Matches in SemOpenAlex for { <https://semopenalex.org/work/W2294499416> ?p ?o ?g. }
Showing items 1 to 64 of
64
with 100 items per page.
- W2294499416 abstract "Discussions of cybersecurity often involve metaphors — some explicit, others implicit — each with its own strengths and weaknesses, its own correct and misleading elements, and, most importantly, its own implications for how to secure computers, computer networks, and the information on them. In legal circles, the influential role of computer and Internet metaphors in dictating actions and laws is more clearly understood than it is in many other policy and security debates that center on questions of the threats posed by these technologies and the best means of mitigating or protecting against those threats. When these debates happen outside the courtroom, the metaphors used to illustrate cybersecurity risks and mitigation measures often enter the discussion unnoticed and are largely accepted without question. This research examines three classes of metaphors in this space — the burglar metaphor, the war metaphor, and the health metaphor — to understand the ways in which they serve as “generative metaphors” that prescribe certain types of policy solutions. As generative metaphors, each of these metaphors frames computer security challenges as analogous to another social problem and, in doing so, implies that the most appropriate and logical defensive measures would be those that mirror the steps society has taken to protect against either robbers, wars, or diseases. Each of these metaphors has strong implications for the causes, motivations, and most appropriate protections for cybersecurity threats. These implications range from who is responsible for defending computer systems, who is threatening those systems, and the nature of what is at stake if those threats are successful." @default.
- W2294499416 created "2016-06-24" @default.
- W2294499416 creator A5005106101 @default.
- W2294499416 date "2014-01-01" @default.
- W2294499416 modified "2023-10-16" @default.
- W2294499416 title "Cybersecurity as Metaphor: Policy and Defense Implications of Computer Security Metaphors" @default.
- W2294499416 cites W1512821824 @default.
- W2294499416 cites W1966366613 @default.
- W2294499416 cites W2008906551 @default.
- W2294499416 cites W2039556181 @default.
- W2294499416 cites W2063915689 @default.
- W2294499416 cites W2074937108 @default.
- W2294499416 cites W2109540106 @default.
- W2294499416 cites W2797603006 @default.
- W2294499416 cites W3121953736 @default.
- W2294499416 cites W4235829104 @default.
- W2294499416 cites W4250371488 @default.
- W2294499416 doi "https://doi.org/10.2139/ssrn.2418638" @default.
- W2294499416 hasPublicationYear "2014" @default.
- W2294499416 type Work @default.
- W2294499416 sameAs 2294499416 @default.
- W2294499416 citedByCount "5" @default.
- W2294499416 countsByYear W22944994162017 @default.
- W2294499416 countsByYear W22944994162020 @default.
- W2294499416 countsByYear W22944994162021 @default.
- W2294499416 crossrefType "journal-article" @default.
- W2294499416 hasAuthorship W2294499416A5005106101 @default.
- W2294499416 hasConcept C108827166 @default.
- W2294499416 hasConcept C127413603 @default.
- W2294499416 hasConcept C138885662 @default.
- W2294499416 hasConcept C154908896 @default.
- W2294499416 hasConcept C17744445 @default.
- W2294499416 hasConcept C2778311575 @default.
- W2294499416 hasConcept C38652104 @default.
- W2294499416 hasConcept C41008148 @default.
- W2294499416 hasConcept C41895202 @default.
- W2294499416 hasConcept C55587333 @default.
- W2294499416 hasConceptScore W2294499416C108827166 @default.
- W2294499416 hasConceptScore W2294499416C127413603 @default.
- W2294499416 hasConceptScore W2294499416C138885662 @default.
- W2294499416 hasConceptScore W2294499416C154908896 @default.
- W2294499416 hasConceptScore W2294499416C17744445 @default.
- W2294499416 hasConceptScore W2294499416C2778311575 @default.
- W2294499416 hasConceptScore W2294499416C38652104 @default.
- W2294499416 hasConceptScore W2294499416C41008148 @default.
- W2294499416 hasConceptScore W2294499416C41895202 @default.
- W2294499416 hasConceptScore W2294499416C55587333 @default.
- W2294499416 hasLocation W22944994161 @default.
- W2294499416 hasOpenAccess W2294499416 @default.
- W2294499416 hasPrimaryLocation W22944994161 @default.
- W2294499416 hasRelatedWork W1584043719 @default.
- W2294499416 hasRelatedWork W2030496847 @default.
- W2294499416 hasRelatedWork W2236103065 @default.
- W2294499416 hasRelatedWork W2547405342 @default.
- W2294499416 hasRelatedWork W2748952813 @default.
- W2294499416 hasRelatedWork W2783961853 @default.
- W2294499416 hasRelatedWork W2787177649 @default.
- W2294499416 hasRelatedWork W2899084033 @default.
- W2294499416 hasRelatedWork W3007967230 @default.
- W2294499416 hasRelatedWork W4313313264 @default.
- W2294499416 isParatext "false" @default.
- W2294499416 isRetracted "false" @default.
- W2294499416 magId "2294499416" @default.
- W2294499416 workType "article" @default.