Skip to main content

International Relations, Cybersecurity, and Content Analysis: A Constructivist Approach

  • Chapter
  • First Online:

Part of the book series: Global Power Shift ((GLOBAL))

Abstract

The development and global diffusion of access to the Internet has—as is the case with most new and game-changing technologies—been accompanied with fears and threat perceptions. This chapter argues, on the one hand, that Constructivist IR theory is particularly suited for addressing and interpreting the threat discourses and identity issues which come in focus in cybersecurity. The ease with which cyber-culprits can hide their identity and location, operating through networks of hijacked computers across the world, makes fear-mongering threat and identity discourses a key issue in cybersecurity. On the other hand, this chapter presents content analysis—a set of quantitative methods focusing on key word searches—as a pertinent or even ubiquitous method for both the study and practice of cybersecurity. Through simple and globally accessible interfaces, the entire Web can be scrutinized using content analysis. Equipped with Constructivist theory and content analysis methods, the IR scholar stands prepared to uncover and better understand the massive discursive world of the Internet.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Such actors could be colloquially defined as the “super-individuals”.

  2. 2.

    For a wide discussion of “cyberspace” see Benedikt (1991) and Gibson (1984) for the original definition (“an infinite artificial world where humans navigate in information-based space”).

  3. 3.

    For example, a quick analysis of policy-makers’ public speeches on crime and security worldwide would reveal how relatively few times that term appears. A skeptical view of this fact can be found, for instance, in Florencio and Herley (2012). Thus, different hypotheses could be tested to explain which view is most correct.

  4. 4.

    The original “Culturnomics” was limited only to the analysis of books in digital archives (Leetaru 2011b).

  5. 5.

    More specifically, Leetaru (2011b) explores the “news tone and geographic location”.

  6. 6.

    According to this “law”, the number of transistors on integrated circuits doubles approximately every 2 years and more processors mean more computing power. The period was further “reduced” to 18 months.

  7. 7.

    For example the SCADA (system control and data acquisition) controllers that allow operators to remotely check the status and functioning of various production or distribution processes.

  8. 8.

    There are even good open source applications for content analysis such as KH Coder. More can be easily obtained from http://www.sourceforge.net; a Web site dedicated exclusively to Open Source software Including applications for forensic analysis of firewalls and the like.

  9. 9.

    See the Web site of Hamlet II for example, available at http://apb.newmdsx.com/hamlet2.html.

  10. 10.

    The Web site (http://www.kalevleetaru.com) of Kalev H. Leetaru, a recognized expert in computerized content analysis, offers several examples of that type of application.

  11. 11.

    A shorter definition could be “turning text into numbers”. For more technical details see the “text mining” section in the Statsoft Web site at http://www.statsoft.com/textbook/.

References

  • Ajith, A., Hassanien, A.-E., & Snášel, V. (Eds.). (2010). Computational social network analysis: Trends, tools and research advances. London: Springer.

    Google Scholar 

  • Amoroso, E. G. (2011). Cyber attacks: Protecting national infrastructure. Burlington: Elsevier.

    Google Scholar 

  • Avey, P. C., Desh, M. C., Long, D. D., Maliniak, D., Peterson, S., & Tierney, M. J. (2012, January/February). The Beltway vs. the Ivory Tower. Foreign Policy. http://www.foreignpolicy.com/articles/2012/01/03/the_beltway_vs_the_ivory_tower?wp_login_redirect=0. Accessed January 28, 2014.

  • Balzacq, T. (Ed.). (2010). Securitization theory: How security problems emerge and dissolve. London: Routledge.

    Google Scholar 

  • Benedikt, M. (Ed.). (1991). Cyberspace. Cambridge, MA: The MIT Press.

    Google Scholar 

  • Berners-Lee, T., Cailliau, R., Groff, J.-F., & Pollermann, B. (1992). World-wide web: The information universe. Internet Research, 2(1), 52–58.

    Article  Google Scholar 

  • Berry, M. W., & Castellanos, M. (Eds.). (2008). Survey of text mining II: Clustering, classification, and retrieval. London: Springer.

    Google Scholar 

  • Berry, M. W., & Kogan, J. (2010). Text mining: Applications and theory. Chichester, UK: Wiley.

    Book  Google Scholar 

  • Bueno, P., Dirro, T., Greve, P., Kashyap, R., Marcus, D., Paget, F., et al. (2011). McAfee threats report: First quarter 2011. Santa Clara, CA: McAfee Lab.

    Google Scholar 

  • Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. London: Lynne Rienner.

    Google Scholar 

  • Carr, M. (2011). The irony of the information age: US power and the internet in international relations. PhD dissertation, Australian National University, Canberra.

    Google Scholar 

  • Castells, M. (1996). The rise of the network society (The information age: Economy, society and culture, Vol. 1). Malden, MA: Blackwell.

    Google Scholar 

  • Castells, M. (2000). Information age: Rise of the network society (2nd ed., Vol. 1). Malden, MA: Blackwell.

    Google Scholar 

  • Clarke, R. A., & Knake, R. K. (2010). Cyberwar: The next threat to national security and what to do about it. New York, NY: HarperCollins.

    Google Scholar 

  • Conway, M. (2002). Reality bytes: Cyberterrorism and terrorist ‘use’ of the internet. First Monday, 7(11). http://doras.dcu.ie/498/1/first_mon_7_11_2002.pdf. Accessed January 28, 2014.

  • Cukier, K., & Mayer-Schoenberger, V. (2013). The rise of big data: How it’s changing the way we think about the world. Foreign Affairs, May/June, 92(3), 28–40.

    Google Scholar 

  • Deibert, R. (2013). Black code: Inside the battle for cyberspace. Toronto: Signal.

    Google Scholar 

  • Druckman, D. (2005). Doing research: Methods of inquiry for conflict analysis. London: Sage.

    Google Scholar 

  • Dunn Cavelty, M. (2008). Cyber-terror—looming threat or phantom menace? The framing of the US cyber-threat debate. Journal of Information Technology and Politics, 4(1), 19–36.

    Article  Google Scholar 

  • Dunn Cavelty, M. (2012). The militarization of cyber security as a source of global tension. Social Science Research Network (SSRN). http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2007043. Accessed January 28, 2014.

  • Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representation with an impact in the cyber-security discourse. International Studies Review, 15(1), 105–122.

    Article  Google Scholar 

  • Dunn Cavelty, M., & Suter, M. (2009). Public–private partnerships are no silver bullet: An expanded governance model for critical infrastructure protection. International Journal of Critical Infrastructure Protection, 2(4), 179–187.

    Article  Google Scholar 

  • Entman, R. M. (1993). Framing: Toward clarification of a fractured paradigm. Journal of Communication, 43(4), 51–58.

    Article  Google Scholar 

  • Eriksson, J. (Ed.). (2001). Threat politics: New perspectives on security, risk and crisis management. Aldershot: Ashgate.

    Google Scholar 

  • Eriksson, J., & Giacomello, G. (2006). The information revolution, security and international relations: (IR)relevant theory? International Political Science Review, 27(3), 221–244.

    Article  Google Scholar 

  • Eriksson, J., & Giacomello, G. (Eds.). (2007). International relations and security in the digital age. London: Routledge.

    Google Scholar 

  • Eriksson, J., & Giacomello, G. (2009). Who controls the internet? Beyond the obstinacy and obsolescence of the state. International Studies Review, 11(1), 205–230.

    Article  Google Scholar 

  • Eriksson, J., & Giacomello, G. (2013). Content analysis in the digital age: Tools, functions and implications for security. In J. Krueger, B. Nickolay, & S. Gaycken (Eds.), The secure information society: Ethical, legal and political challenges (pp. 137–148). Dordrecht: Springer.

    Chapter  Google Scholar 

  • Florencio, D., & Herley, C. (2012, April 14). The cybercrime wave that wasn’t. The New York Times, SR5.

    Google Scholar 

  • Forsyth, J. W., Jr. (2013). What great powers make it: International order and the logic of cooperation in cyberspace. Strategic Studies Quarterly, 7(1), 93–113.

    Google Scholar 

  • Giacomello, G. (2004). Bangs for the buck: A cost-benefit analysis of cyberterrorism. Studies in Conflict and Terrorism, 27(5), 387–408.

    Article  Google Scholar 

  • Giacomello, G. (2005). National governments and control of the internet: A digital challenge. London: Routledge.

    Book  Google Scholar 

  • Gibson, W. (1984). Neuromancer. New York, NY: Ace Books.

    Google Scholar 

  • Guzzini, S., & Leander, A. (Eds.). (2006). Constructivism and international relations: Alexander Wendt and his critics. London: Routledge.

    Google Scholar 

  • Halvorson, K., & Rach, M. (2012). Content strategy for the web (2nd ed.). Berkeley, CA: New Riders.

    Google Scholar 

  • Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber-security, and the Copenhagen school. International Studies Quarterly, 53(4), 1155–1175.

    Article  Google Scholar 

  • Herzog, S. (2011). Revisiting the Estonian cyber attacks: Digital threats and multinational responses. Journal of Strategic Security, 4(2), 49–60.

    Article  Google Scholar 

  • Holsti, O. R. (1969). Content analysis for the social sciences and humanities. Reading, MA: Addison-Wesley.

    Google Scholar 

  • Huddy, L., Feldman, S., & Weber, C. (2007). The political consequences of perceived threat and felt insecurity. The Annals of the American Academy of Political and Social Science, 614, 131–153.

    Article  Google Scholar 

  • Jordan, T., & Taylor, P. A. (2004). Hacktivism and cyberwars: Rebels with a cause? London: Routledge.

    Google Scholar 

  • Katzenstein, P. J. (Ed.). (1996). The culture of national security. New York, NY: Columbia University Press.

    Google Scholar 

  • Kier, E. (1997). Imagining war: French and British military doctrines between the wars. Princeton, NJ: Princeton University Press.

    Google Scholar 

  • Klotz, A., & Lynch, C. (2007). Strategies for research in constructivist international relations. New York, NY: M. E. Sharp.

    Google Scholar 

  • Lee, P. Y., Hui, S. C., & Fong, A. C. M. (2003). A structural and content-based analysis for web filtering. Internet Research, 13(1), 27–37.

    Article  Google Scholar 

  • Leetaru, K. (2011a). Data mining methods for the content analyst: An introduction to the computational analysis of content. London: Routledge.

    Google Scholar 

  • Leetaru, K. (2011b). Culturomics 2.0: Forecasting large-scale human behavior using global news media tone in time and space. First Monday, 16(9). http://firstmonday.org/ojs/index.php/fm/article/view/3663/3040. Accessed January 29, 2014.

  • Libicki, M. (2007). Conquest in cyberspace: National security and information warfare. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Liu, B. (2011). Web data mining: Exploring hyperlinks, contents and usage data (2nd ed.). Berlin: Springer.

    Book  Google Scholar 

  • Mowlana, H. (1997). Global information and world communication: New frontiers in international relations. London: Sage.

    Google Scholar 

  • Mueller, M. A., & Schmidt, A. (2013). Internet security and networked governance in international relations. International Studies Review, 15(1), 89–104.

    Article  Google Scholar 

  • Nye, J. S. (2011, February 27). Cyberspace wars. International Herald Tribune. http://belfercenter.hks.harvard.edu/publication/20794/cyberspace_wars.html. Accessed January 28, 2014.

  • Pera, M. S., & Ng, Y.-K. (2009). A structural, content-similarity measure for detecting spam documents on the web. International Journal of Web Information Systems, 5(4), 431–464.

    Article  Google Scholar 

  • Phillips, N., & Hardy, C. (2002). Discourse analysis. Thousand Oaks, CA: Sage.

    Google Scholar 

  • Purkait, S. (2012). Phishing counter measures and their effectiveness – literature review. Information Management and Computer Security, 20(5), 382–420.

    Article  Google Scholar 

  • Renkema, J. (Ed.). (2009). Discourse, of course: An overview of research in discourse studies. Amsterdam: John Benjamins.

    Google Scholar 

  • Simmons, B. A. (2011). International studies in the global information age. International Studies Quarterly, 55(3), 589–599.

    Article  Google Scholar 

  • Simmons, B. A. (2013). International relations in the information age. International Studies Review, 15(1), 1–4.

    Article  Google Scholar 

  • Singh, J. P. (2014). The power of large-scale interactions through information technologies and changes in cultural identity politics. In M. Mayer, M. Carpes, & R. Knoblich (Eds.), The global politics of science and technology (Vol. 2). Heidelberg: Springer.

    Google Scholar 

  • Sjøvaag, H., & Stavelin, E. (2012). Web media and the quantitative content analysis: Methodological challenges in measuring online news content. Convergence: The International Journal of Research into New Media Technologies, 18(2), 215–229.

    Article  Google Scholar 

  • Snow, A. D., & Benford, R. D. (1992). Master frames and cycles of protest. In A. D. Morris & C. McClurg Mueller (Eds.), Frontiers in social movement theory (pp. 133–155). New Haven, CT: Yale University Press.

    Google Scholar 

  • Srivastava, A. N., & Sahami, M. (Eds.). (2009). Text mining: Classification, clustering, and applications. London: CRC Press.

    Google Scholar 

  • StatSoft, Inc. (2013). Electronic statistics textbook. Tulsa, OK: StatSoft. http://www.statsoft.com/textbook. Accessed January 28, 2014.

  • Trochim, W. M. (1999). The research methods knowledge base (2nd ed.). Ithaca, NY: Cornell University Custom Publishing.

    Google Scholar 

  • Waltz, K. (1959). Man, the state and war. New York, NY: Columbia University Press.

    Google Scholar 

  • Weare, C., & Lin, W.-Y. (2000). Content analysis of the world wide web: Opportunities and challenges. Social Science Computer Review, 18(3), 272–292.

    Article  Google Scholar 

  • Weber, R. P. (1990). Basic content analysis. London: Sage.

    Google Scholar 

  • Weimann, G. (2005). Cyberterrorism: The sum of all fears? Studies in Conflict and Terrorism, 28(2), 129–149.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Johan Eriksson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Eriksson, J., Giacomello, G. (2014). International Relations, Cybersecurity, and Content Analysis: A Constructivist Approach. In: Mayer, M., Carpes, M., Knoblich, R. (eds) The Global Politics of Science and Technology - Vol. 2. Global Power Shift. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55010-2_12

Download citation

Publish with us

Policies and ethics