Show simple item record

[journal article]

dc.contributor.authorCollier, Jamiede
dc.date.accessioned2022-03-09T09:11:14Z
dc.date.available2022-03-09T09:11:14Z
dc.date.issued2018de
dc.identifier.issn2183-2463de
dc.identifier.urihttps://www.ssoar.info/ssoar/handle/document/77930
dc.description.abstractIn the context of globalisation and privatisation, an emerging body of literature has applied the concept of an 'assemblage' to international relations and security studies. This article will argue that an assemblage framework provides the best means for understanding the complex configuration of cyber security actors, given that contemporary cyber security practices do not conform to the traditional public-private and global-local distinctions used in security studies and International Relations literature. With the configuration of cyber security actors, and the relationships between them in constant flux, an assemblage framework provides a means for understanding the contested, dynamic and diachronic nature of contemporary cyber security provision. While the concept of security assemblages is favoured in this article, the process and context in which the term has traditionally been used cannot be blindly imposed on the issue of cyber security. This article will therefore propose a different model of how cyber security assemblages have developed and explain the implications this has on contemporary security dynamics.de
dc.languageende
dc.subject.ddcPolitikwissenschaftde
dc.subject.ddcPolitical scienceen
dc.subject.otherassemblages; cyber security; private security; state powerde
dc.titleCyber Security Assemblages: A Framework for Understanding the Dynamic and Contested Nature of Security Provisionde
dc.description.reviewbegutachtet (peer reviewed)de
dc.description.reviewpeer revieweden
dc.identifier.urlhttps://www.cogitatiopress.com/politicsandgovernance/article/view/1324de
dc.source.journalPolitics and Governance
dc.source.volume6de
dc.publisher.countryPRTde
dc.source.issue2de
dc.subject.classozFriedens- und Konfliktforschung, Sicherheitspolitikde
dc.subject.classozPeace and Conflict Research, International Conflicts, Security Policyen
dc.rights.licenceCreative Commons - Namensnennung 4.0de
dc.rights.licenceCreative Commons - Attribution 4.0en
internal.statusformal und inhaltlich fertig erschlossende
dc.type.stockarticlede
dc.type.documentZeitschriftenartikelde
dc.type.documentjournal articleen
dc.source.pageinfo13-21de
internal.identifier.classoz10507
internal.identifier.journal787
internal.identifier.document32
internal.identifier.ddc320
dc.source.issuetopicGlobal Cybersecurity: New Directions in Theory and Methodsde
dc.identifier.doihttps://doi.org/10.17645/pag.v6i2.1324de
dc.description.pubstatusVeröffentlichungsversionde
dc.description.pubstatusPublished Versionen
internal.identifier.licence16
internal.identifier.pubstatus1
internal.identifier.review1
internal.dda.referencehttps://www.cogitatiopress.com/politicsandgovernance/oai/@@oai:ojs.cogitatiopress.com:article/1324
ssoar.urn.registrationfalsede


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record