Cyber Security
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216208%3A11230%2F14%3A10281273" target="_blank" >RIV/00216208:11230/14:10281273 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Cyber Security
Original language description
The following chapter does not have an ambition to thoroughly explore all the cyber security-related topics. However, I chose a way to open the hottest topics from the national security perspective. All the parts do not have any deep conclusions, but should serve the reader as a guide for further reading. In each part I provide you with some further references that are the most discussed and cited papers in the academic debate. However, as cyber security is an explosive topic today, we can assume that considerable amount of articles are accidentally omitted. The current securitization wave of cyber threats as one of the most serious national security issue contributes to the production of a huge amount of literature, making the finding of a wisely compiled literature not an easy task. This is the reason why the articles mentioned in the following chapter are chosen from those that are the most debated ones. Cyber security as a topic for study should be divided into several branches. Development of tools used in cyberspace (software) falls into the technical branch that is the oldest one since the Arpanet, a predecessor to Internet, was developed in the end of 60s. Moreover people well educated in software development and the related ICT security are usually very pessimistic about drawing the scenarios of national security threat emanating from cyberspace. Another important aspect, or branch, is the policy makers that see any opportunity to exploit critical ICT as vulnerability and thus threat to national security. The third and last branch is devoted to lawyers and cyber crime investigators. This branch has had its unique path of development as plenty of activities that are illegal in the physical world are approached differently in cyberspace. Sharing of intellectual property as a general right of having a direct access to information is still discussed and definitely not satisfactorily resolved.
Czech name
—
Czech description
—
Classification
Type
C - Chapter in a specialist book
CEP classification
—
OECD FORD branch
50601 - Political science
Result continuities
Project
—
Continuities
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Others
Publication year
2014
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Book/collection name
Introduction to Security Studies
ISBN
978-80-971124-8-6
Number of pages of the result
21
Pages from-to
259-279
Number of pages of the book
334
Publisher name
CENAA
Place of publication
Bratislava
UT code for WoS chapter
—