Where computer security meets national security

Helen Nissenbaum

Research output: Contribution to journalArticle

Abstract

This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of "securitization," developed by the Copenhagen School of International Relations.

Original languageEnglish (US)
Pages (from-to)61-73
Number of pages13
JournalEthics and Information Technology
Volume7
Issue number2
DOIs
StatePublished - Jun 2005

Fingerprint

National security
Intellectual property
Security of data
national security
Computer science
intellectual property
computer science
international relations
vulnerability
engineering
evaluation
school

Keywords

  • Computer security
  • Cyber-security
  • Securitization

ASJC Scopus subject areas

  • Human-Computer Interaction

Cite this

Where computer security meets national security. / Nissenbaum, Helen.

In: Ethics and Information Technology, Vol. 7, No. 2, 06.2005, p. 61-73.

Research output: Contribution to journalArticle

Nissenbaum, Helen. / Where computer security meets national security. In: Ethics and Information Technology. 2005 ; Vol. 7, No. 2. pp. 61-73.
@article{7829e9b1e2c04ec7aeb4f70de4efc410,
title = "Where computer security meets national security",
abstract = "This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of {"}securitization,{"} developed by the Copenhagen School of International Relations.",
keywords = "Computer security, Cyber-security, Securitization",
author = "Helen Nissenbaum",
year = "2005",
month = "6",
doi = "10.1007/s10676-005-4582-3",
language = "English (US)",
volume = "7",
pages = "61--73",
journal = "Ethics and Information Technology",
issn = "1388-1957",
publisher = "Springer Netherlands",
number = "2",

}

TY - JOUR

T1 - Where computer security meets national security

AU - Nissenbaum, Helen

PY - 2005/6

Y1 - 2005/6

N2 - This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of "securitization," developed by the Copenhagen School of International Relations.

AB - This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of "securitization," developed by the Copenhagen School of International Relations.

KW - Computer security

KW - Cyber-security

KW - Securitization

UR - http://www.scopus.com/inward/record.url?scp=31144461818&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=31144461818&partnerID=8YFLogxK

U2 - 10.1007/s10676-005-4582-3

DO - 10.1007/s10676-005-4582-3

M3 - Article

VL - 7

SP - 61

EP - 73

JO - Ethics and Information Technology

JF - Ethics and Information Technology

SN - 1388-1957

IS - 2

ER -