Redefining Cybersecurity through Processual Ontology of the Cyberspace

Authors

  • Robert Siudak Jagiellonian University

DOI:

https://doi.org/10.12797/Politeja.14.2017.50.09

Keywords:

cyberspace, security, ICT, resilience

Abstract

The way cyberspace is conceptualized in security discourses shapes strategies, tools and possible solutions developed within the ICT security debate. Putting forward processual ontology of cyberspace helps in apprehending the unique dynamics of this new domain arising from the intersection of ICT with social and political phenomena. Cyberspace is presented as a process of data transmission and information cognition/processing in the digital domain. It contains time as an inherent dimension and includes all subjects and objects of this process: data (codes, packets, files, texts), information (structured or operationalized data), human and computer agents (people, software) and communication environment (hardware, protocols). Processual ontology is based on the fact that ICT is a man-made realm with almost unlimited potential to expand, where physical distance is lapsed and bits are the primary matter. This theoretical stance blurs the line between human and non-human agents, dehumanizing the idea of actorness by categorizing both humans and computers as actors. Finally, processual ontology of cyberspace promotes resilience strategies both in the private sector as well as on national and international level.

Downloads

Download data is not yet available.

Author Biography

  • Robert Siudak, Jagiellonian University

    PhD candidate at the Department of National Security of the Jagiellonian University. Author of two monographies and numerous articles regarding the intersection of new technologies and international security. Research Fellow at the Kosciuszko Institute, Cybersechub.eu Manager and Chief Editor of the European Cybersecurity Market journal. Studied previously at the Jagiellonian University, Tel-Aviv University and Trinity College Dublin.

References

Abomhara M., Køien G.M., “Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks”, Journal of Cyber Security and Mobility, vol. 4 (2015), at <http://dx.doi.org/10.13052/jcsm2245-1439.414>. DOI: https://doi.org/10.13052/jcsm2245-1439.414

Arquilla J., Ronfeldt D., The Emergence of Noopolitik. Toward an American Information Strategy, Santa Monica 1999. DOI: https://doi.org/10.7249/MR1033

Barlow J.P., “A Declaration of the Independence of Cyberspace”, The Electronic Frontier Foundation, 1996, at <http://www.eff.org/pl/cyberspace-independence>.

Barnard-Wills D., Ashenden D., “Securing Virtual Space: Cyber War, Cyber Terror, and Risk”, Space and Culture, vol. 15, no. 2 (2012), at <https://doi.org/10.1177/1206331211430016>. DOI: https://doi.org/10.1177/1206331211430016

Bay M., “What Is Cybersecurity? In Search of an Encompassing Definition for the Post-Snowden Era”, French Journal for Media Research, vol. 6 (2016).

Bendrath R., “The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection”, Information & Security: An International Journal, vol. 7 (2001), at <http://dx.doi.org/10.11610/isij.0705>. DOI: https://doi.org/10.11610/isij.0705

Benedikt M., “Cyberspace: Some Proposals”, in M. Benedikt (ed.), In Cyberspace. First Steps, Cambridge, Mass. 1994.

Betz D.J., Stevens T., “Analogical Reasoning and Cyber Security”, Security Dialogue, vol. 44, no. 2 (2013), at <https://doi.org/10.1177/0967010613478323>. DOI: https://doi.org/10.1177/0967010613478323

Brito J., Watkins T., “Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy”, Harvard National Security Journal, vol. 3, no. 1 (2011).

Brown G., “Spying and Fighting in Cyberspace: What Is Which?”, Journal of National Security Law & Policy, vol. 8 (2016).

Bryant R., “What Kind of Space Is Cyberspace?”, Minerva, vol. 5 (2001).

Buchanan B., The Cybersecurity Dilemma: Hacking, Trust and Fear between Nations, Oxford–New York 2017. DOI: https://doi.org/10.1093/acprof:oso/9780190665012.001.0001

Castells M., The Information Age. Economy, Society, and Culture, vol. 1: The Rise of the Network Society, Oxford 2010.

Cavelty M.D., “From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse”, International Studies Review, vol. 13, no. 1 (2013), at <http://dx.doi.org/10.111/misr.12023>.

Clark D., “Characterizing Cyberspace: Past, Present, and Future”, ECIR Working Paper, 2010, at <https://projects.csail.mit.edu/ecir/wiki/images/7/77/Clark_Characterizing_cyberspace_1-2r.pdf>.

Craig A.N., Shackelford S.J., Hiller J.S., “Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis”, American Business Law Journal, vol. 52, no. 4 (2015), at <http://dx.doi.org/10.1111/ablj.12055>. DOI: https://doi.org/10.1111/ablj.12055

Darczewska J., Anatomia rosyjskiej wojny informacyjnej. Operacja krymska – studium przypadku, at <https://www.osw.waw.pl/sites/default/files/anatomia_rosyjskiej_wojny_informacyjnej.pdf>.

Darczewska J., Diabeł tkwi w szczegółach. Wojna informacyjna w świetle doktryny wojennej Rosji, at <https://www.osw.waw.pl/sites/default/files/pw_50_pl_diabel_tkwi_net.pdf>.

Darczewska J., Rosyjskie siły zbrojne na froncie walki informacyjnej. Dokumenty strategiczne, at <https://www.osw.waw.pl/sites/default/files/prace_57_pl_sily_zbrojne_net.pdf>.

Deibert R.J., “Circuits of Power: Security in the Internet Environment”, in J. Rosenau, J.P. Singh (eds.), Information Technologies and Global Politics. The Changing Scope of Power and Governance, Albany 2002.

Department of Homeland Security and Federal Bureau of Investigation, GRIZZLY STEPPE – Russian Malicious Cyber Activity, 2016, at <https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY STEPPE-2016-1229.pdf>.

Dolins F.L., Mitchell R.W., Spatial Cognition, Spatial Perception. Mapping the Self and Space, New York 2010.

Einstein A., Relativity. The Special and the General Theory, Oxford 2015. DOI: https://doi.org/10.2307/j.ctv7h0s4k

Eriksson J., Giacomello G., “Who Controls the Internet? Beyond the Obstinacy or Obsolescence of the State”, International Studies Review, vol. 11, no. 1 (2009), at <http://dx.doi.org/10.1111/j.1468-2486.2008.01841.x>. DOI: https://doi.org/10.1111/j.1468-2486.2008.01841.x

Estonian Ministry of Economic Affairs and Communication, Cyber Security Strategy for 2014-2017, Tallin 2014, at <https://www.mkm.ee/sites/default/files/cyber_security_strategy_2014-2017_public_version.pdf>.

Frischmann B.M., “The Prospect of Reconciling Internet and Cyberspace”, Loyola University Chicago Law Journal, vol. 35, no. 1 (2003).

Gibson W., Neuromancer, New York 1995.

Goldsmith J.L., “Regulation of the Internet: Three Persistent Fallacies”, Chicago-Kent Law Review, vol. 73, no. 4 (1998).

Gunkel D.J., Gunkel A.H., “Virtual Geographies: The New Worlds of Cyberspace”, Critical Studies in Mass Communication, vol. 14, no. 2 (1997), at <https://doi.org/10.1080/15295039709367003>. DOI: https://doi.org/10.1080/15295039709367003

Herzog S., “Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses”, Journal of Strategic Security, vol. 4, no. 2 (2011), at <http://dx.doi.org/10.5038/1944-0472.4.2.3>. DOI: https://doi.org/10.5038/1944-0472.4.2.3

Kellerman A., “Cyberspace Classification and Cognition: Information and Communications Cyberspaces”, Journal of Urban Technology, vol. 14, no. 3 (2007), at <https://doi.org/10.1080/10630730801923110>. DOI: https://doi.org/10.1080/10630730801923110

Koepsell D.R., The Ontology of Cyberspace. Philosophy, Law, and the Future of Intellectual Property, Chicago 2003.

Krebs B., “Who Is Anna-Senpai, the Mirai Worm Author?”, Krebs on Security, 18 January 2017, at <https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/>.

Kritzinger E., Solms S.H. von, “Cyber Security for Home Users: A New Way of Protection through Awareness Enforcement”, Computers & Security, vol. 29, no. 8 (2010), at <http://dx.doi.org/10.1016/j.cose.2010.08.001>. DOI: https://doi.org/10.1016/j.cose.2010.08.001

Kukla A., Social Constructivism and the Philosophy of Science, London–New York 2000.

Lakoff G., Johnson M., Metaphors We Live by, Chicago 2003. DOI: https://doi.org/10.7208/chicago/9780226470993.001.0001

Lawson S., “Putting The ‘War’ in Cyberwar: Metaphor, Analogy, and Cybersecurity Discourse in the United States”, First Monday, vol. 17, no. 7 (2012), at <http://dx.doi.org/10.5210/fm.v17i7.3848>. DOI: https://doi.org/10.5210/fm.v17i7.3848

Lessing L., Code and Other Laws of Cyberspace. Version 2.0, New York 2006.

Libicki M.C., Conquest in Cyberspace. National Security and Information Warfare, New York 2007. DOI: https://doi.org/10.1017/CBO9780511804250

Lorents P., Ottis R., Rikk R., “Cyber Society and Cooperative Cyber Defence”, in N. Aykin (ed.), Internationalization, Design and Global Development. Third International Conference, IDGD 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Berlin 2009, at <https://doi.org/10.1007/978-3-642-02767-3_20>. DOI: https://doi.org/10.1007/978-3-642-02767-3_20

Negroponte N., Being Digital, New York 1995.

Neumann I.B., “Returning Practice to the Linguistic Turn: The Case of Diplomacy”, Millennium, vol. 31, no. 3 (2002), at <https://doi.org/10.1177/03058298020310031201>. DOI: https://doi.org/10.1177/03058298020310031201

Nye J., “Cyber Power”, Harvard Kennedy School Belfer Center for Science and International Affairs, May 2010, at <https://www.belfercenter.org/sites/default/files/legacy/files/cyber-power.pdf>.

Office of the Director of National Intelligence, Assessing Russian Activities and Intentions in Recent US Elections, 2017, at <http://www.dni.gov/files/documents/ICA_2017_01.pdf>.

Ottis R., Lorents P., “Cyberspace: Definition and Implications”, NATO Cooperative Cyber Defence Centre of Excellence, at <https://ccdcoe.org/multimedia/cyberspace-definition-and-implications.html>.

Penny S., “Virtual Reality as the Completion of the Enlightenment Project”, in G. Bender, T. Druckrey (eds.), Cultures on the Brink. Ideologies of Technology, Seattle 1994.

Quigley K., Burns C., Stallard K., “‘Cyber Gurus’: A Rhetorical Analysis of the Language of Cybersecurity Specialists and the Implications for Security Policy and Critical Infrastructure Protection”, Government Information Quarterly, vol. 32, no. 2 (2015), at <https://doi.org/10.1016/j.giq.2015.02.001>. DOI: https://doi.org/10.1016/j.giq.2015.02.001

Reidenberg J.R., “Lex Informatica: The Formulation of Information Policy Rules through Technology”, Texas Law Review, vol. 76, no. 3 (1998).

Sapir E., Language. An Introduction to the Study of Speech, New York 1921.

Shaw W., Cybersecurity for SCADA Systems, Tulsa 2006.

Solms R. von, Niekerk J. van, “From Information Security to Cyber Security”, Computers and Security, vol. 38 (2013), at <https://doi.org/10.1016/j.cose.2013.04.004>. DOI: https://doi.org/10.1016/j.cose.2013.04.004

“Some Perspectives on Cybersecurity: 2012”, Internet Society, 2012, at <https://www.internetsociety.org/sites/default/files/bp-deconstructing-cybersecurity-16nov-update.pdf>.

Stone A.R., The War of Desire and Technology at the Close of the Mechanical Age, Cambridge, Mass. 1996.

Strate L., “The Varieties of Cyberspace: Problems in Definition and Delimitation”, Western Journal of Communication, vol. 63, no. 3 (1999), at <https://doi.org/10.1080/10570319909374648>. DOI: https://doi.org/10.1080/10570319909374648

Downloads

Published

15-09-2017

How to Cite

“Redefining Cybersecurity through Processual Ontology of the Cyberspace”. 2017. Politeja 14 (5 (50): 193-211. https://doi.org/10.12797/Politeja.14.2017.50.09.

Similar Articles

1-10 of 214

You may also start an advanced similarity search for this article.