Search results

21 – 30 of over 5000
Article
Publication date: 1 June 1995

Cheris Kramarae and Jana Kramer

Many Internet researchers state that computer networks provide anegalitarian forum where users are not labeled by gender, race, age,national origin or disability. This assertion…

783

Abstract

Many Internet researchers state that computer networks provide an egalitarian forum where users are not labeled by gender, race, age, national origin or disability. This assertion ignores the experiences of many women using electronic communication systems. Focusses on several legal issues of special relevance to women, including pornography and hate speech, stalking and sexual harassment, and exclusionary practices. Suggests that the conceptual models used in this research and Internet work may help to determine future legal practices.

Details

Internet Research, vol. 5 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 March 2007

Tugrul Ilter

This article engages with the question of the otherness of cyberspace, VR, and hypertext, and how they are distinguished as "new" from "the traditional." It begins by noting how…

Abstract

This article engages with the question of the otherness of cyberspace, VR, and hypertext, and how they are distinguished as "new" from "the traditional." It begins by noting how this "new" present is distinguished by familiar binary oppositions like now vs. past and modern vs. traditional which rely on the notion of a new that is uncontaminated by the old. Both our enthusiasm for the singularly liberating nature of this new future as cybertechnophiles, and our Luddite resistance to its singularly fascistic and panoptic encirclement are similarly informed by this binary opposition. The paper then notes how the other in this opposition is a "domestic other." Thus we always-already know what the other is all about. Arguing that if the other were radically other and not "domesticated," one could not give an account of it in this way, the paper concludes that such alterity requires a rethinking of how one knows the other. The difference between this "wild" other and the "domestic" other is not an external difference but is radical; it is at the root. Therefore, our notions of space, reality, and text need to be complicated and rethought to accommodate what they seem to oppose: cyberspace, virtual reality, and hypertext.

Details

Open House International, vol. 32 no. 1
Type: Research Article
ISSN: 0168-2601

Keywords

Expert briefing
Publication date: 19 September 2017

Prospects for the creation of norms on state behaviour in cyberspace.

Details

DOI: 10.1108/OXAN-DB224437

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 11 September 2017

Jon Randall Lindsay

The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of…

1747

Abstract

Purpose

The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend.

Design/methodology/approach

This paper combines concepts from international relations theory and new institutional economics to understand cyberspace as a complex global institution with contracts embodied in both software code and human practice. Constitutive inefficiencies (market and regulatory failure) and incomplete contracts (generative features and unintended flaws) create the vulnerabilities that hackers exploit. Cyber conflict is a form of cheating within the rules, rather than an anarchic struggle, more like an intelligence-counterintelligence contest than traditional war.

Findings

Cyber conflict is restrained by the collective sociotechnical constitution of cyberspace, where actors must cooperate to compete. Maintenance of common protocols and open access is a condition for the possibility of attack, and successful deceptive exploitation of these connections becomes more difficult in politically sensitive situations as defense and deterrence become more feasible. The distribution of cyber conflict is, thus, bounded vertically in severity but unbounded horizontally in the potential for creative exploitation.

Originality/value

Cyber conflict can be understood with familiar political economic concepts applied in fresh ways. This application provides counterintuitive insights at odds with prevalent threat narratives about the likelihood and magnitude of cyber conflict. It also highlights the important advantages of strong states over the weaker non-state actors widely thought to be empowered by cyberspace.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 11 September 2017

Milton Mueller

The purpose of this paper is to clarify the relationship between cybersecurity governance and internet governance and to explore the effects of the current tendency for…

1709

Abstract

Purpose

The purpose of this paper is to clarify the relationship between cybersecurity governance and internet governance and to explore the effects of the current tendency for cybersecurity-related discourse to dominate and change the way we approach the established problems of internet governance.

Design/methodology/approach

The paper demonstrates the centrality of internet connectivity to any definition of cyberspace and to cybersecurity, which clarifies the way internet governance and cybersecurity governance are interdependent. Drawing on classic notions of a security dilemma, the paper also argues for distinguishing between national cybersecurity and societal cybersecurity.

Findings

Major structural features of the governance problem in cybersecurity and internet governance are analogous. Joint production of internet services and cybersecurity makes them heavily interdependent. This means that cybersecurity governance and internet governance models need to be compatible, and the approach we take to one will influence how we approach the other.

Originality/value

The interdependence of cybersecurity governance and internet governance has not been carefully examined before, and the relationship is not well understood. These two strands of thinking about cyberspace governance have not been properly connected. This paper bridges the gap and makes policymakers more aware of the potential tensions between a cybersecurity perspective and an internet governance perspective.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 31 August 2004

Bernd Remmele

Morality, resp. moral communication, undergoes substantial changes when it is computer‐mediated, i.e. cyberspace provides a different moral infrastructure. Firstly, there are…

434

Abstract

Morality, resp. moral communication, undergoes substantial changes when it is computer‐mediated, i.e. cyberspace provides a different moral infrastructure. Firstly, there are different conditions regarding the transaction costs that frame the relation between moral motivation and the expectation of the success of a moral act. Secondly, there is the transformation of ownership and property, which are the basic content of moral actions and communications. The personal accountability of one’s and somebody else’s own (property) is altered; a special ethic of virtual ownership is developing, which finds its expression in the manifold production of public goods in virtual networks. This development is reflected in the dialectics of digital commons and anti‐commons. Thirdly, there is the ludic structure of cyberspace. The medial conditions of cyberspace are analogous to the basic principles of play. Playing as a self‐motivated action is a reason for moral behaviour in cyberspace, especially for the production of public goods.

Details

Journal of Information, Communication and Ethics in Society, vol. 2 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 28 June 2023

Stephanie Garibaldi and Felicity Deane

The purpose of this paper is to demonstrate that the national security exception will not allow governments to respond to cyberspace threats within the confines of the world trade…

Abstract

Purpose

The purpose of this paper is to demonstrate that the national security exception will not allow governments to respond to cyberspace threats within the confines of the world trade organization (WTO) rules.

Design/methodology/approach

This paper is a desktop study of international trade laws with a specific focus on the convergence of cybersecurity measures and the national security exception provisions of the WTO.

Findings

The trends towards cybersecurity measures may mean there will inevitably be an evolution of trade norms. The question is, will the collective of the WTO be a part of the evolution, or merely an observer? In the authors’ view, it is crucial that it is the former.

Originality/value

This study makes three contributions. It provides a literature review and discussion on cybersecurity and the impact on trade. It demonstrates that the national security exception provision will not excuse these measures, and it aims to underscore the importance of the WTO as a community of nations where negotiation on important global issues is possible.

Details

Journal of International Trade Law and Policy, vol. 22 no. 2
Type: Research Article
ISSN: 1477-0024

Keywords

Article
Publication date: 2 October 2017

Kerem Kilicer, Ahmet Naci Coklar and Vildan Ozeke

The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.

1423

Abstract

Purpose

The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.

Design/methodology/approach

The paper is based on a scale-development process by following a systematic approach. First, the current scales were examined; following this, focus group interviews were held; next, an item pool was formed; and the validity and reliability of the items were tested. The validity and reliability studies of the scale were conducted with 1,495 social media users. An application on Facebook was used to collect the data.

Findings

As a result of the validity study, 25 items under five factors were obtained. These factors were being peaceful, truth, solidarity, respect and tolerance. The items obtained were capable of discriminating the individuals in terms of the features to be measured by the scale. In addition, the scale was confirmed to measure correctly the structure obtained in line with the fit indices. The internal consistency coefficient of the scale was 0.90 and split-half reliability coefficient was 0.88.

Research limitations/implications

The sample has several limitations. Most of the participants were male and the data were collected on social media. Thus, to enhance the validity and reliability of the scale, further in-depth qualitative and cross-cultural studies should be examined.

Practical implications

This study could provide convenience for practitioners about how to diagnose the cyber human values of the internet users in cyberspace.

Originality/value

It was concluded that this scale was valid, reliable and beneficial to measure social media users’ levels of cyber human values.

Details

Internet Research, vol. 27 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 4 September 2020

Seung Yeop Paek, Mahesh K. Nalla and Julak Lee

This exploratory research examined law enforcement officers' attitudes toward the public-private partnerships (PPPs) in policing cyberspace. Particularly, by investigating the…

Abstract

Purpose

This exploratory research examined law enforcement officers' attitudes toward the public-private partnerships (PPPs) in policing cyberspace. Particularly, by investigating the predictors of police officers' support for the PPPs, the authors aimed to offer practical implications for maintaining order and responding to illegal activities in the virtual environment.

Design/methodology/approach

A convenience sample of South Korean police officers was surveyed using a paper-and-pencil questionnaire.

Findings

The findings showed that officer perceptions of the seriousness and the frequency of property cybercrimes, computer proficiency and awareness of a lack of training were positively associated with the support for the PPPs. In addition, years of experience was negatively related to the support for the PPPs.

Originality/value

Law enforcement officers' perceptions toward public-private cooperation in combatting cybercrime have never been examined. This research fills the gap by exploring the predictors of officer support for cross-sectoral partnerships within the framework of nodal governance security in the cultural context of South Korea.

Details

Policing: An International Journal, vol. 43 no. 5
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 16 May 2008

Mohammad Osiur Rahman, Nour Mohammad and Mohammad Mahabubur Rahman

The purpose of this paper is to show that the internet together with cyberspace form an “everywhere and nowhere proposition” and to discuss numerous problems concerning legal…

Abstract

Purpose

The purpose of this paper is to show that the internet together with cyberspace form an “everywhere and nowhere proposition” and to discuss numerous problems concerning legal issues, the most vital being confusion as to jurisdiction.

Design/methodology/approach

The research was based upon theoretical sources and empirical data.

Findings

It was found that a probable solution could be extracted from the US experience for all the nations coming under the virtual framework of cyberspace. Some hi‐tech nations are facing this problem; and the USA is one of them. Even the USA – a large federal state – faces the jurisdictional problem and conflict as regards its own provinces; and the US courts, legal institutions and intellectuals are resorting to established principles of law – domestic or international. Decisions of US cases have been keenly observed to find out how the US courts and legal scholars have taken the help of traditional territorial tenets and precepts to resolve jurisdictional conflict. In many cases, US courts and legal scholars have shown their interest to adopt personal jurisdiction.

Originality/value

With the USA being a representative type of hi‐tech nation, US attitude and practice could usher the way for all other upcoming hi‐tech nations.

Details

International Journal of Law and Management, vol. 50 no. 3
Type: Research Article
ISSN: 1754-243X

Keywords

21 – 30 of over 5000