This article uses a governmentality and discourse analysis approach to analyze cyber security policy literature. It examines the problems of construction of virtual space and current efforts to secure this space political and technologically. It extracts a model of cyber security discourse that constructs cyberspace as ungovernable, unknowable, a cause of vulnerability, inevitably threatening, and a home to threatening actors.
ArquillaJ.RonfeldtD. (1997). Cyberwar is coming! In ArquillaJ.RonfeldtD. (Eds.), In Athena’s camp: Preparing for conflict in the information age (pp. 23-60). Santa Monica, CA: RAND.
4.
BakerS.WatermanS.IvanovG. (2010). In the crossfire: Critical infrastructure in the age of cyber war. Santa Clara, CA: McAffee.
5.
BendrathR. (2001). The cyberwar debate: Perception and politics in U.S. critical infrastructure protection. Information & Security, 7, 80-103.
6.
BhallaN. (2003). Is the mouse click mighty enough to bring society to its knees?Computers & Security, 22, 322-336.
7.
BilloC.ChangW. (2004). Cyber warfare: An analysis of the means and motivations of selected nation states. Hanover, NH: Institute for Security Technology Studies at Dartmouth College.
8.
BrownW. (2006). Regulating aversion: Tolerance in the age of identity and empire. Oxford, England: Princeton University Press.
9.
BuzanB.WaeverO.de WildeJ. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.
10.
Cabinet Office. (2008). The national security strategy of the United Kingdom: Security in an interdependent world. London, England: TSO.
11.
Cabinet Office. (2009a). Cyber security strategy of the United Kingdom: Safety, security and resilience in cyberspace. London, England: TSO.
EmmersR. (2009). Securitization. In CollinsA. (Ed.), Contemporary security studies (pp. 136-151). Oxford, England: Oxford University Press.
17.
FoucaultM. (2007). Security, territory, population: Lectures at the Collège de France 1977-1978. Houndmill, England: Palgrave.
18.
FurediF. (2007). Invitation to terror: The expanding empire of the unknown. London, England: Continuum.
19.
GandyO. H. (2003). Data mining and surveillance in the post-9/11 environment. In BallK.WebsterF. (Eds.), The intensification of surveillance: Crime, terrorism and warfare in the information age (pp. 26-41). London, England: Pluto Press.
GlynosJ.HowarthD. (2007). Logics of critical explanation in social and political theory. London, England: Routledge.
23.
HaggertyK. (2006a). Tear down the walls: On demolishing the Panopticon. In LyonD. (Ed.), Theorizing surveillance: The Panopticon and beyond (pp. 23-45). Cullompton, England: Willan.
24.
HaggertyK. (2006b). Visible war: Surveillance, speed and information war. In HaggertyK.EricsonR. V. (Eds.), The new politics of surveillance and visibility (pp. 250-278). Toronto, Ontario, Canada: Toronto University Press.
25.
KaratzogianniA. (2008). Cyber-conflict and global politics. Oxford, England: Routledge.
26.
KshetiK. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11, 541-562.
27.
LaclauE.MouffeC. (1985). Hegemony and socialist strategy. London, England: Verso.
28.
LessigL. (1999). Code and other laws of cyberspace. New York, NY: Basic Books.
29.
LewisH. (2010). Cyber security intelligence: Time for some perspective. RUSI Monitor, 8(3), 4-6.
30.
LewisJ. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Centre for Strategic & International Studies.
MooreC.Barnard-WillsD. (2010). Russia and counter-terrorism: A critical appraisal. In SiniverA. (Ed.), International terrorism post 9/11: Comparative dynamics and responses (pp. 144-167). London, England: Routledge.
O’HaraK.ShadboltN. (2008). The spy in the coffee machine: The end of privacy as we know it. Oxford, England: Oneworld.
37.
PhilipsL.JøgensenM. W. (2002). Discourse analysis as theory and method. London, England: SAGE.
38.
RansomJ. S. (1997). Foucault’s discipline: The politics of subjectivity. Durham, England: Duke University Press.
39.
RattrayG.EvansC.HealyJ. (2010). American security in the cyber commons. In DenmarkA. M.MulvenanJ. (Eds.), Contested commons: The future of American power in a multi-polar world (pp. 137-176). Washington, DC: Center for a New American Security.
40.
Secretary of State for Culture, Media and Sport & Minister for Communications, Technology and Broadcasting. (2009). Digital Britain: Final report. London, England: TSO.
41.
WallD. S. (2008). Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information, Communication & Society, 11, 861-884.