Switch to: References

Add citations

You must login to add citations.
  1. Securitizing cyberspace: Protecting political judgment.Hedvig Ördén - 2022 - Journal of International Political Theory 18 (3):375-392.
    The contemporary debate in democracies routinely refers to online misinformation, disinformation, and deception, as security-issues in need of urgent attention. Despite this pervasive discourse, however, policymakers often appear incapable of articulating what security means in this context. This paper argues that we must understand the unique practical and normative challenges to security actualized by such online information threats, when they arise in a democratic context. Investigating security-making in the nexus between technology and national security through the concept of “cybersovereignty,” the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Toward a Human-Centric Approach to Cybersecurity.Ronald J. Deibert - 2018 - Ethics and International Affairs 32 (4):411-424.
    A “national security–centric” approach currently dominates cybersecurity policies and practices. Derived from a realist theory of world politics in which states compete with each other for survival and relative advantage, the principal cybersecurity threats are conceived as those affecting sovereign states, such as damage to critical infrastructure within their territorial jurisdictions. As part of a roundtable on “Competing Visions for Cyberspace,” this essay presents an alternative approach to cybersecurity that is derived from the tradition of “human security.” Rather than prioritizing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical Design in the Internet of Things.Gianmarco Baldini, Maarten Botterman, Ricardo Neisse & Mariachiara Tallacchini - 2018 - Science and Engineering Ethics 24 (3):905-925.
    Even though public awareness about privacy risks in the Internet is increasing, in the evolution of the Internet to the Internet of Things these risks are likely to become more relevant due to the large amount of data collected and processed by the “Things”. The business drivers for exploring ways to monetize such data are one of the challenges identified in this paper for the protection of Privacy in the IoT. Beyond the protection of privacy, this paper highlights the need (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations