Skip to main content

Generative Metaphors in Cybersecurity Governance

  • Chapter
  • First Online:
The 2019 Yearbook of the Digital Ethics Lab

Part of the book series: Digital Ethics Lab Yearbook ((DELY))

  • 373 Accesses

Abstract

Policy-makers involved in cybersecurity governance should pay close attention to the “generative metaphors” they use to describe and understand new technologies. Generative metaphors structure our understanding of policy problems by imposing mental models of both the problem and possible solutions. As a result, they can also constrain ethical reasoning about new technologies, by uncritically carrying over assumptions about moral roles and obligations from an existing domain. The discussion of global governance of cybersecurity problems has to date been dominated by the metaphor of “cyber war”. In this chapter, we argue that this metaphor diminishes possibilities for international collaboration in this area by limiting states to reactive policies of naming and shaming rather than proactive actions to address systemic features of cyberspace. We suggest that alternative metaphors—such as health, ecosystem, and architecture—can help expose the dominance of the war metaphor and provide a more collaborative and conceptually accurate frame for negotiations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    It is useful to note that the concept of war emerged later than we might think; ancient Romans spoke of ‘conquest’ rather than war (van der Dennen 1995).

  2. 2.

    This approach is inspired by Luke’s (2010) guide to “metaphor-hacking”.

  3. 3.

    In amplification attacks, attackers try to exhaust a victim’s bandwidth by abusing the fact that protocols such as DNS or NTP allow spoofing of sender IP addresses (see US-CERT 2016).

  4. 4.

    Of course, states might choose to only give up vulnerabilities in cases where they have a second vulnerability which guarantees their ability to exploit the same systems. However, even such seemingly useless disclosures will make most users safer, as third parties will be less able to exploit these vulnerabilities when they are disclosed.

  5. 5.

    This is an indicative list of proposed obligations for states within each conceptual framework – obligations for private actors are italicised. The norm initiatives do not necessarily advocate all of the norms in their category.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Julia Slupska .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Slupska, J., Taddeo, M. (2020). Generative Metaphors in Cybersecurity Governance. In: Burr, C., Milano, S. (eds) The 2019 Yearbook of the Digital Ethics Lab. Digital Ethics Lab Yearbook. Springer, Cham. https://doi.org/10.1007/978-3-030-29145-7_2

Download citation

Publish with us

Policies and ethics