How We Stopped Worrying about Cyber Doom and Started Collecting Data
Autor(a) principal: | |
---|---|
Data de Publicação: | 2018 |
Outros Autores: | |
Tipo de documento: | Artigo |
Idioma: | eng |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | https://doi.org/10.17645/pag.v6i2.1368 |
Resumo: | Moderate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water’s edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field. |
id |
RCAP_1a5a49f98b9f492ca3706d2834cccb04 |
---|---|
oai_identifier_str |
oai:ojs.cogitatiopress.com:article/1368 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
How We Stopped Worrying about Cyber Doom and Started Collecting Datacyber conflict; cyber security; cyber strategy; data collection; quantitative methodsModerate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water’s edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field.Cogitatio2018-06-11info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttps://doi.org/10.17645/pag.v6i2.1368oai:ojs.cogitatiopress.com:article/1368Politics and Governance; Vol 6, No 2 (2018): Global Cybersecurity: New Directions in Theory and Methods; 49-602183-2463reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAPenghttps://www.cogitatiopress.com/politicsandgovernance/article/view/1368https://doi.org/10.17645/pag.v6i2.1368https://www.cogitatiopress.com/politicsandgovernance/article/view/1368/1368Copyright (c) 2018 Brandon Valeriano, Ryan C. Manesshttp://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessValeriano, BrandonManess, Ryan C.2022-12-22T15:16:48Zoai:ojs.cogitatiopress.com:article/1368Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T16:22:30.336583Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
How We Stopped Worrying about Cyber Doom and Started Collecting Data |
title |
How We Stopped Worrying about Cyber Doom and Started Collecting Data |
spellingShingle |
How We Stopped Worrying about Cyber Doom and Started Collecting Data Valeriano, Brandon cyber conflict; cyber security; cyber strategy; data collection; quantitative methods |
title_short |
How We Stopped Worrying about Cyber Doom and Started Collecting Data |
title_full |
How We Stopped Worrying about Cyber Doom and Started Collecting Data |
title_fullStr |
How We Stopped Worrying about Cyber Doom and Started Collecting Data |
title_full_unstemmed |
How We Stopped Worrying about Cyber Doom and Started Collecting Data |
title_sort |
How We Stopped Worrying about Cyber Doom and Started Collecting Data |
author |
Valeriano, Brandon |
author_facet |
Valeriano, Brandon Maness, Ryan C. |
author_role |
author |
author2 |
Maness, Ryan C. |
author2_role |
author |
dc.contributor.author.fl_str_mv |
Valeriano, Brandon Maness, Ryan C. |
dc.subject.por.fl_str_mv |
cyber conflict; cyber security; cyber strategy; data collection; quantitative methods |
topic |
cyber conflict; cyber security; cyber strategy; data collection; quantitative methods |
description |
Moderate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water’s edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field. |
publishDate |
2018 |
dc.date.none.fl_str_mv |
2018-06-11 |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
https://doi.org/10.17645/pag.v6i2.1368 oai:ojs.cogitatiopress.com:article/1368 |
url |
https://doi.org/10.17645/pag.v6i2.1368 |
identifier_str_mv |
oai:ojs.cogitatiopress.com:article/1368 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
https://www.cogitatiopress.com/politicsandgovernance/article/view/1368 https://doi.org/10.17645/pag.v6i2.1368 https://www.cogitatiopress.com/politicsandgovernance/article/view/1368/1368 |
dc.rights.driver.fl_str_mv |
Copyright (c) 2018 Brandon Valeriano, Ryan C. Maness http://creativecommons.org/licenses/by/4.0 info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Copyright (c) 2018 Brandon Valeriano, Ryan C. Maness http://creativecommons.org/licenses/by/4.0 |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Cogitatio |
publisher.none.fl_str_mv |
Cogitatio |
dc.source.none.fl_str_mv |
Politics and Governance; Vol 6, No 2 (2018): Global Cybersecurity: New Directions in Theory and Methods; 49-60 2183-2463 reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799130670410235904 |