Search results
21 – 30 of over 5000Cheris Kramarae and Jana Kramer
Many Internet researchers state that computer networks provide anegalitarian forum where users are not labeled by gender, race, age,national origin or disability. This assertion…
Abstract
Many Internet researchers state that computer networks provide an egalitarian forum where users are not labeled by gender, race, age, national origin or disability. This assertion ignores the experiences of many women using electronic communication systems. Focusses on several legal issues of special relevance to women, including pornography and hate speech, stalking and sexual harassment, and exclusionary practices. Suggests that the conceptual models used in this research and Internet work may help to determine future legal practices.
Details
Keywords
This article engages with the question of the otherness of cyberspace, VR, and hypertext, and how they are distinguished as "new" from "the traditional." It begins by noting how…
Abstract
This article engages with the question of the otherness of cyberspace, VR, and hypertext, and how they are distinguished as "new" from "the traditional." It begins by noting how this "new" present is distinguished by familiar binary oppositions like now vs. past and modern vs. traditional which rely on the notion of a new that is uncontaminated by the old. Both our enthusiasm for the singularly liberating nature of this new future as cybertechnophiles, and our Luddite resistance to its singularly fascistic and panoptic encirclement are similarly informed by this binary opposition. The paper then notes how the other in this opposition is a "domestic other." Thus we always-already know what the other is all about. Arguing that if the other were radically other and not "domesticated," one could not give an account of it in this way, the paper concludes that such alterity requires a rethinking of how one knows the other. The difference between this "wild" other and the "domestic" other is not an external difference but is radical; it is at the root. Therefore, our notions of space, reality, and text need to be complicated and rethought to accommodate what they seem to oppose: cyberspace, virtual reality, and hypertext.
Details
Keywords
Prospects for the creation of norms on state behaviour in cyberspace.
Details
DOI: 10.1108/OXAN-DB224437
ISSN: 2633-304X
Keywords
Geographic
Topical
The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of…
Abstract
Purpose
The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend.
Design/methodology/approach
This paper combines concepts from international relations theory and new institutional economics to understand cyberspace as a complex global institution with contracts embodied in both software code and human practice. Constitutive inefficiencies (market and regulatory failure) and incomplete contracts (generative features and unintended flaws) create the vulnerabilities that hackers exploit. Cyber conflict is a form of cheating within the rules, rather than an anarchic struggle, more like an intelligence-counterintelligence contest than traditional war.
Findings
Cyber conflict is restrained by the collective sociotechnical constitution of cyberspace, where actors must cooperate to compete. Maintenance of common protocols and open access is a condition for the possibility of attack, and successful deceptive exploitation of these connections becomes more difficult in politically sensitive situations as defense and deterrence become more feasible. The distribution of cyber conflict is, thus, bounded vertically in severity but unbounded horizontally in the potential for creative exploitation.
Originality/value
Cyber conflict can be understood with familiar political economic concepts applied in fresh ways. This application provides counterintuitive insights at odds with prevalent threat narratives about the likelihood and magnitude of cyber conflict. It also highlights the important advantages of strong states over the weaker non-state actors widely thought to be empowered by cyberspace.
Details
Keywords
The purpose of this paper is to clarify the relationship between cybersecurity governance and internet governance and to explore the effects of the current tendency for…
Abstract
Purpose
The purpose of this paper is to clarify the relationship between cybersecurity governance and internet governance and to explore the effects of the current tendency for cybersecurity-related discourse to dominate and change the way we approach the established problems of internet governance.
Design/methodology/approach
The paper demonstrates the centrality of internet connectivity to any definition of cyberspace and to cybersecurity, which clarifies the way internet governance and cybersecurity governance are interdependent. Drawing on classic notions of a security dilemma, the paper also argues for distinguishing between national cybersecurity and societal cybersecurity.
Findings
Major structural features of the governance problem in cybersecurity and internet governance are analogous. Joint production of internet services and cybersecurity makes them heavily interdependent. This means that cybersecurity governance and internet governance models need to be compatible, and the approach we take to one will influence how we approach the other.
Originality/value
The interdependence of cybersecurity governance and internet governance has not been carefully examined before, and the relationship is not well understood. These two strands of thinking about cyberspace governance have not been properly connected. This paper bridges the gap and makes policymakers more aware of the potential tensions between a cybersecurity perspective and an internet governance perspective.
Details
Keywords
Morality, resp. moral communication, undergoes substantial changes when it is computer‐mediated, i.e. cyberspace provides a different moral infrastructure. Firstly, there are…
Abstract
Morality, resp. moral communication, undergoes substantial changes when it is computer‐mediated, i.e. cyberspace provides a different moral infrastructure. Firstly, there are different conditions regarding the transaction costs that frame the relation between moral motivation and the expectation of the success of a moral act. Secondly, there is the transformation of ownership and property, which are the basic content of moral actions and communications. The personal accountability of one’s and somebody else’s own (property) is altered; a special ethic of virtual ownership is developing, which finds its expression in the manifold production of public goods in virtual networks. This development is reflected in the dialectics of digital commons and anti‐commons. Thirdly, there is the ludic structure of cyberspace. The medial conditions of cyberspace are analogous to the basic principles of play. Playing as a self‐motivated action is a reason for moral behaviour in cyberspace, especially for the production of public goods.
Details
Keywords
Stephanie Garibaldi and Felicity Deane
The purpose of this paper is to demonstrate that the national security exception will not allow governments to respond to cyberspace threats within the confines of the world trade…
Abstract
Purpose
The purpose of this paper is to demonstrate that the national security exception will not allow governments to respond to cyberspace threats within the confines of the world trade organization (WTO) rules.
Design/methodology/approach
This paper is a desktop study of international trade laws with a specific focus on the convergence of cybersecurity measures and the national security exception provisions of the WTO.
Findings
The trends towards cybersecurity measures may mean there will inevitably be an evolution of trade norms. The question is, will the collective of the WTO be a part of the evolution, or merely an observer? In the authors’ view, it is crucial that it is the former.
Originality/value
This study makes three contributions. It provides a literature review and discussion on cybersecurity and the impact on trade. It demonstrates that the national security exception provision will not excuse these measures, and it aims to underscore the importance of the WTO as a community of nations where negotiation on important global issues is possible.
Details
Keywords
Kerem Kilicer, Ahmet Naci Coklar and Vildan Ozeke
The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.
Abstract
Purpose
The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.
Design/methodology/approach
The paper is based on a scale-development process by following a systematic approach. First, the current scales were examined; following this, focus group interviews were held; next, an item pool was formed; and the validity and reliability of the items were tested. The validity and reliability studies of the scale were conducted with 1,495 social media users. An application on Facebook was used to collect the data.
Findings
As a result of the validity study, 25 items under five factors were obtained. These factors were being peaceful, truth, solidarity, respect and tolerance. The items obtained were capable of discriminating the individuals in terms of the features to be measured by the scale. In addition, the scale was confirmed to measure correctly the structure obtained in line with the fit indices. The internal consistency coefficient of the scale was 0.90 and split-half reliability coefficient was 0.88.
Research limitations/implications
The sample has several limitations. Most of the participants were male and the data were collected on social media. Thus, to enhance the validity and reliability of the scale, further in-depth qualitative and cross-cultural studies should be examined.
Practical implications
This study could provide convenience for practitioners about how to diagnose the cyber human values of the internet users in cyberspace.
Originality/value
It was concluded that this scale was valid, reliable and beneficial to measure social media users’ levels of cyber human values.
Details
Keywords
Seung Yeop Paek, Mahesh K. Nalla and Julak Lee
This exploratory research examined law enforcement officers' attitudes toward the public-private partnerships (PPPs) in policing cyberspace. Particularly, by investigating the…
Abstract
Purpose
This exploratory research examined law enforcement officers' attitudes toward the public-private partnerships (PPPs) in policing cyberspace. Particularly, by investigating the predictors of police officers' support for the PPPs, the authors aimed to offer practical implications for maintaining order and responding to illegal activities in the virtual environment.
Design/methodology/approach
A convenience sample of South Korean police officers was surveyed using a paper-and-pencil questionnaire.
Findings
The findings showed that officer perceptions of the seriousness and the frequency of property cybercrimes, computer proficiency and awareness of a lack of training were positively associated with the support for the PPPs. In addition, years of experience was negatively related to the support for the PPPs.
Originality/value
Law enforcement officers' perceptions toward public-private cooperation in combatting cybercrime have never been examined. This research fills the gap by exploring the predictors of officer support for cross-sectoral partnerships within the framework of nodal governance security in the cultural context of South Korea.
Details
Keywords
Mohammad Osiur Rahman, Nour Mohammad and Mohammad Mahabubur Rahman
The purpose of this paper is to show that the internet together with cyberspace form an “everywhere and nowhere proposition” and to discuss numerous problems concerning legal…
Abstract
Purpose
The purpose of this paper is to show that the internet together with cyberspace form an “everywhere and nowhere proposition” and to discuss numerous problems concerning legal issues, the most vital being confusion as to jurisdiction.
Design/methodology/approach
The research was based upon theoretical sources and empirical data.
Findings
It was found that a probable solution could be extracted from the US experience for all the nations coming under the virtual framework of cyberspace. Some hi‐tech nations are facing this problem; and the USA is one of them. Even the USA – a large federal state – faces the jurisdictional problem and conflict as regards its own provinces; and the US courts, legal institutions and intellectuals are resorting to established principles of law – domestic or international. Decisions of US cases have been keenly observed to find out how the US courts and legal scholars have taken the help of traditional territorial tenets and precepts to resolve jurisdictional conflict. In many cases, US courts and legal scholars have shown their interest to adopt personal jurisdiction.
Originality/value
With the USA being a representative type of hi‐tech nation, US attitude and practice could usher the way for all other upcoming hi‐tech nations.
Details