Cyber security and the Leviathan. / Da Silva, Joseph.

In: Computers and Security, Vol. 116, 102674, 05.2022.

Research output: Contribution to journalArticlepeer-review

Published

Standard

Cyber security and the Leviathan. / Da Silva, Joseph.

In: Computers and Security, Vol. 116, 102674, 05.2022.

Research output: Contribution to journalArticlepeer-review

Harvard

APA

Vancouver

Author

Da Silva, Joseph. / Cyber security and the Leviathan. In: Computers and Security. 2022 ; Vol. 116.

BibTeX

@article{d0c77f40974749fe89b2812d55ba47d9,
title = "Cyber security and the Leviathan",
abstract = "Dedicated cyber-security functions are common in commercial businesses, who are confronted by evolving and pervasive threats of data breaches and other perilous security events. Such businesses are enmeshed with the wider societies in which they operate. Using data gathered from in-depth, semi-structured interviews with 15 Chief Information Security Officers, as well as six senior organisational leaders, we show that the work of political philosopher Thomas Hobbes, particularly Leviathan, offers a useful lens through which to understand the context of these functions and of cyber security in Western society. Our findings indicate that cyber security within these businesses demonstrates a number of Hobbesian features that are further implicated in, and provide significant benefits to, the wider Leviathan-esque state. These include the normalisation of intrusive controls, such as surveillance, and the stimulation of consumption. We conclude by suggesting implications for cyber-security practitioners, in particular, the reflexivity that these perspectives offer, as well as for businesses and other researchers.",
author = "{Da Silva}, Joseph",
year = "2022",
month = may,
doi = "10.1016/j.cose.2022.102674",
language = "English",
volume = "116",
journal = "Computers and Security",
issn = "0167-4048",
publisher = "Elsevier Limited",

}

RIS

TY - JOUR

T1 - Cyber security and the Leviathan

AU - Da Silva, Joseph

PY - 2022/5

Y1 - 2022/5

N2 - Dedicated cyber-security functions are common in commercial businesses, who are confronted by evolving and pervasive threats of data breaches and other perilous security events. Such businesses are enmeshed with the wider societies in which they operate. Using data gathered from in-depth, semi-structured interviews with 15 Chief Information Security Officers, as well as six senior organisational leaders, we show that the work of political philosopher Thomas Hobbes, particularly Leviathan, offers a useful lens through which to understand the context of these functions and of cyber security in Western society. Our findings indicate that cyber security within these businesses demonstrates a number of Hobbesian features that are further implicated in, and provide significant benefits to, the wider Leviathan-esque state. These include the normalisation of intrusive controls, such as surveillance, and the stimulation of consumption. We conclude by suggesting implications for cyber-security practitioners, in particular, the reflexivity that these perspectives offer, as well as for businesses and other researchers.

AB - Dedicated cyber-security functions are common in commercial businesses, who are confronted by evolving and pervasive threats of data breaches and other perilous security events. Such businesses are enmeshed with the wider societies in which they operate. Using data gathered from in-depth, semi-structured interviews with 15 Chief Information Security Officers, as well as six senior organisational leaders, we show that the work of political philosopher Thomas Hobbes, particularly Leviathan, offers a useful lens through which to understand the context of these functions and of cyber security in Western society. Our findings indicate that cyber security within these businesses demonstrates a number of Hobbesian features that are further implicated in, and provide significant benefits to, the wider Leviathan-esque state. These include the normalisation of intrusive controls, such as surveillance, and the stimulation of consumption. We conclude by suggesting implications for cyber-security practitioners, in particular, the reflexivity that these perspectives offer, as well as for businesses and other researchers.

U2 - 10.1016/j.cose.2022.102674

DO - 10.1016/j.cose.2022.102674

M3 - Article

VL - 116

JO - Computers and Security

JF - Computers and Security

SN - 0167-4048

M1 - 102674

ER -