All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216208%3A11230%2F14%3A10281273" target="_blank" >RIV/00216208:11230/14:10281273 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Cyber Security

  • Original language description

    The following chapter does not have an ambition to thoroughly explore all the cyber security-related topics. However, I chose a way to open the hottest topics from the national security perspective. All the parts do not have any deep conclusions, but should serve the reader as a guide for further reading. In each part I provide you with some further references that are the most discussed and cited papers in the academic debate. However, as cyber security is an explosive topic today, we can assume that considerable amount of articles are accidentally omitted. The current securitization wave of cyber threats as one of the most serious national security issue contributes to the production of a huge amount of literature, making the finding of a wisely compiled literature not an easy task. This is the reason why the articles mentioned in the following chapter are chosen from those that are the most debated ones. Cyber security as a topic for study should be divided into several branches. Development of tools used in cyberspace (software) falls into the technical branch that is the oldest one since the Arpanet, a predecessor to Internet, was developed in the end of 60s. Moreover people well educated in software development and the related ICT security are usually very pessimistic about drawing the scenarios of national security threat emanating from cyberspace. Another important aspect, or branch, is the policy makers that see any opportunity to exploit critical ICT as vulnerability and thus threat to national security. The third and last branch is devoted to lawyers and cyber crime investigators. This branch has had its unique path of development as plenty of activities that are illegal in the physical world are approached differently in cyberspace. Sharing of intellectual property as a general right of having a direct access to information is still discussed and definitely not satisfactorily resolved.

  • Czech name

  • Czech description

Classification

  • Type

    C - Chapter in a specialist book

  • CEP classification

  • OECD FORD branch

    50601 - Political science

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Book/collection name

    Introduction to Security Studies

  • ISBN

    978-80-971124-8-6

  • Number of pages of the result

    21

  • Pages from-to

    259-279

  • Number of pages of the book

    334

  • Publisher name

    CENAA

  • Place of publication

    Bratislava

  • UT code for WoS chapter