메뉴 건너뛰기




Volumn 4, Issue 1, 2010, Pages 15-32

Risking security: Policies and paradoxes of cyberspace security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77951146558     PISSN: 17495679     EISSN: 17495687     Source Type: Journal    
DOI: 10.1111/j.1749-5687.2009.00088.x     Document Type: Article
Times cited : (105)

References (49)
  • 3
    • 12344293756 scopus 로고    scopus 로고
    • Is There Such a Thing as Virtual Crime?
    • Brenner Susan W. Is There Such a Thing as Virtual Crime? California Criminal Law Review 2001, 4(1):105-111.
    • (2001) California Criminal Law Review , vol.4 , Issue.1 , pp. 105-111
    • Brenner, S.W.1
  • 6
    • 56749151378 scopus 로고    scopus 로고
    • Webtapping: Securing the Internet to Save Us from Transnational Terror?
    • Bronk Christopher. Webtapping: Securing the Internet to Save Us from Transnational Terror? First Monday 2008, 13(11).
    • (2008) First Monday , vol.13 , Issue.11
    • Bronk, C.1
  • 9
    • 77951158711 scopus 로고    scopus 로고
    • Good for Liberty, Bad for Security? Global Civil Society and the Securitization of the Internet
    • Deibert RJ, Palfrey J, Rohozinski R, Zittrain J. In, edited by, Cambridge, MA, MIT Press
    • Deibert Ronald J, Rohozinski Rafal. Good for Liberty, Bad for Security? Global Civil Society and the Securitization of the Internet. Access Denied: The Practice and Policy of Global Internet Filtering 2008, Deibert Ronald J, Palfrey JohnRohozinski RafalZittrain Jonathan. In, edited by, Cambridge, MA, MIT Press
    • (2008) Access Denied: The Practice and Policy of Global Internet Filtering
    • Deibert, R.J.1    Rohozinski, R.2
  • 12
    • 0034204649 scopus 로고    scopus 로고
    • Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy
    • Denning Dorothy E. Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. Computer Security Journal 2000, 16(3):15-35.
    • (2000) Computer Security Journal , vol.16 , Issue.3 , pp. 15-35
    • Denning, D.E.1
  • 13
    • 4644372122 scopus 로고    scopus 로고
    • The Question of Information Technology in International Relations
    • Der Derian James. The Question of Information Technology in International Relations. Millennium: Journal of International Studies 2003, 32(3):441-456.
    • (2003) Millennium: Journal of International Studies , vol.32 , Issue.3 , pp. 441-456
    • Der Derian, J.1
  • 15
    • 60949086554 scopus 로고    scopus 로고
    • The Emerging Internet Governance Mosaic: Connecting the Pieces
    • Dutton William H, Peltu Malcom. The Emerging Internet Governance Mosaic: Connecting the Pieces. Information Polity 2007, 12(1-2):63-81.
    • (2007) Information Polity , vol.12 , Issue.1-2 , pp. 63-81
    • Dutton, W.H.1    Peltu, M.2
  • 16
    • 0002930264 scopus 로고    scopus 로고
    • The Internet as a Source of Regulatory Arbitrage
    • Kahin B, Nesson C. In, edited by, Cambridge, MA, MIT Press
    • Froomkin Michael. The Internet as a Source of Regulatory Arbitrage. Borders in Cyberspace 1997, Kahin BrianNesson Charles. In, edited by, Cambridge, MA, MIT Press
    • (1997) Borders in Cyberspace
    • Froomkin, M.1
  • 17
    • 0003954001 scopus 로고
    • New York, Ace Books
    • Gibson William. Neuromancer 1984, New York, Ace Books
    • (1984) Neuromancer
    • Gibson, W.1
  • 20
    • 77951146710 scopus 로고    scopus 로고
    • Creating Conventions: Technology Policy and International Cooperation in Criminal Matters
    • Drake WJ, Wilson EJ. In, edited by, Cambridge, MA, MIT Press
    • Hosein Ian. Creating Conventions: Technology Policy and International Cooperation in Criminal Matters. Governing Global Electronic Networks 2008, Drake William JWilson Ernest J. In, edited by, Cambridge, MA, MIT Press
    • (2008) Governing Global Electronic Networks
    • Hosein, I.1
  • 21
    • 77950880711 scopus 로고    scopus 로고
    • Tracking Ghostnet: Investigating a Cyber Espionage Network
    • Available at (Accessed October 29, 2009)
    • Tracking Ghostnet: Investigating a Cyber Espionage Network. 2009, http://www.scribd.com/doc/13731776/Tracking-GhostNet-Investigating-a-Cyber-Espionage-Network, Available at (Accessed October 29, 2009)
    • (2009)
  • 22
    • 70349727017 scopus 로고    scopus 로고
    • ITU Global Cybersecurity Agenda (CGA) High-Level Experts Group (HLEG) Global Strategic Report
    • International Telecommunications Union. Available at (Accessed: January 3, 2010)
    • ITU Global Cybersecurity Agenda (CGA) High-Level Experts Group (HLEG) Global Strategic Report. 2008, http://www.itu.int/cybersecurity/gca, International Telecommunications Union. Available at (Accessed: January 3, 2010)
    • (2008)
  • 24
    • 44949208439 scopus 로고    scopus 로고
    • Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare
    • Kelsey Jeffrey TG. Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare. Michigan Law Review 2008, 106(7):1428-1450.
    • (2008) Michigan Law Review , vol.106 , Issue.7 , pp. 1428-1450
    • Kelsey, J.T.1
  • 25
    • 70350083640 scopus 로고    scopus 로고
    • Washington, DC, Radio Free Europe, Available at (Accessed October 28, 2009)
    • Kimmage Daniel. The Al-Qaeda Media Nexus 2008, http://docs.rferl.org/en-US/AQ_Media_Nexus.pdf, Washington, DC, Radio Free Europe, Available at (Accessed October 28, 2009)
    • (2008) The Al-Qaeda Media Nexus
    • Kimmage, D.1
  • 26
    • 39749161443 scopus 로고    scopus 로고
    • History of the Internet and Its Flexible Future
    • Kleinrock Leonard. History of the Internet and Its Flexible Future. IEE Wireless Communications 2008, 15(1):8-18.
    • (2008) IEE Wireless Communications , vol.15 , Issue.1 , pp. 8-18
    • Kleinrock, L.1
  • 29
    • 84894845239 scopus 로고    scopus 로고
    • Protecting Privacy and Expression Online: Can the Global Network Initiative Embrace the Character of the Net?
    • Deibert RJ, Palfrey JG, Rohozinski R, Zittrain J. In, edited by, Cambridge, MA, MIT Press
    • Maclay Colin. Protecting Privacy and Expression Online: Can the Global Network Initiative Embrace the Character of the Net? Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace 2010, Deibert Ronald JPalfrey John GRohozinski RafalZittrain Jonathan. In, edited by, Cambridge, MA, MIT Press
    • (2010) Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
    • Maclay, C.1
  • 30
    • 77951176410 scopus 로고    scopus 로고
    • U.N. Agency Eyes Curbs on Internet Anonymity
    • Available at (Accessed October 28, 2009)
    • McCullagh Declan. U.N. Agency Eyes Curbs on Internet Anonymity. CNET 2008, http://news.cnet.com/8301-13578_3-10040152-38.html, Available at (Accessed October 28, 2009)
    • (2008) CNET
    • McCullagh, D.1
  • 32
    • 0005639764 scopus 로고    scopus 로고
    • Contested Space: The Internet and Global Civil Society
    • Anheier H, Glasius M, Kaldor M. In, edited by, London, Sage
    • Naughton John. Contested Space: The Internet and Global Civil Society. Global Civil Society 2001, Anheier HelmutGlasius MarliesKaldor Mary. In, edited by, London, Sage
    • (2001) Global Civil Society
    • Naughton, J.1
  • 33
    • 77951173029 scopus 로고    scopus 로고
    • 2008 Special 301 Report
    • Available at (Accessed October 28, 2009)
    • 2008 Special 301 Report. 2008, http://www.ustr.gov/assets/Document_Library/Reports_publications/2008/2008_Special_301_Report/asset_upload_file553_14869.pdf, Available at (Accessed October 28, 2009)
    • (2008)
  • 34
    • 77951185797 scopus 로고    scopus 로고
    • The 33 Day War: An Example of Psychological Warfare in the Information Age
    • Pahlavi Pierre. The 33 Day War: An Example of Psychological Warfare in the Information Age. Canadian Army Journal 2007, 10(1):12-24.
    • (2007) Canadian Army Journal , vol.10 , Issue.1 , pp. 12-24
    • Pahlavi, P.1
  • 37
    • 34547603887 scopus 로고    scopus 로고
    • Toward a Theory of Securitization: Copenhagen and Beyond
    • Stritzel Holger. Toward a Theory of Securitization: Copenhagen and Beyond. European Journal of International Studies 2007, 13(3):357-383.
    • (2007) European Journal of International Studies , vol.13 , Issue.3 , pp. 357-383
    • Stritzel, H.1
  • 38
    • 77951165238 scopus 로고    scopus 로고
    • The National Military Strategy for Cyberspace Operations
    • Available at (Accessed October 28, 2009)
    • The National Military Strategy for Cyberspace Operations. 2006, http://www.dod.mil/pubs/foi/ojcs/07-F-2105doc1.pdf, Available at (Accessed October 28, 2009)
    • (2006)
  • 39
    • 33645760451 scopus 로고    scopus 로고
    • The Filtering Matrix: Integrated Mechanisms of Information Control and the Demarcation of Borders in Cyberspace
    • Available at (Accessed October 28, 2009)
    • Villeneuve Nart. The Filtering Matrix: Integrated Mechanisms of Information Control and the Demarcation of Borders in Cyberspace. First Monday 2006, 11(1-2). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1307/122, Available at (Accessed October 28, 2009)
    • (2006) First Monday , vol.11 , Issue.1-2
    • Villeneuve, N.1
  • 40
    • 77955895888 scopus 로고    scopus 로고
    • Breaching Trust: An Analysis of Surveillance and Security Practices on China's TOM-Skype Platform. Information Warfare Monitor/ONI-Asia
    • Available at (Accessed October 28, 2009)
    • Villeneuve Nart. Breaching Trust: An Analysis of Surveillance and Security Practices on China's TOM-Skype Platform. Information Warfare Monitor/ONI-Asia. 2009, http://www.nartv.org/mirror/breachingtrust.pdf, Available at (Accessed October 28, 2009)
    • (2009)
    • Villeneuve, N.1
  • 41
    • 84881971939 scopus 로고    scopus 로고
    • Barriers to Cooperation: An Analysis of the Origins of International Efforts to Protect Children Online
    • Deibert RJ, Palfrey J, Rohozinski R, Zittrain J. In, edited by, Cambridge, MA, MIT Press
    • Villeneuve Nart. Barriers to Cooperation: An Analysis of the Origins of International Efforts to Protect Children Online. Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace 2010, Deibert Ronald JPalfrey JohnRohozinski RafalZittrain Jonathan. In, edited by, Cambridge, MA, MIT Press
    • (2010) Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
    • Villeneuve, N.1
  • 42
    • 24144442711 scopus 로고    scopus 로고
    • Digital Realism and the Governance of Spam as Cybercrime
    • Wall David S. Digital Realism and the Governance of Spam as Cybercrime. European Journal on Criminal Policy and Research 2005, 10(4):309-335.
    • (2005) European Journal on Criminal Policy and Research , vol.10 , Issue.4 , pp. 309-335
    • Wall, D.S.1
  • 43
    • 77951201601 scopus 로고    scopus 로고
    • Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace
    • Wall David S. Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace. Police Practice & Research 2007, 8(2):183-205.
    • (2007) Police Practice & Research , vol.8 , Issue.2 , pp. 183-205
    • Wall, D.S.1
  • 44
    • 0036012124 scopus 로고    scopus 로고
    • The Rise of Competitive Authoritarianism
    • Way Lucan, Levitzsky Steven. The Rise of Competitive Authoritarianism. Journal of Democracy 2002, 13(2):51-65.
    • (2002) Journal of Democracy , vol.13 , Issue.2 , pp. 51-65
    • Way, L.1    Levitzsky, S.2
  • 45
    • 77951166479 scopus 로고    scopus 로고
    • The Council of Europe's Convention on Cybercrime
    • Weber Amalie M. The Council of Europe's Convention on Cybercrime. Berkeley Technology Law Journal 2003, 18(1):425-446.
    • (2003) Berkeley Technology Law Journal , vol.18 , Issue.1 , pp. 425-446
    • Weber, A.M.1
  • 46
    • 84937385682 scopus 로고    scopus 로고
    • A Clash of Wills: Hizballah's Psychological Campaign Against Israel in South Lebanon
    • Wehrey Fredrick M. A Clash of Wills: Hizballah's Psychological Campaign Against Israel in South Lebanon. Small Wars and Insurgencies 2002, 12(3):53-74.
    • (2002) Small Wars and Insurgencies , vol.12 , Issue.3 , pp. 53-74
    • Wehrey, F.M.1
  • 47
    • 33747686518 scopus 로고    scopus 로고
    • Virtual Disputes: The Use of the Internet for Terrorist Debates
    • Weimann Gabriel. Virtual Disputes: The Use of the Internet for Terrorist Debates. Studies in Conflict and Terrorism 2006a, 29(7):623-639.
    • (2006) Studies in Conflict and Terrorism , vol.29 , Issue.7 , pp. 623-639
    • Weimann, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.