Abstract
Purpose
The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western governments. This research primarily focuses on such practices of the US Government.
Design/methodology/approach
This work is designed as a case study research of cybersecurity whistleblowers or leakers on Western governments, involving data collection from primary and secondary sources. The method is a content analysis to determine the presence of certain themes within this primary and secondary data which this research can then make inferences about the messages within the texts.
Findings
The findings show a formation of a recent class of power brokers, with its own collective ethos, who will be known by a new term: the “New Knowledge Cyberclass” (NKC). The development of the NKC was revealed through the shocking data revelations by Edward Snowden, Julian Assange and Chelsea Manning. What separates the NKC from government “protectors” (i.e. President Obama, Central Intelligence Agency Director Mike Pompeo), who argue that these leakers stole and leaked classified documents that endangered lives, is their definitions of what it means to be defenders of democracy, which here pertains to the rights to citizens’ online privacy and the degree of secrecy in US Government.
Originality/value
To the best of the author’s knowledge, this is the first study directed toward connecting, Snowden, Assange and Manning, to the birth of a new class of power brokers designed to directly challenge Western government malpractices with citizens’ online privacy and secrecy in foreign operations. This research explores both the birth of this new class and a collective ethos that binds this group together despite the tensions and conflicts within this new class.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Management Information Systems
Reference71 articles.
1. ABC News (2017), “Chelsea manning explains why she leaked secret military documents, fought for transgender rights behind bars [WWW document]”, ABC News, available at: https://abcnews.go.com/US/chelsea-manning-explains-leaked-secret-military-documents-fought/story?id=47931325 (accessed 9 June 2022).
2. Aftergood, S. (1996), “Secrecy and accountability in U.S. intelligence [WWW document]”, available at: https://sgp.fas.org/cipsecr.html (accessed 15 November 2022).
3. Assange, J. (2015), “When google met WikiLeaks quotes by Julian Assange [WWW document]”, available at: www.goodreads.com/work/quotes/41106963-when-google-met-wikileaks (accessed 12 June 2022).
4. Comparative case studies: an innovative approach;Nordic Journal of Comparative and International Education (NJCIE),2017
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Eyes in the Sky;Advances in Information Security, Privacy, and Ethics;2024-01-26