DEFENDING CYBERSPACE: REEXAMINING SECURITY METAPHORS IN THE INTERNET ERA

被引:0
|
作者
Yang, Misti [1 ]
机构
[1] Univ Maryland, Dept Commun, College Pk, MD 20742 USA
关键词
D O I
暂无
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
This essay examines the image-schemas and metaphors that leaders and critics employ in international debates about the internet. As Secretary of State, Hillary Clinton delivered the first speech by a senior American official articulating a strategy for incorporating internet freedom into American foreign policy in 2010, but international leaders have been concerned with the implications of the internet since its inception. Situating Clinton's speech in the history of internet governance, I employ security image-schemas first developed by Paul Chilton to demonstrate how policymakers employ the internet to reinforce realist foreign policy narratives. To support alternative conceptions of the internet, I propose a "space" image-schema drawing from the work of critical geographer Doreen Massey. While the internet is often depicted as a force for freedom, a more productive framework may be understanding its relationship with space.
引用
收藏
页码:707 / 733
页数:27
相关论文
共 50 条
  • [31] Internet Governance: Territorializing Cyberspace?
    Glen, Carol M.
    [J]. POLITICS & POLICY, 2014, 42 (05) : 635 - 657
  • [32] Mapping cyberspace: The image of the Internet
    Krueger, Tara
    [J]. IEEE ANNALS OF THE HISTORY OF COMPUTING, 2007, 29 (01) : 100 - +
  • [33] Risking Security: Policies and Paradoxes of Cyberspace Security
    Deibert, Ronald J.
    Rohozinski, Rafal
    [J]. INTERNATIONAL POLITICAL SOCIOLOGY, 2010, 4 (01) : 15 - 32
  • [34] Navigating cyberspace: A roadmap to the Internet
    Berberich, CW
    [J]. JOURNAL AMERICAN WATER WORKS ASSOCIATION, 1996, 88 (02): : 44 - 58
  • [35] A Survey of Privacy and Security Issues for the Internet of Things in the GDPR Era
    Vegh, Laura
    [J]. 2018 12TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2018, : 453 - 458
  • [36] Security, privacy and trust management in the internet of things era - SePriT
    Sicari, Sabrina
    Hailes, Stephen
    Turgut, Damla
    Sharafeddine, Sanaa
    Desai, Uday B.
    [J]. AD HOC NETWORKS, 2013, 11 (08) : 2623 - 2624
  • [37] Security and Privacy by Design is Key in the Internet of Everything (IoE) Era
    Mohanty, Saraju P.
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) : 4 - 5
  • [38] The Internet of things era information security challenges and coping strategies
    Su Cai
    Li Xueqiang
    Li Jing
    Wang Hong
    [J]. PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT 2017), 2017, 101 : 550 - 553
  • [39] The Internet - Fear and shopping in Cyberspace
    Kiely, T
    [J]. HARVARD BUSINESS REVIEW, 1997, 75 (04) : 13 - 14
  • [40] Security for cyberspace: challenges and opportunities
    Jiang-xing Wu
    Jian-hua Li
    Xin-sheng Ji
    [J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1459 - 1461