What's in a Name? Metaphors and Cybersecurity

作者: Jordan Branch

DOI: 10.1017/S002081832000051X

关键词:

摘要: For more than a decade, the United States military has conceptualized and discussed the Internet and related systems as “cyberspace,” understood as a “domain” of conflict like land, sea, air, and outer space. How and why did this concept become entrenched in US doctrine? What are its effects? Focusing on the emergence and consolidation of this terminology, I make three arguments about the role of language in cybersecurity policy. First, I propose a new, politically consequential category of metaphor: foundational metaphors, implied by using particular labels rather than stated outright. These metaphors support specific ways to understand complex issues, provide discursive resources to some arguments over others, and shape policy contestation and outcomes. Second, I present a detailed empirical study of US military strategy and doctrine that traces the emergence and consolidation of terminology built on the “cyberspace domain.” This concept supported implicit metaphorical correspondences between the Internet and physical space, yielding specific analogies and arguments for understanding the Internet and its effects. Third, I focus on the rhetorical effects of this terminology to reveal two important institutional consequences: this language has been essential to expanding the military's role in cybersecurity, and specific interests within the Department of Defense have used this framework to support the creation of US Cyber Command. These linguistic effects in the United States also have implications for how other states approach cybersecurity, for how international law is applied to cyber operations, and for how International Relations understands language and technological change.

参考文章(122)
Stefan Fritsch, Technology and Global Affairs International Studies Perspectives. ,vol. 12, pp. 27- 45 ,(2011) , 10.1111/J.1528-3585.2010.00417.X
Jack L. Goldsmith, The Internet and the Abiding Significance of Territorial Sovereignty Indiana Journal of Global Legal Studies. ,vol. 5, pp. 475- ,(1998)
O Wæver, B.G. Buzan, de Jaap Wilde, Security: A New Framework for Analysis ,(1997)
Jon R. Lindsay, Stuxnet and the Limits of Cyber Warfare Security Studies. ,vol. 22, pp. 365- 404 ,(2013) , 10.1080/09636412.2013.816122
JENNIFER MILLIKEN, The Study of Discourse in International Relations: A Critique of Research and Methods European Journal of International Relations. ,vol. 5, pp. 225- 254 ,(1999) , 10.1177/1354066199005002003
Teenie Matlock, Spencer C. Castro, Morgan Fleming, Timothy M. Gann, Paul P. Maglio, Spatial Metaphors of Web Use Spatial Cognition and Computation. ,vol. 14, pp. 306- 320 ,(2014) , 10.1080/13875868.2014.945587
Wayne Sandholtz, Dynamics of International Norm Change: Rules against Wartime Plunder European Journal of International Relations. ,vol. 14, pp. 101- 131 ,(2008) , 10.1177/1354066107087766