The power of interpretation: Qualitative methods in cybersecurity research

D Fujs, A Mihelič, SLR Vrhovec - … of the 14th International Conference on …, 2019 - dl.acm.org
Cybersecurity is a hot topic and researchers have published extensively on studies
conducted using a variety of different research methods. This paper aims to determine which …

Cyber security meets security politics: Complex technology, fragmented politics, and networked science

M Dunn Cavelty, A Wenger - Contemporary Security Policy, 2020 - Taylor & Francis
In the last decade, cyber incidents have become more expensive, more disruptive, and in
many cases more political, with a new body of theoretically informed research emerging in …

A principlist framework for cybersecurity ethics

P Formosa, M Wilson, D Richards - Computers & Security, 2021 - Elsevier
The ethical issues raised by cybersecurity practices and technologies are of critical
importance. However, there is disagreement about what is the best ethical framework for …

Hacking humans? Social Engineering and the construction of the “deficient user” in cybersecurity discourses

N Klimburg-Witjes, A Wentland - Science, Technology, & …, 2021 - journals.sagepub.com
Today, social engineering techniques are the most common way of committing cybercrimes
through the intrusion and infection of computer systems. Cybersecurity experts use the term …

Global cybersecurity: New directions in theory and methods

T Stevens - Politics and Governance, 2018 - ssoar.info
This thematic issue advocates a range of novel theoretical and methodological directions
applicable to cybersecurity studies. Drawing on critical International Relations theory …

Interpreting cyber-energy-security events: experts, social imaginaries, and policy discourses around the 2016 Ukraine blackout

L Gjesvik, K Szulecki - European Security, 2023 - Taylor & Francis
The digitalisation of the energy system brings out the question of cyber threats. How this
area is perceived and how cyber-security policy in the energy sector develops is driven by …

Knowledge in the grey zone: AI and cybersecurity

T Stevens - Digital War, 2020 - Springer
Cybersecurity protects citizens and society from harm perpetrated through computer
networks. Its task is made ever more complex by the diversity of actors—criminals, spies …

[PDF][PDF] Attribution and knowledge creation assemblages in cybersecurity politics

FJ Egloff, M Dunn Cavelty - Journal of Cybersecurity, 2021 - academic.oup.com
Attribution is central to cybersecurity politics. It establishes a link between technical
occurrences and political consequences by reducing the uncertainty about who is behind an …

[图书][B] The politics of cybersecurity in the Middle East

J Shires - 2022 - books.google.com
Cybersecurity is a complex and contested issue in international politics. By focusing on
the'great powers'--the US, the EU, Russia and China--studies in the field often fail to capture …

Reconfiguring governance: How cyber security regulations are reconfiguring water governance

O Michalec, S Milyaeva, A Rashid - Regulation & Governance, 2022 - Wiley Online Library
Developments in improved monitoring, asset management, and resource efficiencies led to
the water industry promising a step‐change in the design and operation of these facilities …