20(2), pages 96-121, April.
    7. Ian Thynne & Burns, 2007. "Editorial Introduction," Asia Pacific Journal of Public Administration, Taylor & Francis Journals, vol. 29(1), pages 1-2, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Tim Stevens, 2018. "Global Cybersecurity: New Directions in Theory and Methods," Politics and Governance, Cogitatio Press, vol. 6(2), pages 1-4.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Christopher Whyte, 2018. "Crossing the Digital Divide: Monism, Dualism and the Reason Collective Action is Critical for Cyber Theory Production," Politics and Governance, Cogitatio Press, vol. 6(2), pages 73-82.
    2. Leopoldo Fergusson & Carlos Molina, 2020. "Facebook Causes Protests," HiCN Working Papers 323, Households in Conflict Network.
    3. Guriev, Sergei & Treisman, Daniel, 2020. "A theory of informational autocracy," Journal of Public Economics, Elsevier, vol. 186(C).
    4. Fine, Ben, 2002. "Economics Imperialism and the New Development Economics as Kuhnian Paradigm Shift?," World Development, Elsevier, vol. 30(12), pages 2057-2070, December.
    5. Sergei Guriev & Daniel Treisman, 2020. "The Popularity of Authoritarian Leaders: A cross-national investigation," SciencePo Working papers Main hal-03878626, HAL.
    6. Simon Hartmann & Thomas Lindner & Jakob Müllner & Jonas Puck, 2022. "Beyond the nation-state: Anchoring supranational institutions in international business research," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 53(6), pages 1282-1306, August.
    7. Erin Baggott Carter & Brett L. Carter, 2021. "Propaganda and Protest in Autocracies," Journal of Conflict Resolution, Peace Science Society (International), vol. 65(5), pages 919-949, May.
    8. Yue Wu, 2024. "Creation, Consumption, and Control of Sensitive Content," Marketing Science, INFORMS, vol. 43(4), pages 885-902, July.
    9. Zhang, Weidong & Zuo, Na & He, Wu & Li, Songtao & Yu, Lu, 2021. "Factors influencing the use of artificial intelligence in government: Evidence from China," Technology in Society, Elsevier, vol. 66(C).
    10. Hart, Diane & Paucar-Caceres, Alberto, 2017. "A utilisation focussed and viable systems approach for evaluating technology supported learning," European Journal of Operational Research, Elsevier, vol. 259(2), pages 626-641.
    11. Jun Zhang, 2008. "EU in ASEM: its role in framing inter-regional cooperation with East Asian countries," Asia Europe Journal, Springer, vol. 6(3), pages 487-505, November.
    12. Andrey Makarychev & Elizabeth Wishnick, 2022. "Anti-Pandemic Policies in Estonia and Taiwan: Digital Power, Sovereignty and Biopolitics," Social Sciences, MDPI, vol. 11(3), pages 1-23, March.
    13. Günther G. Schulze & Nikita Zakharov, 2025. "Political Cycles of Media Repression," Discussion Paper Series 52 JEL Classification: D7, Department of International Economic Policy, University of Freiburg, revised Feb 2025.
    14. Lingyu Lu & Cameron G. Thies, 2010. "Trade Interdependence and the Issues at Stake in the Onset of Militarized Conflict," Conflict Management and Peace Science, Peace Science Society (International), vol. 27(4), pages 347-368, September.
    15. João Carlos Ferraz & Juliana Santiago & Luma Ramos, 2023. "Policy innovation for sustainable development: the case of the Amazon Fund," Review of Evolutionary Political Economy, Springer, vol. 4(1), pages 109-136, April.
    16. Kenneth W. Abbott & Benjamin Faude, 2022. "Hybrid institutional complexes in global governance," The Review of International Organizations, Springer, vol. 17(2), pages 263-291, April.
    17. Mathieu Rousselin, 2012. "The EU as a Multilateral Rule Exporter - The Global Transfer of European Rules via International Organizations," KFG Working Papers p0048, Free University Berlin.
    18. Xiukang Wang, 2022. "Managing Land Carrying Capacity: Key to Achieving Sustainable Production Systems for Food Security," Land, MDPI, vol. 11(4), pages 1-21, March.
    19. James Evans, 2022. "From Text Signals to Simulations: A Review and Complement to Text as Data by Grimmer, Roberts & Stewart (PUP 2022)," Sociological Methods & Research, , vol. 51(4), pages 1868-1885, November.
    20. Levinson, Nanette S., 2021. "Idea entrepreneurs: The United Nations Open-Ended Working Group & cybersecurity," Telecommunications Policy, Elsevier, vol. 45(6).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:cog:poango:v6:y:2018:i:2:p:73-82. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: António Vieira or IT Department (email available below). General contact details of provider: https://www.cogitatiopress.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.