网络空间
主权
网络空间国家安全战略
政治学
国家安全
黑客
网络战
规范性
兼并
法学
政府(语言学)
计算机安全
社会学
公共行政
恐怖主义
政治
互联网
哲学
万维网
国土安全部
语言学
计算机科学
出处
期刊:Cyber Orient
[Wiley]
日期:2019-01-01
卷期号:13 (1): 28-42
被引量:3
标识
DOI:10.1002/j.cyo2.20191301.0002
摘要
Abstract Cyber security strategies operate on the normative assumption that national cyberspace mirrors a country's territorial sovereignty. Its protection commonly entails practices of bordering through infrastructural control and service delivery, as well as the policing of data circulation and user mobility. In a context characterized by profound territorial fragmentation, such as the Occupied Palestinian Territory (OPT),1 equating national cyberspace with national territory proves to be reductive. This article explores how different cyber security strategies – implemented by the Israeli government, the Palestinian Authority, and Hamas – intersect and produce a cyberspace characterized by territorial annexation, occupation, and blockade. Drawing on this analysis, it then employs the conceptual prism of (de-)–(re-) territorialization to reflect on how these strategies, as well as those of Palestinian hackers, articulate territoriality beyond the normativity of national cyberspace.
科研通智能强力驱动
Strongly Powered by AbleSci AI