International Relations, Cybersecurity, and Content Analysis: A Constructivist Approach
The development and global diffusion of access to the Internet has—as is the case with most new and game-changing technologies—been accompanied with fears and threat perceptions. This chapter argues, on the one hand, that Constructivist IR theory is particularly suited for addressing and interpreting the threat discourses and identity issues which come in focus in cybersecurity. The ease with which cyber-culprits can hide their identity and location, operating through networks of hijacked computers across the world, makes fear-mongering threat and identity discourses a key issue in cybersecurity. On the other hand, this chapter presents content analysis—a set of quantitative methods focusing on key word searches—as a pertinent or even ubiquitous method for both the study and practice of cybersecurity. Through simple and globally accessible interfaces, the entire Web can be scrutinized using content analysis. Equipped with Constructivist theory and content analysis methods, the IR scholar stands prepared to uncover and better understand the massive discursive world of the Internet.
KeywordsCybersecurity Constructivism Content analysis Search string
- Ajith, A., Hassanien, A.-E., & Snášel, V. (Eds.). (2010). Computational social network analysis: Trends, tools and research advances. London: Springer.Google Scholar
- Amoroso, E. G. (2011). Cyber attacks: Protecting national infrastructure. Burlington: Elsevier.Google Scholar
- Avey, P. C., Desh, M. C., Long, D. D., Maliniak, D., Peterson, S., & Tierney, M. J. (2012, January/February). The Beltway vs. the Ivory Tower. Foreign Policy. http://www.foreignpolicy.com/articles/2012/01/03/the_beltway_vs_the_ivory_tower?wp_login_redirect=0. Accessed January 28, 2014.
- Balzacq, T. (Ed.). (2010). Securitization theory: How security problems emerge and dissolve. London: Routledge.Google Scholar
- Benedikt, M. (Ed.). (1991). Cyberspace. Cambridge, MA: The MIT Press.Google Scholar
- Berry, M. W., & Castellanos, M. (Eds.). (2008). Survey of text mining II: Clustering, classification, and retrieval. London: Springer.Google Scholar
- Bueno, P., Dirro, T., Greve, P., Kashyap, R., Marcus, D., Paget, F., et al. (2011). McAfee threats report: First quarter 2011. Santa Clara, CA: McAfee Lab.Google Scholar
- Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. London: Lynne Rienner.Google Scholar
- Carr, M. (2011). The irony of the information age: US power and the internet in international relations. PhD dissertation, Australian National University, Canberra.Google Scholar
- Castells, M. (1996). The rise of the network society (The information age: Economy, society and culture, Vol. 1). Malden, MA: Blackwell.Google Scholar
- Castells, M. (2000). Information age: Rise of the network society (2nd ed., Vol. 1). Malden, MA: Blackwell.Google Scholar
- Clarke, R. A., & Knake, R. K. (2010). Cyberwar: The next threat to national security and what to do about it. New York, NY: HarperCollins.Google Scholar
- Conway, M. (2002). Reality bytes: Cyberterrorism and terrorist ‘use’ of the internet. First Monday, 7(11). http://doras.dcu.ie/498/1/first_mon_7_11_2002.pdf. Accessed January 28, 2014.
- Cukier, K., & Mayer-Schoenberger, V. (2013). The rise of big data: How it’s changing the way we think about the world. Foreign Affairs, May/June, 92(3), 28–40.Google Scholar
- Deibert, R. (2013). Black code: Inside the battle for cyberspace. Toronto: Signal.Google Scholar
- Druckman, D. (2005). Doing research: Methods of inquiry for conflict analysis. London: Sage.Google Scholar
- Dunn Cavelty, M. (2012). The militarization of cyber security as a source of global tension. Social Science Research Network (SSRN). http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2007043. Accessed January 28, 2014.
- Eriksson, J. (Ed.). (2001). Threat politics: New perspectives on security, risk and crisis management. Aldershot: Ashgate.Google Scholar
- Eriksson, J., & Giacomello, G. (Eds.). (2007). International relations and security in the digital age. London: Routledge.Google Scholar
- Eriksson, J., & Giacomello, G. (2013). Content analysis in the digital age: Tools, functions and implications for security. In J. Krueger, B. Nickolay, & S. Gaycken (Eds.), The secure information society: Ethical, legal and political challenges (pp. 137–148). Dordrecht: Springer.CrossRefGoogle Scholar
- Florencio, D., & Herley, C. (2012, April 14). The cybercrime wave that wasn’t. The New York Times, SR5.Google Scholar
- Forsyth, J. W., Jr. (2013). What great powers make it: International order and the logic of cooperation in cyberspace. Strategic Studies Quarterly, 7(1), 93–113.Google Scholar
- Gibson, W. (1984). Neuromancer. New York, NY: Ace Books.Google Scholar
- Guzzini, S., & Leander, A. (Eds.). (2006). Constructivism and international relations: Alexander Wendt and his critics. London: Routledge.Google Scholar
- Halvorson, K., & Rach, M. (2012). Content strategy for the web (2nd ed.). Berkeley, CA: New Riders.Google Scholar
- Holsti, O. R. (1969). Content analysis for the social sciences and humanities. Reading, MA: Addison-Wesley.Google Scholar
- Jordan, T., & Taylor, P. A. (2004). Hacktivism and cyberwars: Rebels with a cause? London: Routledge.Google Scholar
- Katzenstein, P. J. (Ed.). (1996). The culture of national security. New York, NY: Columbia University Press.Google Scholar
- Kier, E. (1997). Imagining war: French and British military doctrines between the wars. Princeton, NJ: Princeton University Press.Google Scholar
- Klotz, A., & Lynch, C. (2007). Strategies for research in constructivist international relations. New York, NY: M. E. Sharp.Google Scholar
- Leetaru, K. (2011a). Data mining methods for the content analyst: An introduction to the computational analysis of content. London: Routledge.Google Scholar
- Leetaru, K. (2011b). Culturomics 2.0: Forecasting large-scale human behavior using global news media tone in time and space. First Monday, 16(9). http://firstmonday.org/ojs/index.php/fm/article/view/3663/3040. Accessed January 29, 2014.
- Mowlana, H. (1997). Global information and world communication: New frontiers in international relations. London: Sage.Google Scholar
- Nye, J. S. (2011, February 27). Cyberspace wars. International Herald Tribune. http://belfercenter.hks.harvard.edu/publication/20794/cyberspace_wars.html. Accessed January 28, 2014.
- Phillips, N., & Hardy, C. (2002). Discourse analysis. Thousand Oaks, CA: Sage.Google Scholar
- Renkema, J. (Ed.). (2009). Discourse, of course: An overview of research in discourse studies. Amsterdam: John Benjamins.Google Scholar
- Singh, J. P. (2014). The power of large-scale interactions through information technologies and changes in cultural identity politics. In M. Mayer, M. Carpes, & R. Knoblich (Eds.), The global politics of science and technology (Vol. 2). Heidelberg: Springer.Google Scholar
- Snow, A. D., & Benford, R. D. (1992). Master frames and cycles of protest. In A. D. Morris & C. McClurg Mueller (Eds.), Frontiers in social movement theory (pp. 133–155). New Haven, CT: Yale University Press.Google Scholar
- Srivastava, A. N., & Sahami, M. (Eds.). (2009). Text mining: Classification, clustering, and applications. London: CRC Press.Google Scholar
- StatSoft, Inc. (2013). Electronic statistics textbook. Tulsa, OK: StatSoft. http://www.statsoft.com/textbook. Accessed January 28, 2014.
- Trochim, W. M. (1999). The research methods knowledge base (2nd ed.). Ithaca, NY: Cornell University Custom Publishing.Google Scholar
- Waltz, K. (1959). Man, the state and war. New York, NY: Columbia University Press.Google Scholar
- Weber, R. P. (1990). Basic content analysis. London: Sage.Google Scholar