메뉴 건너뛰기




Volumn 53, Issue 4, 2009, Pages 1155-1175

Digital disaster, cyber security, and the copenhagen school

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER; INNOVATION; SECURITY; THEORETICAL STUDY; THEORY; UNIVERSITY SECTOR;

EID: 71649085630     PISSN: 00208833     EISSN: 14682478     Source Type: Journal    
DOI: 10.1111/j.1468-2478.2009.00572.x     Document Type: Article
Times cited : (284)

References (73)
  • 3
    • 33847333250 scopus 로고    scopus 로고
    • Governing Terrorism Through Risk: Taking Precautions, (un)Knowing the Future
    • Aradau Claudia, van Munster Rens. Governing Terrorism Through Risk: Taking Precautions, (un)Knowing the Future. European Journal of International Relations 2007, 13(1):89-115.
    • (2007) European Journal of International Relations , vol.13 , Issue.1 , pp. 89-115
    • Aradau, C.1    van Munster, R.2
  • 4
    • 34248236985 scopus 로고
    • Cyberwar is Coming!
    • Reprinted in , edited by, Santa Monica, RAND
    • Arquilla John, Ronfeldt David, Arquilla John, Ronfeldt David. Cyberwar is Coming!. Comparative Strategy 1993, 12(2):141-165. Reprinted in , edited by, Santa Monica, RAND
    • (1993) Comparative Strategy , vol.12 , Issue.2 , pp. 141-165
    • Arquilla, J.1    Ronfeldt, D.2    Arquilla, J.3    Ronfeldt, D.4
  • 8
    • 20744450463 scopus 로고    scopus 로고
    • The Three Faces of Securitization: Political Agency, Audience and Context
    • Balzacq Thierry. The Three Faces of Securitization: Political Agency, Audience and Context. European Journal of International Relations 2005, 11(2):171-201.
    • (2005) European Journal of International Relations , vol.11 , Issue.2 , pp. 171-201
    • Balzacq, T.1
  • 10
    • 0036344063 scopus 로고    scopus 로고
    • Security and Immigration: Toward a Critique of the Governmentality of Unease
    • Bigo Didier. Security and Immigration: Toward a Critique of the Governmentality of Unease. Alternatives 2002, 27(Suppl.):63-92.
    • (2002) Alternatives , vol.27 , Issue.SUPPL. , pp. 63-92
    • Bigo, D.1
  • 11
    • 71649101974 scopus 로고    scopus 로고
    • Estonia Calls For a NATO Strategy on 'Cyber-Terrorists' After Coming Under Attack
    • May 18
    • Blomfield Adrian. Estonia Calls For a NATO Strategy on 'Cyber-Terrorists' After Coming Under Attack. The Daily Telegraph 2007, May 18
    • (2007) The Daily Telegraph
    • Blomfield, A.1
  • 12
    • 27144507479 scopus 로고    scopus 로고
    • Vernacular Security
    • Bubandt Niels. Vernacular Security. Security Dialogue 2005, 36(3):275-296.
    • (2005) Security Dialogue , vol.36 , Issue.3 , pp. 275-296
    • Bubandt, N.1
  • 20
    • 4644260248 scopus 로고    scopus 로고
    • Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace
    • Deibert Ronald J. Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace. Millennium 2003, 32(3):501-530.
    • (2003) Millennium , vol.32 , Issue.3 , pp. 501-530
    • Deibert, R.J.1
  • 21
    • 26444591159 scopus 로고    scopus 로고
    • Hacking Networks of Terror
    • Deibert Ronald J, Stein Janice Gross. Hacking Networks of Terror. Dialog-IO 2002, 1(1):1-14.
    • (2002) Dialog-IO , vol.1 , Issue.1 , pp. 1-14
    • Deibert, R.J.1    Stein, J.G.2
  • 25
    • 4644372122 scopus 로고    scopus 로고
    • The Question of Information Technology in International Relations
    • Der Derian James. The Question of Information Technology in International Relations. Millennium 2003, 32(3):441-456.
    • (2003) Millennium , vol.32 , Issue.3 , pp. 441-456
    • Der Derian, J.1
  • 26
    • 84970243036 scopus 로고
    • The Case Against Linking Environmental Degradation and National Security
    • Deudney Daniel. The Case Against Linking Environmental Degradation and National Security. Millennium 1990, 19(3):461-476.
    • (1990) Millennium , vol.19 , Issue.3 , pp. 461-476
    • Deudney, D.1
  • 28
    • 85055358743 scopus 로고    scopus 로고
    • Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security
    • Elbe Stefan. Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security. International Studies Quarterly 2006, 50(1):119-144.
    • (2006) International Studies Quarterly , vol.50 , Issue.1 , pp. 119-144
    • Elbe, S.1
  • 29
    • 28344455175 scopus 로고    scopus 로고
    • Observers or Advocates? On the Political Role of Security Analysts
    • Erikson Johan. Observers or Advocates? On the Political Role of Security Analysts. Cooperation and Conflict 1999, 34(3):311-333.
    • (1999) Cooperation and Conflict , vol.34 , Issue.3 , pp. 311-333
    • Erikson, J.1
  • 30
    • 70549098788 scopus 로고    scopus 로고
    • Cyber Assaults on Estonia Typify a New Battle Tactic
    • May 19
    • Finn Peter. Cyber Assaults on Estonia Typify a New Battle Tactic. The Washington Post 2007, May 19
    • (2007) The Washington Post
    • Finn, P.1
  • 32
    • 0007985969 scopus 로고    scopus 로고
    • The Little Mermaid's Silent Security Dilemma and the Absence of Gender in the Copenhagen School
    • Hansen Lene. The Little Mermaid's Silent Security Dilemma and the Absence of Gender in the Copenhagen School. Millennium 2000, 29(2):285-306.
    • (2000) Millennium , vol.29 , Issue.2 , pp. 285-306
    • Hansen, L.1
  • 33
    • 71649098624 scopus 로고    scopus 로고
    • Visual Securitization: Taking Discourse Analysis from the Word to the Image
    • Paper presented at the 49th International Studies Convention, San Francisco
    • Hansen Lene. Visual Securitization: Taking Discourse Analysis from the Word to the Image. 2008, Paper presented at the 49th International Studies Convention, San Francisco
    • (2008)
    • Hansen, L.1
  • 34
    • 0029491415 scopus 로고
    • Emerging Challenge: Security and Safety in Cyberspace
    • Reprinted in , edited by, Santa Monica, RAND
    • Hundley Richard O, Anderson Robert H, Arquilla John, Ronfeldt David. Emerging Challenge: Security and Safety in Cyberspace. IEEE Technology and Society 1995/1996, Reprinted in , edited by, Santa Monica, RAND
    • (1995) IEEE Technology and Society
    • Hundley, R.O.1    Anderson, R.H.2    Arquilla, J.3    Ronfeldt, D.4
  • 35
    • 0032341575 scopus 로고    scopus 로고
    • Revisiting Copenhagen: Or, On the Creative Development of a Security Studies Agenda in Europe
    • Huysmans Jef. Revisiting Copenhagen: Or, On the Creative Development of a Security Studies Agenda in Europe. European Journal of International Relations 1998, 4(4):479-505.
    • (1998) European Journal of International Relations , vol.4 , Issue.4 , pp. 479-505
    • Huysmans, J.1
  • 37
    • 71649087457 scopus 로고    scopus 로고
    • NATO - Cyber-Crime and Cyber-Security
    • Invitation to Panel Discussion on July 19
    • NATO - Cyber-Crime and Cyber-Security. 2007, Invitation to Panel Discussion on July 19
    • (2007)
  • 38
    • 33748108031 scopus 로고    scopus 로고
    • International Organizations, Security Dichotomies and the Trafficking of Persons and Narcotics in Post-Soviet Central Asia: A Critique of the Securitization Framework
    • Jackson Nicole J. International Organizations, Security Dichotomies and the Trafficking of Persons and Narcotics in Post-Soviet Central Asia: A Critique of the Securitization Framework. Security Dialogue 2006, 37(3):299-317.
    • (2006) Security Dialogue , vol.37 , Issue.3 , pp. 299-317
    • Jackson, N.J.1
  • 39
    • 33748132953 scopus 로고    scopus 로고
    • Reconfiguring Security: Buddhism and Moral Legitimacy in Cambodia
    • Kent Alexandra. Reconfiguring Security: Buddhism and Moral Legitimacy in Cambodia. Security Dialogue 2006, 37(3):343-361.
    • (2006) Security Dialogue , vol.37 , Issue.3 , pp. 343-361
    • Kent, A.1
  • 40
    • 79954033820 scopus 로고    scopus 로고
    • Blogs and Military Information Strategy
    • Kinniburgh James B, Denning Dorothy E. Blogs and Military Information Strategy. IO Sphere 2006, Summer:5-13.
    • (2006) IO Sphere , vol.Summer , pp. 5-13
    • Kinniburgh, J.B.1    Denning, D.E.2
  • 43
    • 26444447572 scopus 로고    scopus 로고
    • In Defence of Religion: Sacred Referent Objects for Securitization
    • Laustsen Carsten Bagge, Wæver Ole. In Defence of Religion: Sacred Referent Objects for Securitization. Millennium 2000, 29(3):705-739.
    • (2000) Millennium , vol.29 , Issue.3 , pp. 705-739
    • Laustsen, C.B.1    Wæver, O.2
  • 44
    • 0030546131 scopus 로고    scopus 로고
    • Identity and Security: Buzan and the Copenhagen school
    • McSweeney Bill. Identity and Security: Buzan and the Copenhagen school. Review of International Studies 1996, 22(1):81-93.
    • (1996) Review of International Studies , vol.22 , Issue.1 , pp. 81-93
    • McSweeney, B.1
  • 45
    • 71649110772 scopus 로고    scopus 로고
    • NATO to Study Defense Against Cyberattacks; Computer Assault Staggered Estonia
    • June 15
    • Michaels Jim. NATO to Study Defense Against Cyberattacks; Computer Assault Staggered Estonia. USA Today 2007, June 15
    • (2007) USA Today
    • Michaels, J.1
  • 46
    • 71649102675 scopus 로고    scopus 로고
    • Defending Against Cyber Attacks
    • Available at . (Accessed July 3, 2008.)
    • Defending Against Cyber Attacks. 2008, http://www.nato.int/issues/cyber_defence/practice.html, Available at . (Accessed July 3, 2008.)
    • (2008)
  • 47
    • 33748113498 scopus 로고    scopus 로고
    • From Social to National Security
    • Neocleous Mark. From Social to National Security. Security Dialogue 2006, 37(3):363-384.
    • (2006) Security Dialogue , vol.37 , Issue.3 , pp. 363-384
    • Neocleous, M.1
  • 48
    • 2042434504 scopus 로고    scopus 로고
    • Returning Practice to the Linguistic Turn: The Case of Diplomacy
    • Neumann Iver B. Returning Practice to the Linguistic Turn: The Case of Diplomacy. Millennium 2002, 31(3):627-651.
    • (2002) Millennium , vol.31 , Issue.3 , pp. 627-651
    • Neumann, I.B.1
  • 49
    • 1842435111 scopus 로고    scopus 로고
    • Hackers and the Contested Ontology of Cyberspace
    • Nissenbaum Helen. Hackers and the Contested Ontology of Cyberspace. New Media & Society 2004, 6(2):195-217.
    • (2004) New Media & Society , vol.6 , Issue.2 , pp. 195-217
    • Nissenbaum, H.1
  • 50
    • 31144461818 scopus 로고    scopus 로고
    • Where Computer Security Meets National Security
    • Nissenbaum Helen. Where Computer Security Meets National Security. Ethics and Information Technology 2005, 7(2):61-73.
    • (2005) Ethics and Information Technology , vol.7 , Issue.2 , pp. 61-73
    • Nissenbaum, H.1
  • 51
    • 71649108888 scopus 로고    scopus 로고
    • Final Communique: Meeting of the North Atlantic Council in Defence Ministers Session
    • Press Release, June 14
    • Final Communique: Meeting of the North Atlantic Council in Defence Ministers Session. 2007, Press Release, June 14
    • (2007)
  • 52
    • 71649089999 scopus 로고    scopus 로고
    • P2P Security
    • Available at . (Accessed October 31, 2008.)
    • P2P Security. 2008, http://www.onguardonline.gov/topics/p2p-security.aspx, Available at . (Accessed October 31, 2008.)
    • (2008)
  • 55
    • 84897511858 scopus 로고
    • What is Security?
    • Rothschild Emma. What is Security? Dædalus 1995, 124(3):53-98.
    • (1995) Dædalus , vol.124 , Issue.3 , pp. 53-98
    • Rothschild, E.1
  • 58
    • 71649100187 scopus 로고    scopus 로고
    • Attack of the Cyber Terrorists
    • May 28
    • Attack of the Cyber Terrorists. 2007, May 28
    • (2007)
  • 59
    • 71649113317 scopus 로고    scopus 로고
    • A Good Bot Roast; Cyber-Crime
    • June 23
    • A Good Bot Roast; Cyber-Crime. 2007a, June 23
    • (2007)
  • 60
    • 71649092445 scopus 로고    scopus 로고
    • Cybersecurity: Beware of the Trojan Panda
    • September 8
    • Cybersecurity: Beware of the Trojan Panda. 2007b, September 8
    • (2007)
  • 61
    • 0344559509 scopus 로고    scopus 로고
    • The National Strategy to Secure Cyberspace
    • Washington, DC, The White House, February
    • The National Strategy to Secure Cyberspace. 2003, Washington, DC, The White House, February
    • (2003)
  • 62
    • 71649101100 scopus 로고    scopus 로고
    • A Cyberblockade in Estonia
    • June 2
    • A Cyberblockade in Estonia. 2007, June 2
    • (2007)
  • 63
    • 71649099835 scopus 로고    scopus 로고
    • Cyberwarfare Worries
    • June 2
    • Cyberwarfare Worries. 2007, June 2
    • (2007)
  • 64
    • 71649115582 scopus 로고    scopus 로고
    • Cyber Mobilization: A Growing Counterinsurgency Campaign
    • Thomas Timothy L. Cyber Mobilization: A Growing Counterinsurgency Campaign. IO Sphere 2006, Summer:23-28.
    • (2006) IO Sphere , vol.Summer , pp. 23-28
    • Thomas, T.L.1
  • 65
    • 36649032605 scopus 로고    scopus 로고
    • Russia Accused of Unleashing Cyberwar to Disable Estonia
    • May 17
    • Traynor Ian. Russia Accused of Unleashing Cyberwar to Disable Estonia. The Guardian 2007, May 17
    • (2007) The Guardian
    • Traynor, I.1
  • 66
    • 0001491868 scopus 로고
    • Securitization and Desecuritization
    • edited by, New York, Columbia University Press
    • Wæver Ole, Lipschutz Ronnie. Securitization and Desecuritization. On Security 1995, In, edited by, New York, Columbia University Press
    • (1995) On Security
    • Wæver, O.1    Lipschutz, R.2
  • 68
    • 84970680617 scopus 로고
    • Security, Sovereignty, and the Challenge of World Politics
    • Walker R B J. Security, Sovereignty, and the Challenge of World Politics. Alternatives 1990, 15(1):3-27.
    • (1990) Alternatives , vol.15 , Issue.1 , pp. 3-27
    • Walker R. B., J.1
  • 69
    • 33847755792 scopus 로고    scopus 로고
    • The Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory Useable Outside Europe?
    • Wilkinson Claire. The Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory Useable Outside Europe? Security Dialogue 2007, 38(1):5-25.
    • (2007) Security Dialogue , vol.38 , Issue.1 , pp. 5-25
    • Wilkinson, C.1
  • 71
    • 0348162309 scopus 로고    scopus 로고
    • Words, Images, Enemies: Securitization and International Politics
    • Williams Michael C. Words, Images, Enemies: Securitization and International Politics. International Studies Quarterly 2003, 47(4):511-529.
    • (2003) International Studies Quarterly , vol.47 , Issue.4 , pp. 511-529
    • Williams, M.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.