All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Critical Comments on Current Research Agenda in Cyber Security

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216208%3A11230%2F14%3A10279714" target="_blank" >RIV/00216208:11230/14:10279714 - isvavai.cz</a>

  • Result on the web

    <a href="http://www.defenceandstrategy.eu/cs/aktualni-cislo-1-2014/clanky/critical-comments-on-current-research-agenda-in-cyber-security.html#.VEUERZOUfbk" target="_blank" >http://www.defenceandstrategy.eu/cs/aktualni-cislo-1-2014/clanky/critical-comments-on-current-research-agenda-in-cyber-security.html#.VEUERZOUfbk</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.3849/1802-7199.14.2014.01.029-038" target="_blank" >10.3849/1802-7199.14.2014.01.029-038</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Critical Comments on Current Research Agenda in Cyber Security

  • Original language description

    The following article presents an alternative critical perspective of the cyber security research agenda. The article opens with criticism of the securitization discourse that uses analogies of historical events with events in cyber space. The author argues that such an approach is inappropriate, and that events of such impact are very unlikely to take place. The events that have already shaped our way of thinking - such as the Estonian attacks - caused significant damage to the respective country; nevertheless, the very same attack today would not do the same harm, thanks to the different level of critical infrastructure in Estonia. Another example, Stuxnet, is also an event of high impact, but with alow probability of happening in the future. Due tothe complexity of the supporting operation of the attack, it would not lead to a cyber world war. The future will bring more complex, less visible, completely covered and precise operations that will take advantage of all cyber space feat

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    AD - Political sciences

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Obrana a strategie

  • ISSN

    1214-6463

  • e-ISSN

  • Volume of the periodical

    14

  • Issue of the periodical within the volume

    1

  • Country of publishing house

    CZ - CZECH REPUBLIC

  • Number of pages

    10

  • Pages from-to

    29-38

  • UT code for WoS article

  • EID of the result in the Scopus database