Historical Development of Cybersecurity Studies: A Literature Review and Its Place in Security Studies

Author:

Tarhan KamilORCID

Abstract

This study discusses the formation and development of cybersecurity studies since the creation of the Internet. Although the origin of cybersecurity studies dates back to the 1970s, hacking, malicious software, computer intrusions, and espionage attacks that took place in the 1980s led cybersecurity studies to form in the area of computer science. By the 1990s, the Internet began to be used widely, and an increase in the level of attacks in cyberspace began to occur. This period was a major reason for the growth in writing on software and network security. Network security has become a key priority for governments and many industries. Cybersecurity studies have become a priority area in security studies with the increasing complexity of cyber threats towards 2000s. States and some supranational organizations have started to create cybersecurity strategies. The security of critical infrastructure and computer networks has begun to emerge as a high-priority area. It has been observed that the transition from classical security policies to modern security policies, which should be established in the information age, has begun. Cybersecurity studies were taken more seriously after the 2007 Estonian attacks, especially in the 2010s. In this period, the intensity of attacks on critical infrastructures and the occurrence of some physical attacks caused cybersecurity to deepen and become an issue on an international scale. Cybersecurity studies continue to be shaped by being influenced by many different disciplines, regardless of any discipline, with the important discussions and cyber incidents that have taken place in recent years. Therefore, the studies were handled from a multidisciplinary perspective.

Publisher

Adam Mickiewicz University Poznan

Subject

Political Science and International Relations

Reference87 articles.

1. Anderson R. H., Hearn A. C., An Exploration of Cyberspace Security R&D Investment Strategies for DARPA, “The Day After...in Cyberspace II”, RAND.

2. Arquilla J., Ronfeldt D. (1993), Cyberwar is Coming!, “Comparative Strategy”, 12: 141–165. https://doi.org/10.1080/01495939308402915

3. Arquilla J., Ronfeldt D. (1996), The Advent of Netwar, RAND, Santa Monica.

4. Arquilla J., Ronfeldt D. (2001), Networks and Netwars: The Future of Terror, Crime, and Militancy, RAND.

5. Baldwin D. (1995), Security Studies and the End of the Cold War, “World Politics”, 48(1): 117–141. https://doi.org/10.1353/wp.1995.0001

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3