Abstract
This chapter addresses the analysis of the phenomenon of modern technique by Martin Heidegger, especially regarding the issue of information societies and the role of the virtual network with respect to providing information about the political behavior of states, which accordingly affects the international security environment. We propose a debate on international relations theory, specifically from the perspective adopted by the Copenhagen School of International Security Studies. We conduct a study from the perception that cyberspace, as a multiverse, is not uniform, and therefore, the various actors emerge with different capacities for political action depending on the dependency of the states and societies to use new information and communication technologies (NICTs) as well as the interconnections with critical infrastructures (i.e., Critical Information Infrastructure).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Briefly, for Buzan et al. (1998), demonstrating the influence of constructivist formulations in international relations, security would be a self-referential practice: the threat is not objective, but defined in an intersubjective process.
- 2.
As the authors say, “Thus, the exact definition and criteria of securitization is constituted by the intersubjective establishment of an existential threat with a saliency sufficient to have substantial political effects” (Buzan et al., 1998: 25).
- 3.
References
Boutroux, E. (1920). The contingency of the laws of nature. New York: The Open Court Publishing Company.
Bauman, Z. (2002). Reconnaissance Wars of the Planetary Frontierland. Theory, Culture and Society, 19(4): 81–90.
Acácio, I. (2011). Segurança cibernética: análise sobre a política de defesa Brasileira (2000–2011). Undergraduate Dissertation. (B.A. in International Relations/Strategic Studies), Universidade Federal Fluminense, Niterói.
Buzan, B., Waever, O., & Wilde, J. (1998). Security:A new framework for analysis. London: Lynne Rienner.
Castells, M. (2000). The rise of the network society. London: Blackwell Publishers.
Castells, M. (2004). Network society—a cross-cultural perspective. London: Edward Elgar Publishing Limited.
Castells, M. (2007). Communication, power and counter-power in the network society. International Journal of Communication, 1, 238–266.
Clarke, R., & Knake, R. (2010). Cyber war: The next threat to national security and what to do about it. New York: Harper Collins.
Deibert, R. (2002). Circuits of power: Security in the internet environment. In J. N. Rosenau & J. P. Singh (Eds.), Information technologies and global politics: The changing scope of power and governance (pp. 115–142). Albany: State University of New York.
Derian, J. D. (1993). The value of security: Hobbes, marx, nietzsche, and baudrillard. In D. Campbell & M. Dillon (Eds.), The political subject of violence. Manchester: Manchester University Press.
Devriendt, L., Boulton, A., Brunn, S., et al. (2011). Searching for cyberspace: The position of major cities in the information age. Journal of Urban Technology, 18(1), 73–92.
Dunn, M., Mauer, V.& Hensel, F. (2007). Power and security in the information age: Investigating the role of the state in cyberspace. Hampshire: Ashgate.
Dunn, M. & Brunner, E. (2007) Introduction: Information, power and security—an outline of debates and implications In M. Dunn, V. Mauer, & F. Hensel (Eds.), Power and security in the information age: Investigating the role of the state in cyberspace. Hampshire: Ashgate.
Dunn, M. (2007). Securing the information age: The challenges of complexity for critical infrastructure protection and IR theory. In J. Eriksson & G. Giacomello (Eds.), International relations and security in the digital age. London: Routledge.
Guzzini, S., & Jung, D. (2004). Contemporary security analysis and copenhagen peace research. London: Routledge.
Hansen, L. & Nissenbaum, H. (2009). Digital disaster, cyber security and the copenhagen school. International Studies Quarterly No. 53 (pp. 1555–1575).
Hart, Catherine. (2011). Mobilizing the cyberspace race: the securitization of the internet and its implications for civil liberties. Cyber-Surveillance in Everyday Life: An International Workshop.
Heidegger, M. (1977). The question concerning technology and other essays. (Trans:William Lovitt). New York: Harper and Row.
Hensel, F. (2007). Critical infrastructures: Vulnerabilities, threats, responses. CSS analysis in security policy, n. 16, v. 2. Zurich: Center for Security Studies (CSS).
Nissenbaum, H. (2005). Where computer security meets national security. Ethics and Information Technology, 7(2), 61–73.
Stone, M. (2009). Security according to buzan: A comprehensive analysis. Security Discussion Papers Series, No. 1, Spring.
Suarez, M. (2012). As Guerras de George W. Appris, Curitiba: Bush e o Terrorismo no Século XXI. Ed.
Suarez, M., Acácio,I., Brancoli, F. & Monteiro, L. (2011). The limits and perspectives of securitization: Studies in the south american contemporary security context. In: ISSS/ISAC Annual Conference 2011. Irvine, Califórnia, USA.
Virilio, Paul. (2005). The information bomb. London: Verso.
Virilio, Paul. (2006). Speed and politics. Los Angeles: Semiotext (e).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Garcia, S.M.A., Palhares, A.I.D. (2014). Reflections on Virtual to Real: Modern Technique, International Security Studies and Cyber Security Environment. In: Kremer, JF., Müller, B. (eds) Cyberspace and International Relations. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37481-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-37481-4_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37480-7
Online ISBN: 978-3-642-37481-4
eBook Packages: Humanities, Social Sciences and LawPolitical Science and International Studies (R0)