Skip to main content

Reflections on Virtual to Real: Modern Technique, International Security Studies and Cyber Security Environment

  • Chapter
  • First Online:
Cyberspace and International Relations

Abstract

This chapter addresses the analysis of the phenomenon of modern technique by Martin Heidegger, especially regarding the issue of information societies and the role of the virtual network with respect to providing information about the political behavior of states, which accordingly affects the international security environment. We propose a debate on international relations theory, specifically from the perspective adopted by the Copenhagen School of International Security Studies. We conduct a study from the perception that cyberspace, as a multiverse, is not uniform, and therefore, the various actors emerge with different capacities for political action depending on the dependency of the states and societies to use new information and communication technologies (NICTs) as well as the interconnections with critical infrastructures (i.e., Critical Information Infrastructure).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Briefly, for Buzan et al. (1998), demonstrating the influence of constructivist formulations in international relations, security would be a self-referential practice: the threat is not objective, but defined in an intersubjective process.

  2. 2.

    As the authors say, “Thus, the exact definition and criteria of securitization is constituted by the intersubjective establishment of an existential threat with a saliency sufficient to have substantial political effects” (Buzan et al., 1998: 25).

  3. 3.

    A more detailed version of this topic is developed in Acácio (2011); Suarez et al (2011).

References

  • Boutroux, E. (1920). The contingency of the laws of nature. New York: The Open Court Publishing Company.

    Google Scholar 

  • Bauman, Z. (2002). Reconnaissance Wars of the Planetary Frontierland. Theory, Culture and Society, 19(4): 81–90.

    Google Scholar 

  • Acácio, I. (2011). Segurança cibernética: análise sobre a política de defesa Brasileira (2000–2011). Undergraduate Dissertation. (B.A. in International Relations/Strategic Studies), Universidade Federal Fluminense, Niterói.

    Google Scholar 

  • Buzan, B., Waever, O., & Wilde, J. (1998). Security:A new framework for analysis. London: Lynne Rienner.

    Google Scholar 

  • Castells, M. (2000). The rise of the network society. London: Blackwell Publishers.

    Google Scholar 

  • Castells, M. (2004). Network society—a cross-cultural perspective. London: Edward Elgar Publishing Limited.

    Google Scholar 

  • Castells, M. (2007). Communication, power and counter-power in the network society. International Journal of Communication, 1, 238–266.

    Google Scholar 

  • Clarke, R., & Knake, R. (2010). Cyber war: The next threat to national security and what to do about it. New York: Harper Collins.

    Google Scholar 

  • Deibert, R. (2002). Circuits of power: Security in the internet environment. In J. N. Rosenau & J. P. Singh (Eds.), Information technologies and global politics: The changing scope of power and governance (pp. 115–142). Albany: State University of New York.

    Google Scholar 

  • Derian, J. D. (1993). The value of security: Hobbes, marx, nietzsche, and baudrillard. In D. Campbell & M. Dillon (Eds.), The political subject of violence. Manchester: Manchester University Press.

    Google Scholar 

  • Devriendt, L., Boulton, A., Brunn, S., et al. (2011). Searching for cyberspace: The position of major cities in the information age. Journal of Urban Technology, 18(1), 73–92.

    Article  Google Scholar 

  • Dunn, M., Mauer, V.& Hensel, F. (2007). Power and security in the information age: Investigating the role of the state in cyberspace. Hampshire: Ashgate.

    Google Scholar 

  • Dunn, M. & Brunner, E. (2007) Introduction: Information, power and security—an outline of debates and implications In M. Dunn, V. Mauer, & F. Hensel (Eds.), Power and security in the information age: Investigating the role of the state in cyberspace. Hampshire: Ashgate.

    Google Scholar 

  • Dunn, M. (2007). Securing the information age: The challenges of complexity for critical infrastructure protection and IR theory. In J. Eriksson & G. Giacomello (Eds.), International relations and security in the digital age. London: Routledge.

    Google Scholar 

  • Guzzini, S., & Jung, D. (2004). Contemporary security analysis and copenhagen peace research. London: Routledge.

    Google Scholar 

  • Hansen, L. & Nissenbaum, H. (2009). Digital disaster, cyber security and the copenhagen school. International Studies Quarterly No. 53 (pp. 1555–1575).

    Google Scholar 

  • Hart, Catherine. (2011). Mobilizing the cyberspace race: the securitization of the internet and its implications for civil liberties. Cyber-Surveillance in Everyday Life: An International Workshop.

    Google Scholar 

  • Heidegger, M. (1977). The question concerning technology and other essays. (Trans:William Lovitt). New York: Harper and Row.

    Google Scholar 

  • Hensel, F. (2007). Critical infrastructures: Vulnerabilities, threats, responses. CSS analysis in security policy, n. 16, v. 2. Zurich: Center for Security Studies (CSS).

    Google Scholar 

  • Nissenbaum, H. (2005). Where computer security meets national security. Ethics and Information Technology, 7(2), 61–73.

    Google Scholar 

  • Stone, M. (2009). Security according to buzan: A comprehensive analysis. Security Discussion Papers Series, No. 1, Spring.

    Google Scholar 

  • Suarez, M. (2012). As Guerras de George W. Appris, Curitiba: Bush e o Terrorismo no Século XXI. Ed.

    Google Scholar 

  • Suarez, M., Acácio,I., Brancoli, F. & Monteiro, L. (2011). The limits and perspectives of securitization: Studies in the south american contemporary security context. In: ISSS/ISAC Annual Conference 2011. Irvine, Califórnia, USA.

    Google Scholar 

  • Virilio, Paul. (2005). The information bomb. London: Verso.

    Google Scholar 

  • Virilio, Paul. (2006). Speed and politics. Los Angeles: Semiotext (e).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suarez Marcial A. Garcia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Garcia, S.M.A., Palhares, A.I.D. (2014). Reflections on Virtual to Real: Modern Technique, International Security Studies and Cyber Security Environment. In: Kremer, JF., Müller, B. (eds) Cyberspace and International Relations. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37481-4_15

Download citation

Publish with us

Policies and ethics