{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T11:36:17Z","timestamp":1769168177672,"version":"3.49.0"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,4,30]],"date-time":"2014-04-30T00:00:00Z","timestamp":1398816000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11948-014-9551-y","type":"journal-article","created":{"date-parts":[[2014,4,29]],"date-time":"2014-04-29T06:21:36Z","timestamp":1398752496000},"page":"701-715","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":88,"title":["Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities"],"prefix":"10.1007","volume":"20","author":[{"given":"Myriam","family":"Dunn Cavelty","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,30]]},"reference":[{"issue":"2\u20133","key":"9551_CR1","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s10611-005-1717-8","volume":"43","author":"L Amoore","year":"2005","unstructured":"Amoore, L., & De Goede, M. (2005). Governance, risk and dataveillance in the war on terror. Crime, Law and Social Change, 43(2\u20133), 149\u2013173.","journal-title":"Crime, Law and Social Change"},{"issue":"6","key":"9551_CR2","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1177\/0309132510362600","volume":"34","author":"B Anderson","year":"2010","unstructured":"Anderson, B. (2010). Preemption, precaution, preparedness: Anticipatory action and future geographies. Progress in Human Geography, 34(6), 777\u2013798.","journal-title":"Progress in Human Geography"},{"key":"9551_CR3","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314, 610\u2013623.","journal-title":"Science"},{"issue":"1","key":"9551_CR4","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1163\/19426720-00701004","volume":"7","author":"L Axworthy","year":"2001","unstructured":"Axworthy, L. (2001). Human security and global governance: Putting people first. Global Governance, 7(1), 19\u201324.","journal-title":"Global Governance"},{"key":"9551_CR5","unstructured":"Barlow, J. P. (1996). A declaration of the independence of cyberspace, electronic frontier foundation website. http:\/\/homes.eff.org\/~barlow\/Declaration-Final.html ."},{"issue":"2","key":"9551_CR6","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1177\/1206331211430016","volume":"15","author":"D Barnard-Wills","year":"2012","unstructured":"Barnard-Wills, D., & Ashenden, D. (2012). Securing virtual space: Cyber war, cyber terror, and risk. Space and Culture, 15(2), 110\u2013123.","journal-title":"Space and Culture"},{"issue":"1","key":"9551_CR7","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/15027570.2013.782633","volume":"12","author":"ET Barrett","year":"2013","unstructured":"Barrett, E. T. (2013). Warfare in a new domain: The ethics of military cyber-operations. Journal of Military Ethics, 12(1), 4\u201317.","journal-title":"Journal of Military Ethics"},{"key":"9551_CR8","unstructured":"B\u00f6hme, R. (2005). Vulnerability markets\u2014What is the economic value of a zero-day exploit? Paper held at the 2005 Chaos Communication Congress Berlin, Germany. http:\/\/events.ccc.de\/congress\/2005\/fahrplan\/attachments\/542-Boehme2005_22C3_VulnerabilityMarkets.pdf ."},{"key":"9551_CR9","volume-title":"The security dilemma: Fear, cooperation and trust in world politics","author":"K Booth","year":"2008","unstructured":"Booth, K., & Wheeler, N. (2008). The security dilemma: Fear, cooperation and trust in world politics. New York: Palgrave."},{"key":"9551_CR10","first-page":"218","volume-title":"SIPRI Yearbook 2013: Armaments, disarmament and international security","author":"V Boulanin","year":"2013","unstructured":"Boulanin, V. (2013). Cybersecurity and the arms industry. SIPRI Yearbook 2013: Armaments, disarmament and international security (pp. 218\u2013226). Oxford: Oxford University Press."},{"key":"9551_CR11","unstructured":"Brito, J., & Watkins, T. (2011). Loving the cyber bomb? The dangers of threat inflation in cybersecurity policy. Mercatus Center George Mason University, Working Paper No. 11-24, April 2011."},{"key":"9551_CR12","unstructured":"Brunner, E., Dunn Cavelty, M., Giroux, J., & Suter, M. (2010). Protection goals. Focal report on Critical Infrastructure Protection for the Federal Office for Civil Protection, No. 4. Zurich: Center for Security Studies."},{"issue":"3\u20134","key":"9551_CR13","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1504\/IJCIS.2007.014121","volume":"3","author":"JP Burgess","year":"2007","unstructured":"Burgess, J. P. (2007). Social values and material threat: The European Programme for Critical Infrastructure Protection. International Journal of Critical Infrastructures, 3(3\u20134), 471\u2013487.","journal-title":"International Journal of Critical Infrastructures"},{"key":"9551_CR14","doi-asserted-by":"crossref","unstructured":"Burgess, J. P. & Owen, T. (Eds.) (2004). Special section: What is \u2018human security\u2019?, Security Dialogue, 35(3), 345\u2013346.","DOI":"10.1177\/0967010604047569"},{"key":"9551_CR15","volume-title":"Security: A new framework for analysis","author":"B Buzan","year":"1998","unstructured":"Buzan, B., W\u00e6ver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner."},{"issue":"4","key":"9551_CR16","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s10676-006-9108-0","volume":"8","author":"R Capurro","year":"2006","unstructured":"Capurro, R. (2006). Towards an ontological foundation of information ethics. Ethics and Information Technology, 8(4), 175\u2013186.","journal-title":"Ethics and Information Technology"},{"key":"9551_CR17","unstructured":"Clarke, R. A., Morell, M. J., Stone, G. R., Sunstein, C. R., & Swire, P. (2013). Liberty and security in a changing world: Report and Recommendations of The President\u2019s Review Group on Intelligence and Communications Technologies. Washington, DC. http:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/2013-12-12_rg_final_report.pdf ."},{"issue":"4","key":"9551_CR18","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1177\/0047117806069416","volume":"20","author":"J Coaffee","year":"2006","unstructured":"Coaffee, J., & Murakami Wood, D. (2006). Security is coming home: Rethinking scale and constructing resilience in the global urban response to terrorist risk. International Relations, 20(4), 503\u2013517.","journal-title":"International Relations"},{"key":"9551_CR19","unstructured":"Collier, S. J. & Lakoff, A. (2008). The vulnerability of vital systems: How critical infrastructure became a security problem. In M. Dunn Cavelty & K. S. Kristensen (Eds.), The politics of securing the homeland: Critical infrastructure, risk and securitization (pp. 17\u201339). New York: Routledge."},{"key":"9551_CR20","unstructured":"Conway, M. (2008). The media and cyberterrorism: A study in the construction of \u2018reality. In M. Dunn Cavelty & K.S. Kristensen (Eds.), The politics of securing the homeland: Critical infrastructure, risk and securitisation (pp. 109\u2013129). London: Routledge."},{"issue":"4\u20135","key":"9551_CR21","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1177\/0967010609342879","volume":"40","author":"M Coward","year":"2009","unstructured":"Coward, M. (2009). Network-centric violence, critical infrastructure and the urbanization of security. Security Dialogue, 40(4\u20135), 399\u2013418.","journal-title":"Security Dialogue"},{"key":"9551_CR22","unstructured":"CSIS Center for Strategic and International Studies (2008). Securing Cyberspace for the 44th Presidency A Report of the CSIS Commission on Cybersecurity for the 44th Presidency. Washington, DC. http:\/\/csis.org\/files\/media\/csis\/pubs\/081208_securingcyberspace_44.pdf ."},{"key":"9551_CR23","volume-title":"Black code: Inside the battle for cyberspace","author":"RJ Deibert","year":"2013","unstructured":"Deibert, R. J. (2013). Black code: Inside the battle for cyberspace. Toronto: McClelland & Stewart."},{"key":"9551_CR24","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7617.001.0001","volume-title":"The practice and policy of global internet filtering","author":"RJ Deibert","year":"2008","unstructured":"Deibert, R. J., Palfrey, J. G., Rohozinski, R., & Zittrain, J. (2008). The practice and policy of global internet filtering. Cambridge: MIT Press."},{"key":"9551_CR25","unstructured":"Demchak, C. & Dombrowski, P. (2011). Rise of a cybered westphalian age. Strategic Studies Quarterly, Spring, pp. 32\u201361."},{"key":"9551_CR26","unstructured":"Der Derian, J. & Finkelstein, J. (2008). Critical infrastructures and network pathologies: The semiotics and biopolitics of heteropolarity. In M. Dunn Cavelty & K. S. Kristensen (Eds.), The politics of securing the homeland: critical infrastructure, risk and securitisation (pp. 84\u2013105). London: Routledge."},{"issue":"2","key":"9551_CR27","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1017\/S0260210508008024","volume":"34","author":"M Dillon","year":"2008","unstructured":"Dillon, M., & Lobo-Guerrero, L. (2008). Biopolitics of security in the 21st century: An introduction. Review of International Studies, 34(2), 265\u2013292.","journal-title":"Review of International Studies"},{"issue":"4","key":"9551_CR28","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1080\/15027570.2010.536404","volume":"9","author":"RR Dipert","year":"2010","unstructured":"Dipert, R. R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4), 384\u2013410.","journal-title":"Journal of Military Ethics"},{"key":"9551_CR29","volume-title":"Cyber-security and threat politics: US efforts to secure the information age","author":"M Dunn Cavelty","year":"2008","unstructured":"Dunn Cavelty, M. (2008). Cyber-security and threat politics: US efforts to secure the information age. London: Routledge."},{"key":"9551_CR30","first-page":"141","volume-title":"Proceedings of the 4th International Conference on cyber conflict","author":"M Dunn Cavelty","year":"2012","unstructured":"Dunn Cavelty, M. (2012). Militarizing cyberspace: Why less may be better. In C. Czosseck, R. Ottis, & K. Ziolkowski (Eds.), Proceedings of the 4th International Conference on cyber conflict (pp. 141\u2013153). Tallinn: CCD COE Publications."},{"key":"9551_CR31","unstructured":"Dunn Cavelty, M. & Kristensen, K.S. (2008). Introduction: Securing the homeland: Critical infrastructure, risk, and (in)security. In M. Dunn Cavelty & K. S. Kristensen (Eds.), The politics of securing the homeland: Critical infrastructure, risk and securitization (pp. 1\u201314). New York: Routledge."},{"key":"9551_CR32","unstructured":"Dunn Cavelty, M. & Suter, M. (2012). The art of CIIP strategy: Taking stock of content and processes. In J. Lopez, R. Setola, S. D. Wolthusen (Eds.). Critical infrastructure protection: Information infrastructure models, analysis, and defense (pp. 15\u201338). Springer: Berlin."},{"key":"9551_CR33","first-page":"15","volume-title":"Critical infrastructure protection, IFIP International Federation for Information Processing","author":"S Dynes","year":"2008","unstructured":"Dynes, S., Goetz, E., & Freeman, M. (2008). Cyber Security: Are economic incentives adequate? In E. Goetz & S. Shenoi (Eds.), Critical infrastructure protection, IFIP International Federation for Information Processing (Vol. 253, pp. 15\u201327). Boston: Springer."},{"key":"9551_CR34","unstructured":"Floridi, L. (1998). Does information have a moral worth in itself? Paper presented at Computer Ethics: Philosophical Enquiry in Association with the ACM SIG on Computers and Society, London School of Economics and Political Science, London, December 14\u201315, 1998. http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=144548 ."},{"issue":"1","key":"9551_CR35","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1023\/A:1010018611096","volume":"1","author":"L Floridi","year":"1999","unstructured":"Floridi, L. (1999). Information ethics: On the theoretical foundations of computer ethics. Ethics and Information Technology, 1(1), 37\u201356.","journal-title":"Ethics and Information Technology"},{"key":"9551_CR36","doi-asserted-by":"crossref","first-page":"18","DOI":"10.5840\/tpm20011647","volume":"6","author":"L Floridi","year":"2001","unstructured":"Floridi, L. (2001). Ethics in the Infosphere. The Philosophers\u2019 Magazine, 6, 18\u201319.","journal-title":"The Philosophers\u2019 Magazine"},{"key":"9551_CR37","unstructured":"Floridi, L. & Sanders, J. W. (1999). Entropy as evil in information ethics. Etica & Politica, special issue on Computer Ethics, 1(2)."},{"issue":"1","key":"9551_CR38","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1023\/A:1011440125207","volume":"3","author":"L Floridi","year":"2001","unstructured":"Floridi, L., & Sanders, J. W. (2001). Artificial evil and the foundation of computer ethics. Ethics and Information Technology, 3(1), 55\u201366.","journal-title":"Ethics and Information Technology"},{"key":"9551_CR39","unstructured":"Fung, B. (2013). The NSA hacks other countries by buying millions of dollars\u2019 worth of computer vulnerabilities. Washington Post. http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2013\/08\/31\/the-nsa-hacks-other-countries-bybuying-millions-of-dollars-worth-of-computer-vulnerabilities\/ ."},{"key":"9551_CR40","unstructured":"Greenwald, G. & MacAskill, E. (2013). Obama orders US to draw up overseas target list for cyber-attacks, The Guardian. http:\/\/www.theguardian.com\/world\/2013\/jun\/07\/obama-china-targets-cyber-overseas ."},{"issue":"1","key":"9551_CR41","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1177\/0967010611430436","volume":"43","author":"J Hagmann","year":"2012","unstructured":"Hagmann, J., & Dunn Cavelty, M. (2012). National risk registers: Security scientism and the propagation of permanent insecurity. Security Dialogue, 43(1), 80\u201397.","journal-title":"Security Dialogue"},{"issue":"2","key":"9551_CR42","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1177\/0967010606066436","volume":"37","author":"G Hoogensen","year":"2006","unstructured":"Hoogensen, G., & Stuv\u00f8y, K. (2006). Gender, resistance and human security. Security Dialogue, 37(2), 207\u2013228.","journal-title":"Security Dialogue"},{"issue":"2","key":"9551_CR43","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/2009958","volume":"30","author":"R Jervis","year":"1978","unstructured":"Jervis, R. (1978). Cooperation under the security dilemma. World Politics, 30(2), 167\u2013214.","journal-title":"World Politics"},{"key":"9551_CR44","first-page":"122","volume-title":"Contemporary security studies","author":"P Kerr","year":"2007","unstructured":"Kerr, P. (2007). Human security. In A. Collins (Ed.), Contemporary security studies (pp. 122\u2013134). Oxford: Oxford University Press."},{"key":"9551_CR45","unstructured":"Kristensen, K.S. (2008). The absolute protection of our citizens: Critical infrastructure protection and the practice of security. In M. Dunn Cavelty & K. S. Kristensen (Eds.), The politics of securing the homeland: Critical infrastructure, risk and securitisation (pp. 63\u201383). London: Routledge."},{"key":"9551_CR46","unstructured":"Kuehn, A. (2013). Extending cybersecurity, securing private internet infrastructure: The U.S. Einstein Program and its Implications for Internet Governance. In R. Radu, J.-M. Chenou & R.H. Weber (Eds.) The evolution of global internet governance (pp. 157\u2013167). Schulthess: Z\u00fcrich."},{"key":"9551_CR47","volume-title":"Data mining and predictive analysis: Intelligence gathering and crime analysis","author":"C McCue","year":"2007","unstructured":"McCue, C. (2007). Data mining and predictive analysis: Intelligence gathering and crime analysis. Oxford: Butterworth Heinemann."},{"key":"9551_CR48","unstructured":"Miller, C. (2007). The legitimate vulnerability market: The secretive world of 0-day exploit sales. In 6th Workshop on the Economics of Information Security (WEIS 2007). http:\/\/weis2007.econinfosec.org\/papers\/29.pdf ."},{"key":"9551_CR49","volume-title":"To save everything, click here: Technology, solutionism, and the urge to fix problems that don\u2019t exist","author":"E Morozov","year":"2013","unstructured":"Morozov, E. (2013). To save everything, click here: Technology, solutionism, and the urge to fix problems that don\u2019t exist. London: Allen Lane."},{"issue":"19","key":"9551_CR50","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1111\/misr.12024","volume":"15","author":"M Mueller","year":"2013","unstructured":"Mueller, M., Schmidt, A., & Kuerbis, B. (2013). Internet security and networked governance in international relations. International Studies Review, 15(19), 86\u2013104.","journal-title":"International Studies Review"},{"key":"9551_CR51","unstructured":"NIST (2002). NIST Special Publication 800-30, Risk Management Guide for Information Security."},{"key":"9551_CR52","volume-title":"Critical foundations: Protecting America\u2019s infrastructures","author":"PCCIP President\u2019s Commission on Critical Infrastructure Protection","year":"1997","unstructured":"PCCIP President\u2019s Commission on Critical Infrastructure Protection. (1997). Critical foundations: Protecting America\u2019s infrastructures. Washington: US Government Printing Office."},{"key":"9551_CR53","first-page":"A1","volume":"14","author":"N Perlroth","year":"2013","unstructured":"Perlroth, N., & Sanger, D. E. (2013). Nations buying as hackers sell knowledge of software flaws. The New York Times, 14, A1.","journal-title":"The New York Times"},{"key":"9551_CR54","doi-asserted-by":"crossref","DOI":"10.7249\/RR233","volume-title":"Predictive policing: The role of crime forecasting in law enforcement operations","author":"WL Perry","year":"2013","unstructured":"Perry, W. L., McInnis, B., Price, C. C., Smith, S. C., & Hollywood, J. S. (2013). Predictive policing: The role of crime forecasting in law enforcement operations. Santa Monica: RAND."},{"issue":"1","key":"9551_CR55","doi-asserted-by":"crossref","first-page":"20","DOI":"10.4018\/jte.2010081002","volume":"1","author":"NC Rowe","year":"2010","unstructured":"Rowe, N. C. (2010). The ethics of cyberweapons in warfare. International Journal of Techoethics, 1(1), 20\u201331.","journal-title":"International Journal of Techoethics"},{"key":"9551_CR56","unstructured":"Rueter, N. (2011). The Cybersecurity Dilemma. MA thesis. Duke University."},{"key":"9551_CR57","unstructured":"Schneier, B. (2012a). The vulnerabilities market and the future of security. Forbes, May 30. http:\/\/www.forbes.com\/sites\/bruceschneier\/2012\/05\/30\/the-vulnerabilities-market-and-the-future-ofsecurity\/ ."},{"key":"9551_CR58","unstructured":"Schneier, B. (2012b). When it comes to security, we\u2019re back to Feudalism. Wired, http:\/\/www.wired.com\/opinion\/2012\/11\/feudal-security\/ ."},{"key":"9551_CR59","unstructured":"Schneier, B. (2013). The battle for power on the internet. The Atlantic, http:\/\/www.theatlantic.com\/technology\/archive\/2013\/10\/the-battle-for-power-on-the-internet\/280824 ."},{"key":"9551_CR60","unstructured":"Simonite, T. (2013). NSA\u2019s own hardware backdoors may still be a \u201cproblem from hell\u201d, http:\/\/www.technologyreview.com\/news\/519661\/nsas-own-hardware-backdoors-may-still-be-a-problem-from-hell\/ ."},{"issue":"2","key":"9551_CR61","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1177\/0967010613478323","volume":"44","author":"T Stevens","year":"2013","unstructured":"Stevens, T., & Betz, D. J. (2013). Analogical reasoning and cyber security. Security Dialogue, 44(2), 147\u2013164.","journal-title":"Security Dialogue"},{"key":"9551_CR62","first-page":"13","volume-title":"The sustainable development paradox","author":"E Swyngedouw","year":"2007","unstructured":"Swyngedouw, E. (2007). Impossible\/undesirable sustainability and the post-political condition. In J. R. Krueger & D. Gibbs (Eds.), The sustainable development paradox (pp. 13\u201340). New York: Guilford Press."},{"issue":"1","key":"9551_CR63","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1111\/1467-9256.12031","volume":"34","author":"B Wagner","year":"2014","unstructured":"Wagner, B. (2014). The politics of internet filtering: The United Kingdom and Germany in a comparative perspective. Politics, 34(1), 58\u201371.","journal-title":"Politics"},{"key":"9551_CR64","volume-title":"Information warfare: Principles and operations","author":"E Waltz","year":"1998","unstructured":"Waltz, E. (1998). Information warfare: Principles and operations. Boston: Artech House."},{"key":"9551_CR65","unstructured":"Zittrain, J. (2011). Freedom and anonymity: Keeping the internet open, http:\/\/www.scientificamerican.com\/article\/freedom-and-anonymity\/ ."}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-014-9551-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-014-9551-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-014-9551-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T23:43:18Z","timestamp":1565394198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-014-9551-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,30]]},"references-count":65,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["9551"],"URL":"https:\/\/doi.org\/10.1007\/s11948-014-9551-y","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,30]]}}}