How We Stopped Worrying about Cyber Doom and Started Collecting Data

被引:13
作者
Valeriano, Brandon [1 ]
Maness, Ryan C. [2 ]
机构
[1] Marine Corps Univ, Donald Bren Chair Armed Polit, Quantico, VA 22134 USA
[2] Naval Postgrad Sch, Def Anal Dept, Monterey, CA 93943 USA
基金
俄罗斯科学基金会;
关键词
cyber conflict; cyber security; cyber strategy; data collection; quantitative methods; CONFLICT;
D O I
10.17645/pag.v6i2.1368
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Moderate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water's edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field.
引用
收藏
页码:49 / 60
页数:12
相关论文
共 67 条
[1]  
Ackerman R., 2017, CREATING COMMON LANG
[2]  
Anderson Elizabeth., 1998, International Journal of Intelligence and Counterintelligence, V11, P403, DOI DOI 10.1080/08850609808435385
[3]  
[Anonymous], 2017, THESIS
[4]  
[Anonymous], 1970, CRITICISM GROWTH KNO
[5]  
Asal V., 2016, Journal of Global Security Studies, V1, P235, DOI DOI 10.1093/JOGSS/OGW006
[6]   Timing of cyber conflict [J].
Axelrod, Robert ;
Iliev, Rumen .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2014, 111 (04) :1298-1303
[8]   Nuclear Weapons as Shields [J].
Beardsley, Kyle ;
Asal, Victor .
CONFLICT MANAGEMENT AND PEACE SCIENCE, 2009, 26 (03) :235-255
[9]  
Berger P. L., 1966, The social construction of reality: A Treatise in the sociology of knowledge
[10]  
Berglundh T., 2015, CLIN PERIODONTOLOGY, VSixth, P1