Browse > Article
http://dx.doi.org/10.33778/kcsa.2019.19.5.099

Theoretical Background and Critical Discussion about Securitzation Trend of Cyber Threat  

Lee, Kwangho (육군3사관학교 이공학처 사이버전학과)
Lee, Swengkyu (육군3사관학교 이공학처 사이버전학과)
Kim, Hokil (육군3사관학교 이공학처 사이버전학과)
Publication Information
Abstract
In this study present the theoretical background and major trends in which cyber threats are securitization through the discourse process. In particular, this study explained based on the theory of Copenhagen school, which is critical of the security of cyber threats. And presented the security of non-traditional threats and the security of emerging security issues, which explained the process of security for cyber threats, based on existing research, and explained the limitations to this. And tried to provide a cautious point of view that the militarization phenomenon of cyber threats that is currently displayed is a phenomenon that is displayed through the combination of technical discourse and military discourse. Through this study, we aim to show the military the limits of universal solution presentation and the borderline perspective of militarization based on objective insights into the cyber threat security process.
Keywords
Cyber Threats; Cyber Security; Nontraditional Security; Emerging Security; Military Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Baldwin, David A. 1995. "Security Studies and the End of the Cold War." World Politics 48(1), 117-141, 1995.   DOI
2 Baldwin, David A, "The Concept of Security." Review of International Studies 23, 5-26, 1997.   DOI
3 Waever, Ole, Barry Buzan, Morten Kelstrup, and Pierre Lemaitre. 1993, Identy, Migration and the New Security Agenda in Europe. London: Printer.
4 Waever, Ole. "Securityzation and Desecuritization." in Ronny Lipschuts. ed. On Security. New York: Colombia University Press, 46-86, 1995.
5 Buzan, Barry, Ole Waver, and Jaap de Wilde, Security: A New Framework for Analysis. Boulder: Lynne Rienner, 1998.
6 Buzan, Barry and Lene Hensen, The Evolution of International Security Studies. Cambridge: Cambridge University Press, 2009.
7 Balzaq, Thierry, ed, Securitization Theory: How Security Problems Emerge and Dissolve. London and New York: Routledge, 2011.
8 박인휘, "탈냉전과 미국의 패권적 안보담론", 국제정치논총 40(4), pp.45-64, 2000.
9 김상배, "사이버 안보의 미중관계: 안보화 이론의 시각", 한국정치학회보 49(1), pp.71-97, 2015.   DOI
10 Rid, Thomas, Cyber War will not take place. Oxford and New York: Oxford University Press, 2013.
11 Hansen, Lene and Helen Nissenbaum, "Digital Disaster, Cyber Security, and the Copenhagen School." Internation Studies Quarterly 53(4): 1155-1175, 2009.   DOI
12 Whasun Jho, Minje Kim, "Securitization of Cyberspace and the Limits of Cyber Security Governance", Information Society & Media, vol 17, No. 2, pp.77-98, 2016.
13 김상배, "신흥안보와 메타 거버넌스: 새로운 안보 패러다임의 이론적 이해", 한국정치학회보, 50(1), pp.75-104, 2016.
14 이신화, "21세기 글로벌이슈와 국제정치학", 국제정치논총 46(특별호), pp.197-226, 2007
15 한승주, "인권: 국가주권 대 인간주권", 아산재단 창립 30주년 기념 국제학술대회, 2007년 6월 22일.
16 Craig, Susan L. "Chinese Perceptions of Traditional an Nontraditional Security." http://www.StrategicStudiesInstitute.army.mil (검색일: 2019.8.3.).
17 이신화, "비전통안보와 동북다지역협력", 한국정치학회보 42(2), pp.411-434, 2006.   DOI
18 김상배, "신흥안보의 미래전략: 개념적, 이론적 이해" 서울: 사회평론아카데미, 2016.
19 이신화, "인구, 이주, 난민안보의 복합지정학", 아세아연구 60(1), pp.6-50, 2017.
20 김상배, "세계 주요국의 사이버 안보 전략", 국제지역연구 26(3), pp.67-108, 2017.
21 Morgan, Patrick M, "Applicability of Traditional Deterrence Concepts and Theory to the cyber Realm" , Proceedings of a Workshop on Dettering Cyber Attacks: Informing Strategies and Developing Options for U.S.Policy. National Research council, 2010
22 Lupovici, Amir, "Cyber Warfare and Detterence: Trends and Challenges in Research" Military and Strategic Affairs 3(3), pp.49-62, 2011.
23 Singer & Scachtman, "International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed" Havard International Law Journal 54, pp. 13-37, 2011
24 장노순, 한인택, 2013, "사이버 안보의 쟁점과 연구 경향" 국제정치논총 53(3), pp.195-230, 2013.
25 Matusitz, Jonathan A. "Cyberterrorism: A postmodern View of Networks of Terror and How Computer Security Experts and law Enforcement Officials Fight Them. Ph.d. Dissertation. university of Oklahoma, 2006.
26 Haftendorn, Helga, "The Security Puzzle: Theory-Building and Discipline-Building in International Security." International Studies Quarterly 35, 3-17, 1991.   DOI
27 Lee & Jung, "A Study on the Quantitative Threat-Level Assessment Measure Using Fuzzy Inference", The Journal of Korea Convergence Security Association, Vol. 18, No.2, pp.19-24, 2018
28 한국인터넷진흥원 "주요 국가별 사이버방어 체제 및 대응동향" 심층보고서, 2014
29 Walt, Stephen M, "The Renaissance of Security Studies." International Studies Quarterly 35, 211-239, 1991   DOI