Abstract
The development and global diffusion of access to the Internet has—as is the case with most new and game-changing technologies—been accompanied with fears and threat perceptions. This chapter argues, on the one hand, that Constructivist IR theory is particularly suited for addressing and interpreting the threat discourses and identity issues which come in focus in cybersecurity. The ease with which cyber-culprits can hide their identity and location, operating through networks of hijacked computers across the world, makes fear-mongering threat and identity discourses a key issue in cybersecurity. On the other hand, this chapter presents content analysis—a set of quantitative methods focusing on key word searches—as a pertinent or even ubiquitous method for both the study and practice of cybersecurity. Through simple and globally accessible interfaces, the entire Web can be scrutinized using content analysis. Equipped with Constructivist theory and content analysis methods, the IR scholar stands prepared to uncover and better understand the massive discursive world of the Internet.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Such actors could be colloquially defined as the “super-individuals”.
- 2.
- 3.
For example, a quick analysis of policy-makers’ public speeches on crime and security worldwide would reveal how relatively few times that term appears. A skeptical view of this fact can be found, for instance, in Florencio and Herley (2012). Thus, different hypotheses could be tested to explain which view is most correct.
- 4.
The original “Culturnomics” was limited only to the analysis of books in digital archives (Leetaru 2011b).
- 5.
More specifically, Leetaru (2011b) explores the “news tone and geographic location”.
- 6.
According to this “law”, the number of transistors on integrated circuits doubles approximately every 2 years and more processors mean more computing power. The period was further “reduced” to 18 months.
- 7.
For example the SCADA (system control and data acquisition) controllers that allow operators to remotely check the status and functioning of various production or distribution processes.
- 8.
There are even good open source applications for content analysis such as KH Coder. More can be easily obtained from http://www.sourceforge.net; a Web site dedicated exclusively to Open Source software Including applications for forensic analysis of firewalls and the like.
- 9.
See the Web site of Hamlet II for example, available at http://apb.newmdsx.com/hamlet2.html.
- 10.
The Web site (http://www.kalevleetaru.com) of Kalev H. Leetaru, a recognized expert in computerized content analysis, offers several examples of that type of application.
- 11.
A shorter definition could be “turning text into numbers”. For more technical details see the “text mining” section in the Statsoft Web site at http://www.statsoft.com/textbook/.
References
Ajith, A., Hassanien, A.-E., & Snášel, V. (Eds.). (2010). Computational social network analysis: Trends, tools and research advances. London: Springer.
Amoroso, E. G. (2011). Cyber attacks: Protecting national infrastructure. Burlington: Elsevier.
Avey, P. C., Desh, M. C., Long, D. D., Maliniak, D., Peterson, S., & Tierney, M. J. (2012, January/February). The Beltway vs. the Ivory Tower. Foreign Policy. http://www.foreignpolicy.com/articles/2012/01/03/the_beltway_vs_the_ivory_tower?wp_login_redirect=0. Accessed January 28, 2014.
Balzacq, T. (Ed.). (2010). Securitization theory: How security problems emerge and dissolve. London: Routledge.
Benedikt, M. (Ed.). (1991). Cyberspace. Cambridge, MA: The MIT Press.
Berners-Lee, T., Cailliau, R., Groff, J.-F., & Pollermann, B. (1992). World-wide web: The information universe. Internet Research, 2(1), 52–58.
Berry, M. W., & Castellanos, M. (Eds.). (2008). Survey of text mining II: Clustering, classification, and retrieval. London: Springer.
Berry, M. W., & Kogan, J. (2010). Text mining: Applications and theory. Chichester, UK: Wiley.
Bueno, P., Dirro, T., Greve, P., Kashyap, R., Marcus, D., Paget, F., et al. (2011). McAfee threats report: First quarter 2011. Santa Clara, CA: McAfee Lab.
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. London: Lynne Rienner.
Carr, M. (2011). The irony of the information age: US power and the internet in international relations. PhD dissertation, Australian National University, Canberra.
Castells, M. (1996). The rise of the network society (The information age: Economy, society and culture, Vol. 1). Malden, MA: Blackwell.
Castells, M. (2000). Information age: Rise of the network society (2nd ed., Vol. 1). Malden, MA: Blackwell.
Clarke, R. A., & Knake, R. K. (2010). Cyberwar: The next threat to national security and what to do about it. New York, NY: HarperCollins.
Conway, M. (2002). Reality bytes: Cyberterrorism and terrorist ‘use’ of the internet. First Monday, 7(11). http://doras.dcu.ie/498/1/first_mon_7_11_2002.pdf. Accessed January 28, 2014.
Cukier, K., & Mayer-Schoenberger, V. (2013). The rise of big data: How it’s changing the way we think about the world. Foreign Affairs, May/June, 92(3), 28–40.
Deibert, R. (2013). Black code: Inside the battle for cyberspace. Toronto: Signal.
Druckman, D. (2005). Doing research: Methods of inquiry for conflict analysis. London: Sage.
Dunn Cavelty, M. (2008). Cyber-terror—looming threat or phantom menace? The framing of the US cyber-threat debate. Journal of Information Technology and Politics, 4(1), 19–36.
Dunn Cavelty, M. (2012). The militarization of cyber security as a source of global tension. Social Science Research Network (SSRN). http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2007043. Accessed January 28, 2014.
Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representation with an impact in the cyber-security discourse. International Studies Review, 15(1), 105–122.
Dunn Cavelty, M., & Suter, M. (2009). Public–private partnerships are no silver bullet: An expanded governance model for critical infrastructure protection. International Journal of Critical Infrastructure Protection, 2(4), 179–187.
Entman, R. M. (1993). Framing: Toward clarification of a fractured paradigm. Journal of Communication, 43(4), 51–58.
Eriksson, J. (Ed.). (2001). Threat politics: New perspectives on security, risk and crisis management. Aldershot: Ashgate.
Eriksson, J., & Giacomello, G. (2006). The information revolution, security and international relations: (IR)relevant theory? International Political Science Review, 27(3), 221–244.
Eriksson, J., & Giacomello, G. (Eds.). (2007). International relations and security in the digital age. London: Routledge.
Eriksson, J., & Giacomello, G. (2009). Who controls the internet? Beyond the obstinacy and obsolescence of the state. International Studies Review, 11(1), 205–230.
Eriksson, J., & Giacomello, G. (2013). Content analysis in the digital age: Tools, functions and implications for security. In J. Krueger, B. Nickolay, & S. Gaycken (Eds.), The secure information society: Ethical, legal and political challenges (pp. 137–148). Dordrecht: Springer.
Florencio, D., & Herley, C. (2012, April 14). The cybercrime wave that wasn’t. The New York Times, SR5.
Forsyth, J. W., Jr. (2013). What great powers make it: International order and the logic of cooperation in cyberspace. Strategic Studies Quarterly, 7(1), 93–113.
Giacomello, G. (2004). Bangs for the buck: A cost-benefit analysis of cyberterrorism. Studies in Conflict and Terrorism, 27(5), 387–408.
Giacomello, G. (2005). National governments and control of the internet: A digital challenge. London: Routledge.
Gibson, W. (1984). Neuromancer. New York, NY: Ace Books.
Guzzini, S., & Leander, A. (Eds.). (2006). Constructivism and international relations: Alexander Wendt and his critics. London: Routledge.
Halvorson, K., & Rach, M. (2012). Content strategy for the web (2nd ed.). Berkeley, CA: New Riders.
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber-security, and the Copenhagen school. International Studies Quarterly, 53(4), 1155–1175.
Herzog, S. (2011). Revisiting the Estonian cyber attacks: Digital threats and multinational responses. Journal of Strategic Security, 4(2), 49–60.
Holsti, O. R. (1969). Content analysis for the social sciences and humanities. Reading, MA: Addison-Wesley.
Huddy, L., Feldman, S., & Weber, C. (2007). The political consequences of perceived threat and felt insecurity. The Annals of the American Academy of Political and Social Science, 614, 131–153.
Jordan, T., & Taylor, P. A. (2004). Hacktivism and cyberwars: Rebels with a cause? London: Routledge.
Katzenstein, P. J. (Ed.). (1996). The culture of national security. New York, NY: Columbia University Press.
Kier, E. (1997). Imagining war: French and British military doctrines between the wars. Princeton, NJ: Princeton University Press.
Klotz, A., & Lynch, C. (2007). Strategies for research in constructivist international relations. New York, NY: M. E. Sharp.
Lee, P. Y., Hui, S. C., & Fong, A. C. M. (2003). A structural and content-based analysis for web filtering. Internet Research, 13(1), 27–37.
Leetaru, K. (2011a). Data mining methods for the content analyst: An introduction to the computational analysis of content. London: Routledge.
Leetaru, K. (2011b). Culturomics 2.0: Forecasting large-scale human behavior using global news media tone in time and space. First Monday, 16(9). http://firstmonday.org/ojs/index.php/fm/article/view/3663/3040. Accessed January 29, 2014.
Libicki, M. (2007). Conquest in cyberspace: National security and information warfare. Cambridge: Cambridge University Press.
Liu, B. (2011). Web data mining: Exploring hyperlinks, contents and usage data (2nd ed.). Berlin: Springer.
Mowlana, H. (1997). Global information and world communication: New frontiers in international relations. London: Sage.
Mueller, M. A., & Schmidt, A. (2013). Internet security and networked governance in international relations. International Studies Review, 15(1), 89–104.
Nye, J. S. (2011, February 27). Cyberspace wars. International Herald Tribune. http://belfercenter.hks.harvard.edu/publication/20794/cyberspace_wars.html. Accessed January 28, 2014.
Pera, M. S., & Ng, Y.-K. (2009). A structural, content-similarity measure for detecting spam documents on the web. International Journal of Web Information Systems, 5(4), 431–464.
Phillips, N., & Hardy, C. (2002). Discourse analysis. Thousand Oaks, CA: Sage.
Purkait, S. (2012). Phishing counter measures and their effectiveness – literature review. Information Management and Computer Security, 20(5), 382–420.
Renkema, J. (Ed.). (2009). Discourse, of course: An overview of research in discourse studies. Amsterdam: John Benjamins.
Simmons, B. A. (2011). International studies in the global information age. International Studies Quarterly, 55(3), 589–599.
Simmons, B. A. (2013). International relations in the information age. International Studies Review, 15(1), 1–4.
Singh, J. P. (2014). The power of large-scale interactions through information technologies and changes in cultural identity politics. In M. Mayer, M. Carpes, & R. Knoblich (Eds.), The global politics of science and technology (Vol. 2). Heidelberg: Springer.
Sjøvaag, H., & Stavelin, E. (2012). Web media and the quantitative content analysis: Methodological challenges in measuring online news content. Convergence: The International Journal of Research into New Media Technologies, 18(2), 215–229.
Snow, A. D., & Benford, R. D. (1992). Master frames and cycles of protest. In A. D. Morris & C. McClurg Mueller (Eds.), Frontiers in social movement theory (pp. 133–155). New Haven, CT: Yale University Press.
Srivastava, A. N., & Sahami, M. (Eds.). (2009). Text mining: Classification, clustering, and applications. London: CRC Press.
StatSoft, Inc. (2013). Electronic statistics textbook. Tulsa, OK: StatSoft. http://www.statsoft.com/textbook. Accessed January 28, 2014.
Trochim, W. M. (1999). The research methods knowledge base (2nd ed.). Ithaca, NY: Cornell University Custom Publishing.
Waltz, K. (1959). Man, the state and war. New York, NY: Columbia University Press.
Weare, C., & Lin, W.-Y. (2000). Content analysis of the world wide web: Opportunities and challenges. Social Science Computer Review, 18(3), 272–292.
Weber, R. P. (1990). Basic content analysis. London: Sage.
Weimann, G. (2005). Cyberterrorism: The sum of all fears? Studies in Conflict and Terrorism, 28(2), 129–149.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Eriksson, J., Giacomello, G. (2014). International Relations, Cybersecurity, and Content Analysis: A Constructivist Approach. In: Mayer, M., Carpes, M., Knoblich, R. (eds) The Global Politics of Science and Technology - Vol. 2. Global Power Shift. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55010-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-55010-2_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55009-6
Online ISBN: 978-3-642-55010-2
eBook Packages: Humanities, Social Sciences and LawPolitical Science and International Studies (R0)