메뉴 건너뛰기




Volumn 9, Issue 3, 2004, Pages

The tensions of securing cyberspace: The Internet, State power and the national strategy to secure cyberspace

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84867292753     PISSN: 13960466     EISSN: None     Source Type: Journal    
DOI: 10.5210/fm.v9i3.1125     Document Type: Article
Times cited : (4)

References (28)
  • 1
    • 0037772982 scopus 로고    scopus 로고
    • Cyberwar is Coming!
    • Gerfried Stocker and Christine Schöpf (editors). New York: Springer-Verlag
    • John Arquilla and David Ronfeldt, 1998. "Cyberwar is Coming!" In: Gerfried Stocker and Christine Schöpf (editors). InfoWar. New York: Springer-Verlag, pp. 24-50.
    • (1998) InfoWar , pp. 24-50
    • Arquilla, J.1    Ronfeldt, D.2
  • 2
    • 84869169864 scopus 로고
    • How Anarchy Works
    • (October) accessed 4 April 2003
    • Paulina Borsook, 1995. "How Anarchy Works," Wired, volume 3, issue 10 (October), at http://www.wired.com/wired/archive/3.10/ietf.html, accessed 4 April 2003.
    • (1995) Wired , vol.3 , Issue.10
    • Borsook, P.1
  • 6
    • 0344559509 scopus 로고    scopus 로고
    • Department of Homeland Security
    • Department of Homeland Security, 2003. The National Strategy to Secure Cyberspace, at http://www.whitehouse.gov/pcipb/.
    • (2003) The National Strategy to Secure Cyberspace
  • 7
    • 71649112640 scopus 로고    scopus 로고
    • Circuits of Power: Security in the Internet Environment
    • Albany, N.Y.: State University of New York Press James Rosenau and J.P. Singh (editors)
    • Ronald Deibert, 2002a. "Circuits of Power: Security in the Internet Environment" In: James Rosenau and J.P. Singh (editors). Information Technologies and Global Politics: The Changing Scope of Power and Governance. Albany, N.Y.: State University of New York Press, pp. 115-142.
    • (2002) Information Technologies and Global Politics: The Changing Scope of Power and Governance , pp. 115-142
    • Deibert, R.1
  • 8
    • 0036206155 scopus 로고    scopus 로고
    • Dark Guests and Great Firewalls: The Internet and Chinese Security Policy
    • Ronald Deibert, 2002b. "Dark Guests and Great Firewalls: The Internet and Chinese Security Policy," Journal of Social Issues, volume 58, number 1, pp. 143-159.
    • (2002) Journal of Social Issues , vol.58 , Issue.1 , pp. 143-159
    • Deibert, R.1
  • 9
    • 0000327879 scopus 로고
    • Postscripts on Control Societies
    • Translated by Martin Joughin. New York: Columbia University Press Gilles Deleuze
    • Gilles Deleuze, 1990. "Postscripts on Control Societies," In: Gilles Deleuze. Negotiations: 1972-1990. Translated by Martin Joughin. New York: Columbia University Press, pp. 177-182.
    • (1990) Negotiations: 1972-1990 , pp. 177-182
    • Deleuze, G.1
  • 10
  • 11
    • 84869169867 scopus 로고    scopus 로고
    • Cyber Plan's Future Bleak
    • (24 February), accessed 26 April 2003
    • Dennis Fisher, 2003. "Cyber Plan's Future Bleak," eWeek (24 February), at http://www.eweek.com/print_article/0,3668,a=37497,00.asp, accessed 26 April 2003.
    • (2003) eWeek
    • Fisher, D.1
  • 12
    • 84869175118 scopus 로고    scopus 로고
    • Homeland Cybersecurity Efforts Doubted
    • (11 March), accessed 15 March 2003
    • Michael Fitzgerald, 2003. "Homeland Cybersecurity Efforts Doubted," SecurityFocus Online (11 March), at http://www.securityfocus.com/news/3043, accessed 15 March 2003.
    • (2003) SecurityFocus Online
    • Fitzgerald, M.1
  • 13
    • 84869155635 scopus 로고    scopus 로고
    • America's National Cybersecurity Strategy: Same Stuff, Different Administration
    • accessed 23 April 2003
    • Richard Forno, 2002. "America's National Cybersecurity Strategy: Same Stuff, Different Administration," Infowarrior.org, http://www.infowarrior.org/articles/2002-11.html, accessed 23 April 2003.
    • (2002) Infowarrior.org
    • Forno, R.1
  • 16
    • 0008484044 scopus 로고    scopus 로고
    • The Internet and State Control in Authoritarian Regimes: China, Cuba, and the Counterrevolution
    • Shanthi Kalathil and Taylor Boas, 2001. "The Internet and State Control in Authoritarian Regimes: China, Cuba, and the Counterrevolution," Carnegie Endowment, Information and World Politics Project, at http://www.ceip.org/files/Publications/wp21.asp.
    • (2001) Carnegie Endowment, Information and World Politics Project
    • Kalathil, S.1    Boas, T.2
  • 17
    • 84869164289 scopus 로고    scopus 로고
    • White House Releases Cybersecurity Plan
    • (14 February), accessed 15 March 2003
    • Brian Krebs, 2003. "White House Releases Cybersecurity Plan," WashingtonPost.com (14 February), at http://www.washingtonpost.com/ac2/wp-dyn/A7970-2003Feb14?language=printer, accessed 15 March 2003.
    • (2003) WashingtonPost.com
    • Krebs, B.1
  • 18
    • 84869200451 scopus 로고    scopus 로고
    • Cyber-Security Strategy Depends on Power of Suggestion
    • (15 February)
    • Jonathan Krim, 2003. "Cyber-Security Strategy Depends on Power of Suggestion," Washington Post (15 February), p. E1.
    • (2003) Washington Post
    • Krim, J.1
  • 19
    • 27444443777 scopus 로고    scopus 로고
    • Cybersecurity Plan Lacks Muscle
    • (19 September), accessed 23 April 2003
    • Robert Lemos and Declan McCullagh, 2002. "Cybersecurity Plan Lacks Muscle," CNET News.com (19 September), at http://news.com.com/2100-1023-958545.html, accessed 23 April 2003.
    • (2002) CNET News.com
    • Lemos, R.1    McCullagh, D.2
  • 21
    • 84869198386 scopus 로고    scopus 로고
    • Large-Scale Attack Cripples Internet Backbone
    • (23 October)
    • David McGuire and Brian Krebs, 2002. "Large-Scale Attack Cripples Internet Backbone," Washington Post (23 October), p. E5.
    • (2002) Washington Post
    • McGuire, D.1    Krebs, B.2
  • 22
    • 84869175121 scopus 로고    scopus 로고
    • Request for Comments: 1958 Architectural Principles of the Internet
    • (editor) Network Working Group
    • Network Working Group, 1996a. "Request for Comments: 1958, Architectural Principles of the Internet," Brian Carpenter (editor), at http://ietf.org/rfc/rfc1958.txt.
    • (1996) Brian Carpenter
  • 23
    • 84869175120 scopus 로고    scopus 로고
    • Request for Comments: 2026
    • S. Bradner (editor) Network Working Group
    • Network Working Group, 1996b. "Request for Comments: 2026: The Internet Standards Process - Revision 3," S. Bradner (editor), at http://ietf.org/rfc/rfc2026.txt
    • (1996) The Internet Standards Process - Revision 3
  • 24
    • 84869155637 scopus 로고    scopus 로고
    • The Tao of IETF-A Novice's Guide to the Internet Engineering Task Force
    • S. Harris (editor) Network Working Group
    • Network Working Group, 2001. "Request for Comments: 3160: The Tao of IETF-A Novice's Guide to the Internet Engineering Task Force," S. Harris (editor), at http://ietf.org/rfc/rfc3160.txt
    • (2001) Request for Comments: 3160
  • 25
    • 84869155638 scopus 로고    scopus 로고
    • End-to-End Arguments in System Design
    • Jerome Saltzer, David Reed and David Clark, 1997. "End-to-End Arguments in System Design," at http://web.mit.edu/Saltzer/www/publications/.
    • (1997)
    • Saltzer, J.1    Reed, D.2    Clark, D.3
  • 26
    • 0344523548 scopus 로고
    • The Protocols
    • Reading, Mass.: Addison-Wesley
    • W. Richard Stevens, 1994. "The Protocols," TCP/IP Illustrated. Volume 1. Reading, Mass.: Addison-Wesley, pp. 1-20.
    • (1994) TCP/IP Illustrated , vol.1 , pp. 1-20
    • Stevens, W.R.1
  • 28
    • 34548836707 scopus 로고    scopus 로고
    • Information Warfare
    • Gerfried Stocker and Christine Schöpf (editors). New York: Springer-Verlag
    • Shen Weiguang, 1998. "Information Warfare," In: Gerfried Stocker and Christine Schöpf (editors). InfoWar. New York: Springer-Verlag, pp. 60-83.
    • (1998) InfoWar , pp. 60-83
    • Weiguang, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.