Where computer security meets national security

Ethics and Information Technology 7 (2):61-73 (2005)
  Copy   BIBTEX

Abstract

This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,130

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Framing computer security and privacy.Rebecca Slayton - 2016 - Acm Sigcas Computers and Society 46 (3):45-54.
ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.

Analytics

Added to PP
2009-01-28

Downloads
101 (#208,725)

6 months
15 (#202,268)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Citations of this work

Responsible research and innovation key performance indicators in industry.Emad Yaghmaei - 2018 - Journal of Information, Communication and Ethics in Society 16 (2):214-234.
Defining Information Security.Lundgren Björn & Möller Niklas - 2019 - Science and Engineering Ethics 25 (2):419-441.
Democratizing cognitive technology: a proactive approach.Marcello Ienca - 2019 - Ethics and Information Technology 21 (4):267-280.
Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.

View all 6 citations / Add more citations

References found in this work

No references found.

Add more references