0% found this document useful (0 votes)
20 views

Introduction

This document is an introduction to a report about conceptualizing cybersecurity through the lens of positive peace. It argues that viewing cyber peace as merely the absence of hostile actions (negative peace) is insufficient. Instead, cybersecurity should be viewed through the frameworks of human security and positive peace. Human security focuses on securing individuals rather than states, and positive peace aims to eliminate structural violence in addition to direct violence. Considering cybersecurity this way would shift attention to various objects of security and structures needed for security and peace. The introduction lays out why negative peace conceptions are lacking and suggests considering cybersecurity from perspectives of human security and positive peace going forward.

Uploaded by

Gina M. Oropesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Introduction

This document is an introduction to a report about conceptualizing cybersecurity through the lens of positive peace. It argues that viewing cyber peace as merely the absence of hostile actions (negative peace) is insufficient. Instead, cybersecurity should be viewed through the frameworks of human security and positive peace. Human security focuses on securing individuals rather than states, and positive peace aims to eliminate structural violence in addition to direct violence. Considering cybersecurity this way would shift attention to various objects of security and structures needed for security and peace. The introduction lays out why negative peace conceptions are lacking and suggests considering cybersecurity from perspectives of human security and positive peace going forward.

Uploaded by

Gina M. Oropesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

New America

Report Part Title: INTRODUCTION


Report Title: CYBER PEACE
Report Subtitle: Cybersecurity Through the Lens of Positive Peace
Report Author(s): HEATHER M. ROFF
New America (2016)

Stable URL: http://www.jstor.com/stable/resrep10490.3

JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms

New America is collaborating with JSTOR to digitize, preserve and extend access to this
content.

This content downloaded from


128.122.149.96 on Wed, 03 May 2023 03:44:34 +00:00
All use subject to https://about.jstor.org/terms
INTRODUCTION

When one hears the word “cyber,” it is most often risk, deterring attacks. In short, it is a notion
paired with one of these words: security, threats, of “security” that is predominantly a Western
vulnerabilities, exploits, intrusions, attacks, or war. oriented concept tightly linked to politicization and
Indeed, the entire landscape of “cyber” is seen as militarization. As international relations scholar
insecure and hostile. Attempting to make sense Mohammad Ayoob explains, security is seen as
of this space, authors invoke metaphors like the invulnerability, and invulnerability becomes
“Wild West,”1 or something akin to public health linked to “the primacy of political variables,” for
safety concern,2 or they analogize it as a new type those political variables determine “the degree of
of “public commons” 3 like the sea or space, or as a security that states and regimes enjoy.”5 An object,
“state of nature”—and with it a state of war—where thing, or person only becomes important enough to
no law governs and anarchy reigns.4 With each warrant “security” when the state recognizes one as
metaphor or analogy, scholars and practitioners threatening its security. He notes,
suggest ways of solving problems related to
insecurity. In the case of the Wild West, we need Different types of vulnerability, including
a “sheriff” to impose order. In the public health those of the economic and ecological
instance, we need a way of monitoring, responding varieties, become integral components of
and quarantining when necessary for the safety this definition of security only if and when
of others. And for the public commons, we need they become acute enough to take on overtly
a useful way of solving collective action problems political dimensions and threaten state
and resource distribution and protection. When it boundaries, state institutions, or regime
comes to war, however, we need strong capabilities survival.6
to defend our interests and rights.
Ayoob’s insights apply, in many respects, to
Cybersecurity on all of these readings, however, cybersecurity. The vulnerability of cyberspace,
becomes defined as vulnerability reduction or of infrastructures connected through information
elimination. Reducing vulnerabilities is about technologies, the intellectual property of firms, the
protecting oneself, building up defenses, mitigating fragility of a networked economy, are all items that
must be addressed under a Comprehensive National
Cybersecurity Initiative. As President Obama
Much of the scholarship on cyber
explains, the United States must view the cyber
peace assumes that it is merely threat as a threat to national (i.e. state) security,
the absence of any hostile actions. and by doing so: establish a front line of defense,

2 CYBERSECURITY INITIATIVE

This content downloaded from


128.122.149.96 on Wed, 03 May 2023 03:44:34 +00:00
All use subject to https://about.jstor.org/terms
defend against the full spectrum of threats, and To do this, I argue that we should instead
strengthen the cybersecurity environment.7 Where conceptualize cyber peace in terms of positive
“strengthening” the cybersecurity environment peace, and with this step think of cybersecurity
involves “develop[ing] strategies to deter hostile or through human security aims. Cyber peace ought
malicious activity in cyberspace.”8 to be understood in terms of multiple, continuum-
like, dimensions. Doing so will enable us to move
Yet security is not merely about militarized defense. past circular debates, such as whether we ought
Indeed, much work from human security and peace to condone “hacking-back,” to generate new ideas
studies takes a different approach to establishing about the meaning of cybersecurity and peace. The
the conditions for security and peace. Thus it is argument proceeds in three sections.
unfortunate that there is a dearth of scholarship and
policy attention on the notion of cybersecurity and First, I briefly lay out why the cybersecurity as
cyber peace from these other perspectives. negative peace argument fails. Second, I suggest
that we ought to view cybersecurity from the
It is my contention that much of the scholarship on perspectives of human security and positive peace.
cyber peace assumes that it is merely the absence Human security looks to the individual as the
of any hostile actions; it is a “negative” conception appropriate referent to be secured and not the state.
of cyber peace. Moreover, due to this negative Moreover, following scholar Johan Galtung’s peace
conception, one that is conceptually coupled theory, I argue that cyber peace must be grounded
with a highly Westernized view of security, the in a conception of positive peace that eliminates
language and posture of cybersecurity becomes structural forms of violence. Viewing security from
militarized and implicitly linked to the state. While this perspective shifts our attention to the various
it is certainly true that cyber threats to the state do objects of security and various structures we require
exist, many have not materialized, and the vast to become secure, and ultimately, more peaceful.
majority affect other actors not connected or weakly Finally, I suggest some ways forward from a policy
connected to state security. Viewing cyber peace and behavioral perspective to bring about cyber
as negative peace, then, is insufficient to account peace.
for the normative and policy changes needed to
establish a true sense of cybersecurity.

While it is certainly true that cyber threats to


the state do exist, many have not materialized,
and the vast majority affect other actors not
connected or weakly connected to state security.

Cyber Peace: Cybersecurity Through the Lens of Positive Peace 3

This content downloaded from


128.122.149.96 on Wed, 03 May 2023 03:44:34 +00:00
All use subject to https://about.jstor.org/terms

You might also like