Introduction ixDaniel VENTRE, Hugo LOISEAU and Hartmut ADENChapter 1 The "Science" of Cybersecurity in the Human and Social Sciences: Issues and Reflections 1Hugo LOISEAU1.1 Introduction 11.2 A method? 41.3 Data? 111.4 One or more definition(s)? 161.5 Conclusion 201.6 References 21Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity 25Daniel VENTRE2.1 Introduction 252.2 Definition 272.2.1 What is a definition? 272.2.2 Usefulness of definitions 292.2.3 Rules for constructing definitions 292.2.4 Definitions of cybersecurity 322.3 Typology 432.3.1 What is a typology? 442.3.2 Usefulness of typologies 442.3.3 Rules for the construction of typologies 452.3.4 Cybersecurity typologies 462.4 Taxonomy 482.4.1 What is a taxonomy? 482.4.2 Usefulness of taxonomy 492.4.3 Rules for the construction of taxonomies 492.4.4 Taxonomies of cybersecurity 502.5 Ontologies 512.5.1 What is ontology? 522.5.2 Usefulness of ontologies 532.5.3 Rules for construction of ontologies 532.5.4 Cybersecurity ontologies 542.6 Conclusion 562.7 References 57Chapter 3 Cybersecurity and Data Protection - Research Strategies and Limitations in a Legal and Public Policy Perspective 67Hartmut ADEN3.1 Introduction 673.2 Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? 683.2.1 Potential tensions between cybersecurity and data protection 693.2.2 Potential synergies between cybersecurity and data protection 723.3 Methodological approaches and challenges for the study of cybersecurity - legal and public policy perspectives 743.3.1 Legal interpretation and comparison as methodological approaches to the study of cybersecurity 743.3.2 Public policy approaches to the study of cybersecurity 773.3.3 Transdisciplinary synergies between legal and public policy perspectives 783.4 Conclusion and outlook 803.5 References 81Chapter 4 Researching State-sponsored Cyber-espionage 85Joseph FITSANAKIS4.1 Defining cybersecurity and cyber-espionage 854.2 Taxonomies of cyber-threats 874.3 The structure of this chapter 884.4 The significance of state-sponsored cyber-espionage 904.5 Research themes in state-sponsored cyber-espionage 944.6 Theorizing state-sponsored cyber-espionage in the social sciences 984.7 Research methodologies into state-sponsored cyber-espionage 1044.8 Intellectual precision and objectivity in state-sponsored cyber-espionage research 1064.9 Detecting state actors in cyber-espionage research 1104.10 Identifying specific state actors in cyber-espionage research 1124.11 Conclusion: researching a transformational subject 1164.12 References 118Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk 123Michel DACOROGNA and Marie KRATZ5.1 Introduction 1235.2 The scientific approach to move from uncertainty to risk 1245.3 Learning about the data: the exploratory phase 1265.4 Data cleansing 1285.5 Statistical exploration on the various variables of the dataset 1305.6 Univariate modeling for the relevant variables 1345.7 Multivariate and dynamic modeling 1395.7.1 A fast-changing environment: time dependency 1405.7.2 Causal relations 1435.7.3 Models for prediction 1475.8 Conclusion 1495.9 Acknowledgments 1515.10 References 151Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research 153Brett VAN NIEKERK and Trishana RAMLUCKAN6.1 Introduction 1536.1.1 Previous research 1546.2 Information warfare and cybersecurity 1546.3 Researching information warfare and cybersecurity 1566.4 Qualitative research methodologies for information warfare and cybersecurity 1576.4.1 Clustering of documents 1596.4.2 Clustering of words 1596.4.3 Word frequencies and word clouds 1596.4.4 Text search and word trees 1596.4.5 Example use cases of qualitative document analysis 1606.5 An analysis of national cybersecurity strategies 1616.5.1 Selection process for the documents 1616.5.2 Analysis 1626.5.3 Discussion 1676.6 An analysis of the alignment of South Africa's Cybercrimes Bill to international legislation 1696.6.1 Background to the documents 1696.6.2 Analysis 1706.6.3 Discussion 1746.7 An analysis of the influence of classical military philosophy on seminal information warfare texts 1766.8 Reflections on qualitative document analysis for information warfare and cybersecurity research 1776.9 Conclusion 1796.10 References 180Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France 185Elena WALDISPUEHL7.1 Introduction 1857.2 Localization of an online field 1877.2.1 Online ethnographic work and empathy 1927.2.2 Cybersecurity issues of an online field 1937.3 Online-offline continuum 1947.4 Continuum between security and insecurity 1997.5 Conclusion 2047.6 References 205List of Authors 211Index 213
Hartmut Aden, Prof. University of Berlin Hugo Loiseau, Prof. University of Sherbrooke Daniel Ventre, CNRS, researcher at CESDIP