UPSI Digital Repository (UDRep)
Start | FAQ | About
Menu Icon

QR Code Link :

Type :article
Subject :HC Economic History and Conditions
ISBN :9780000000000
Main Author :Wan Rosalili Wan Rosli
Title :Governing cyber espionage threats via the integration of the risk society-cyber securitisation theory
Place of Production :Tanjung Malim
Publisher :Fakulti Pengurusan dan Ekonomi
Year of Publication :2021
Notes :3rd IEEE International Virtual Conference on Innovations in Power and Advanced Computing Technologies, i-PACT 2021
Corporate Name :Universiti Pendidikan Sultan Idris
HTTP Link :Click to view web link

Abstract : Universiti Pendidikan Sultan Idris
In the last decade, virtual attacks in the form of cyber espionage has become more and more rampant. The commission of such crime is through state and non-state backed actors against government websites, public and private networks, individuals and also economic giants. Cyber espionage is seen as a developing crime due to the unlimited connectivity of these cybercriminals to cyberspace which translates it as a visible threat to national security. The risk of cyber espionage is more prevalent and viable as the cyberspace environment facilitates anonymity. The predominant theories adopted to understand cyber espionage is the Risk Society Theory (RST) and the Cyber-Securitisation Theory (CST). However, on their own, these two theories are deficient in that RST relies on the risks and insecurities that come with modernisation, and CST only focuses on the transformation of a domain into a matter of national security. Given these problems, this paper aims at examining each model and expanding and integrating the RST and CST, which would mitigate the understanding of cyber espionage and modalities to prevent such crime. This paper employs a qualitative methodology, with primary data derived from semi-structured interviews with appropriate respondents. The data is triangulated using specialists from two different ministries. Secondary data sources include applicable cyber law, the Penal Code, books, academic publications, online databases, and library-based sources. The findings suggest that focusing on securitisation alone will not be effective in governing such crime, instead, understanding the risks and how to manage and mitigate such risks would be more effective. The integration of both theories would be significant to stakeholders especially government entities that focused on cybersecurity and also endorses the concept of individual responsibility for corporate entities and computer users in protecting themselves against such crime. ? 2021 IEEE.

References

Ahmad, A. (2016). A Cyber Exercise Post Assessment Framework.Malaysia Perspectives, Retrieved from www.scopus.com

Atlam, H. F., Alenezi, A., Alassafi, M. O., Alshdadi, A. A., & Wills, G. B. (2019). Security, cybercrime and digital forensics for IOT doi:10.1007/978-3-030-33596-0_22 Retrieved from www.scopus.com

Banks, W. (2014). Cyber espionage, surveillance, and international law: Finding common ground. SSRN Electronic Journal, Retrieved from www.scopus.com

Barnes, I. A. (2018). Implementation of Active Cyber Defense Measures by Private Entities: The Need for an International Accord to Address Disputes, Retrieved from www.scopus.com

Beck, U. (2020). Risk society. Essential concepts of global environmental governance (pp. 219-221) Retrieved from www.scopus.com

Bederna, Z., & Szadeczky, T. (2019). Cyber espionage through botnets. Security Journal, , 1-20. Retrieved from www.scopus.com

Caravelli, J. (2019). The geopolitics of cyber and cyber espionage. Cyber Security: Threats and Responses for Government and Business, 43 Retrieved from www.scopus.com

Chesterman, S. (2006). The spy who came in from the cold war: Intelligence and international law. Michigan Journal of International Law, 27(1071), 1071-1130. Retrieved from www.scopus.com

Christou, G. (2019). The collective securitisation of cyberspace in the european union. West European Politics, 42(2), 278-301. doi:10.1080/01402382.2018.1510195

Claessen, E. (2020). Reshaping the internet – the impact of the securitisation of internet infrastructure on approaches to internet governance: The case of russia and the EU. Journal of Cyber Policy, 5(1), 140-157. Retrieved from www.scopus.com

Claessen, E. (2020). Reshaping the internet – the impact of the securitisation of internet infrastructure on approaches to internet governance: The case of russia and the EU. Journal of Cyber Policy, 5(1), 140-157. Retrieved from www.scopus.com

de Amorim, W. S., & de Andrade Guerra, J. B. S. O. (2020). Pandemics, global risks and adaptation: Challenges for a changing world. Research in Globalization, 2 doi:10.1016/j.resglo.2020.100023

Deibert, R. J. (2009). Cyber-security and threat politics: US efforts to secure the information age. International Studies Review, 11(2), 373-375. Retrieved from www.scopus.com

Dhanapal, S., & Sabaruddin, J. S. (2017). Prevention of terrorism: An initial exploration of malaysia's POTA 2015. Pertanika Journal of Social Sciences and Humanities, 25(2), 783-804. Retrieved from www.scopus.com

Dixit, P., & Silakari, S. (2021). Deep learning algorithms for cybersecurity applications: A technological and status review. Computer Science Review, 39 doi:10.1016/j.cosrev.2020.100317

Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105-122. doi:10.1111/misr.12023

Fidler, D. P. (2013). Economic cyber espionage and international law: Controversies involving government acquisition of trade secrets through cyber technologies. ASIL Insights, 17(10) Retrieved from www.scopus.com

Fouad, S. A., & Ghaleb, A. A. (2020). Niles Journal for Geriatric and Gerontology, 3, 70-73. Retrieved from www.scopus.com

Giddens, A. (1999). Risk and responsibility. Modern Law Review, 62(1), 1-10. Retrieved from www.scopus.com

Hamin, Z., & Rosli, W. R. W. (2018). Cloaked by cyber space: A legal response to the risks of cyber stalking in malaysia. International Journal of Cyber Criminology, 12(1), 316-332. doi:10.5281/zenodo.1467931

Hamin, Z., & Rosli, W. R. W. (2018). Cloaked by cyber space: A legal response to the risks of cyber stalking in malaysia. International Journal of Cyber Criminology, 12(1), 316-332. doi:10.5281/zenodo.1467931

Hansen, L. P. (2020). The spy who never has to go out into the cold: Cyber espionage. Encyclopedia of Criminal Activities and the Deep Web, , 258-270. Retrieved from www.scopus.com

Harris, J. (2020). China–US tensions: Is globalisation dead? International Critical Thought, 10(2), 263-281. doi:10.1080/21598282.2020.1775026

Herrmann, D. (2019). Cyber espionage and cyber defence. Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace (pp. 83-106) doi:10.1007/978-3-658-25652-4_5 Retrieved from www.scopus.com

Hersee, S. (2020). The Cyber Security Dilemma and the Securitisation of Cyberspace, Retrieved from www.scopus.com

Hore, S., & Raychaudhuri, K. (2021). Cyber Espionage—An ethical analysis doi:10.1007/978-981-15-6067-5_5 Retrieved from www.scopus.com

Jalali, M. (2021). Espionage in modern international law and necessity of codification of global provisions. Public Law Studies Quarterly, 51, 329-354. Retrieved from www.scopus.com

Jalil, J. A., Hassan, H., Rahman, N. A., Ali, R. B. R. M., Mohamed, D., & Najib, A. (2020). Business under threat: The criminal liability of trade secret theft in malaysia? International Journal of Business and Society, 21(S1), 49-65. Retrieved from www.scopus.com

Kamaruddin, S., Rosli, W. R. W., Abd Rani, A. R., Azlinbte Md Zaki, N. Z., & Omar, M. F. (2020). When love is jeopardized: Governing online love scams in malaysia. International Journal of Advanced Science and Technology, 29(6), 391-397. Retrieved from www.scopus.com

Khan, S., Khan, N., & Tan, O. (2020). Efficiency of legal and regulatory framework in combating cybercrime in malaysia. Understanding Digital Industry: Proceedings of the Conference on Managing Digital Industry, Technology and Entrepreneurship (Comdite 2019), , 333-336. Retrieved from www.scopus.com

Kittichaisaree, K. (2019). Cyber espionage. Public International Law of Cyberspace, , 233-262. Retrieved from www.scopus.com

Libicki, M. C. (2018). Drawing inferences from cyber espionage. Paper presented at the International Conference on Cyber Conflict, CYCON, , 2018-May 109-121. doi:10.23919/CYCON.2018.8405013 Retrieved from www.scopus.com

Longobardo, M. (2018). Cyber espionage and international law. Israel Law Review, 53(2), 294-297. Retrieved from www.scopus.com

Mohamad, A. M., Hamin, Z., & Othman, M. (2017). Balancing open justice and privacy rights in adopting ICT in the malaysian courts. Advanced Science Letters, 23(8), 7996-8000. doi:10.1166/asl.2017.9629

Nardi, M. L. (2020). Origin of cyber warfare and how the espionage changed: A historical overview. Transdisciplinary perspectives on risk management and cyber intelligence (pp. 145-153) doi:10.4018/978-1-7998-4339-9.ch011 Retrieved from www.scopus.com

O'Hara, G. (2010). Cyber-espionage: A growing threat to the american economy. CommLaw Conspectus, 19(1) Retrieved from www.scopus.com

Olatubosun, P., Charles, E., & Omoyele, T. (2021). Rethinking luxury brands and sustainable fashion business models in a risk society. Journal of Design, Business and Society, 7(1), 49-81. doi:10.1386/dbs_00020_1

Paterson, T., & Hanley, L. (2020). Political warfare in the digital age: Cyber subversion, information operations and ‘deep fakes’. Australian Journal of International Affairs, 74(4), 439-454. doi:10.1080/10357718.2020.1734772

Perlroth, N. (2019). Chinese and Iranian Hackers Renew their Attacks on U.S.Companies, Retrieved from www.scopus.com

Perumal, S., Pitchay, S. A., Samy, G. N., Shanmugam, B., Magalingam, P., & Albakri, S. H. (2018). Transformative cyber security model for malaysian government agencies. International Journal of Engineering and Technology(UAE), 7(4), 87-92. doi:10.14419/ijet.v7i4.15.21377

Plotnek, J. J., & Slay, J. (2021). Cyber terrorism: A homogenized taxonomy and definition. Computers and Security, 102 doi:10.1016/j.cose.2020.102145

Reveron, D. S. (2012). Cyberspace and national security: Threats, opportunities, and power in a virtual world. Cyberspace and national security: Threats, opportunities, and power in a virtual world (pp. 1-246) Retrieved from www.scopus.com

Reyns, B., Henson, B., Fisher, B., Fox, K. A., & Nobles, M. R. (2015). A gendered lifestyle-routine activity approach to explaining stalking victimization in canada. Journal of Interpersonal Violence, , 9066. Retrieved from www.scopus.com

Robinson, N., & Hardy, A. (2021). Estonia: From the "bronze night" to cybersecurity pioneers. Routledge companion to global cyber-security strategy (pp. 211-225) Retrieved from www.scopus.com

Rodricks, A., & Puri, J. (2020). Unravelling the translucent theories on espionage: A periodical study on crime and security. Journal of Legal Studies and Criminal Justice, 1 Retrieved from www.scopus.com

Rosli, W. R. W., Kamaruddin, S., & Hamin, Z. (2020). A legal intervention in combatting terrorism and violent extremism in malaysia. International Journal of Innovation, Creativity and Change, 12(1), 104-114. Retrieved from www.scopus.com

Sardoc, M. (2021). The ethics of securitisation: An interview with rita floyd. Critical Studies on Terrorism, 14(1), 139-148. doi:10.1080/17539153.2021.1886506

Setiawan, D., & Heriyanto, N. (2020). International regulatory vacuum of cyber espionage. Advances in Social Science, Education and Humanities Research, 436, 106-111. Retrieved from www.scopus.com

Skinner, C. (2014). An international law response to economic cyber espionage. Conn.L.Rev., 46, 1165. Retrieved from www.scopus.com

SPATARO, J. G. (2019). Iranian cyber espionage. Iranian Cyber Espionage, Retrieved from www.scopus.com

Stevens, T. (2016). Cyber Security and the Politics of Time, Retrieved from www.scopus.com

Studies, I. (2021). Significant Cyber Incidents, Retrieved from www.scopus.com

Teoh, C. S., Mahmood, A. B., & Dzazali, S. B. (2017). Is NIST CSF applicable for developing nations? A case study on government sector in malaysia. Paper presented at the Proceedings Ot the 21st Pacific Asia Conference on Information Systems: ''Societal Transformation through IS/IT'', PACIS 2017, Retrieved from www.scopus.com

Wangen, G. (2015). The role of malware in reported cyber espionage: A review of the impact and mechanism. Information (Switzerland), 6(2), 183-211. doi:10.3390/info6020183

Watt, E. (2019). Russell buchan, cyber espionage and international law. Journal of Conflict and Security Law, 24(3), 638-642. Retrieved from www.scopus.com

Yoon, S. (2019). Why is there no securitisation theory in the korean nuclear crisis? Pacific Review, 32(3), 336-364. doi:10.1080/09512748.2018.1476401

Yuan, T. (2020). Identifying Hackers' Roles and Examining the Evolution Pattern of Hackers on Hacker Forums by Clustering and Semisupervised Learning Algorithms, Retrieved from www.scopus.com


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.