Araştırma Makalesi
BibTex RIS Kaynak Göster

Siber Güvenlikte Devlet Müdahalesinin Teorik, Ampirik ve Normatif Boyutları: Japonya Örneği

Yıl 2022, Cilt: 12 Sayı: 2, 689 - 708, 02.08.2022
https://doi.org/10.48146/odusobiad.1079425

Öz

Devletlerin siber güvenliğe katılımlarını nispeten daha fazla ulusal güvenlik yönüne (ABD gibi) yönlendirdiği ileri sürülebilecek diğer büyük liberal demokratik ülkelerden farklı olarak, Japonya'da devletin siber güvenlik alanındaki rolü daha az net bir yönelime sahiptir. Bu çalışma, Cavelty ve Egloft'un (Cavelty ve Egloft, 2019) geliştirdiği analiz çerçevesini kullanarak Japonya'da devletin siber güvenlikteki rolünün doğasını açıklamaktadır. Bahsedilen bu çerçevede devletin rolü teorik, ampirik ve normatif boyutlarda analiz edilmektedir. Teorik boyut analizi, Japon devleti ile ilgili literatürdeki farklı teorilere odaklanırken, ampirik boyut analizi için veriler, siber güvenlikle ilgili önemli Japon devlet ve özel kuruluşlarının kamuya açık kayıtlarından alınmaktadır. Normatif boyut analizi, Japon devletinin dikkat sarfetmesi gerektiği düşünülen siber güvenlik politikalarının zaman ufku yönünü vurgulamaktadır. Sonuç olarak, Japon devletinin “bilgi yaratıcısı/yayıcı”, “toplumun destekçisi/temsilcisi”, “ortak” ve “garantör ve koruyucu” rollerini bünyesinde barındırdığı ve devlet kurumlarının Japonya'da daha iyi siber güvenlik için proaktif uzun vadeli politikalar ve girişimlere yönelmesi gerekliliği tespit edilmektedir.

Kaynakça

  • Armitage, R., & Cooper, Z. (2021, November 14). Japan should be admitted to the Five Eyes network. Nikkei Asia. https://asia.nikkei.com/Opinion/Japan-should-be-admitted-to-the-Five-Eyes-network
  • Bernes, T., Brozus, L., Hatuel-Radoshitzky, M., Heistein, A., Greco, E., Sasnal, P., Yurgens, I., Kulik, S., Turianskyi, Y., & Gruzd, S. (2020, May 21). Challenges of Global Governance Amid the COVID-19 Pandemic. Council on Foreign Relations. https://www.cfr.org/report/challenges-global-governance-amid-covid-19-pandemic
  • Cavelty, M. D., & Egloff, F. J. (2019). The Politics of Cybersecurity: Balancing Different Roles of the State. St Antony’s International Review, 15(1), 37–57.
  • CISCO. (2020). What Is Cybersecurity? Retrieved March 31, 2021, from CISCO Homepage website: https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
  • Deibert, R., & Rohozinski, R. (2011). Contesting cyberspace and the coming crisis of authority. In Access Contested: Security, Identity, and Resistance in Asian Cyberspace. https://doi.org/10.7551/mitpress/9780262016780.003.0002
  • Engerer, H. (2011). Security As a Public, Private Or Club Good: Some Fundamental Considerations. Defence and Peace Economics, 22(2), 135–145. https://doi.org/10.1080/10242694.2011.542333
  • Fukuyama, F. (1989). The End of History? The National Interest, 16, 3–18. https://www.jstor.org/stable/24027184?seq=1
  • Hatakeyama, K., & Freedman, C. F. (2010). Snow on the pine: Japan’s quest for a leadership role in Asia. In Snow on the Pine: Japan’s Quest for a Leadership Role in Asia. World Scientific Publishing Co. https://doi.org/10.1142/7534/SUPPL_FILE/7534_CHAP01.PDF
  • Higashi, C., & Lauer, G. P. (1990). The Internationalization of the Japanese Economy (2nd ed.). Springer Science+Business Media. http://lib.bus.umich.edu/cgi-bin/koha/opac-detail.pl?biblionumber=217900&query_desc=su%3A%22Industrial management%22
  • Honda, M. (2001). Gendai nihon no seiji to gyōsei (Government and Politics in Contemporary Japan). Hokuju Shuppan.
  • Inoue, K. (2012, May 8). Elpida and the Failure of Japan Inc. Nippon.Com. https://www.nippon.com/en/currents/d00032/elpida-and-the-failure-of-japan-inc.html#
  • IPA. (2016, March 18). Password Awareness Posters in Languages Used by ASEAN Member Countries. Retrieved March 31, 2021, from Japan Information-Technology Promotion Agency website: https://www.ipa.go.jp/security/english/passwordposter.html
  • IPA. (2017). IPA/ISEC: Information Security Early Warning Partnership. Retrieved March 31, 2021, from Japan Information Technology Promotion Agency website: https://www.ipa.go.jp/security/english/about_partnership.html
  • Kawabata, E. (2006). Contemporary Government Reform in Japan: The Dual State in Flux. Palgrave Macmillan. https://cornerstone.lib.mnsu.edu/university-archives-msu-authors/234/
  • Kayama, K. (2015). Kōdo hyōteki-gata kōgeki taisaku ni muketa shisutemusetsukei gaido ~ kansen suru koto o zentei to shita `bōgyo gurando dezain’ ni muketa shisutemusetsukei no kandokoro ~ (System design guide for highly targeted attack countermeasures-The key points of system design for “defense grand design” on the premise of infection-). https://www.ipa.go.jp/files/000045950.pdf
  • Khanna, D. M. (1997). The Rise, Decline, and Renewal of Silicon Valley’s High Technology Industry (1st ed.). Routledge. https://www.routledge.com/The-Rise-Decline-and-Renewal-of-Silicon-Valleys-High-Technology-Industry/Khanna/p/book/9780815353614
  • Klimburg, A. (2018). The Darkening Web: The War for Cyberspace. New York: Penguin Books.
  • Lee, Y. W. (2008). The Japanese Challenge to the American Neoliberal World Order: Identity, Meaning, and Foreign Policy. Stanford University Press. https://www.sup.org/books/title/?id=10889
  • Liaropoulos, A. (2013). Exercising State Sovereignty in Cyberspace: An International Cyber-Order under Construction? Journal of Information Warfare, 12(2), 19–26. https://www.jstor.org/stable/26486852
  • Lowenthal, M. M. (2019). Intelligence: From Secrets to Policy (Eighth). California: CQ Press.
  • Matsukawa, B., Flores, R., Remorin, L. A., & Yarochkin, F. (n.d.). Top Countries With ICS Endpoint Malware Detections. Trend Micro. Retrieved April 12, 2022, from https://www.trendmicro.com/en_be/research/21/f/top-countries-with-ics-endpoint-malware-detections-.html
  • Miyashita, A. (2008). Where Do Norms Come From? Foundations of Japan’s Postwar Pacifism. In Y. Sato & K. Hirata (Eds.), Norms, Interests, and Power in Japanese Foreign Policy (pp. 21–46). New York: Palgrave Macmillan. https://doi.org/10.1057/9780230615809_2
  • Myers, L. (2013, October 23). Is this how Indonesia topped the malicious traffic charts? WeLiveSecurity by ESET. https://www.welivesecurity.com/2013/10/23/is-this-how-indonesia-topped-the-malicious-traffic-charts/
  • Okimoto, D. I., Sugano, T., & Weinstein, F. B. (1984). Technological Resources. In D. I. Okimoto, T. Sugano, & F. B. Weinstein (Eds.), Competitive Edge: The Semiconductor Industry in the U.S. and Japan (pp. 35–77). Stanford University Press. https://www.sup.org/books/extra/?id=2964&isbn=0804712255&gvp=1
  • Osborne, C. (2021, April 1). Google: North Korean hackers are targeting researchers through fake offensive security firm. Retrieved April 6, 2021, from ZDNet website: https://www.zdnet.com/article/google-north-korean-hackers-targeting-researchers-now-pretend-to-be-from-offensive-security-firm/
  • Personal Information Protection Commission, G. of J. (2019, October 11). About the incorrect display of users’ personal information that occurred on Amazon’s mail order site (Japanese: Amazon no tsūhan saito de hassei shita riyōsha no kojin jōhō no go hyōji ni tsuite). Retrieved April 3, 2021, from Personal Information Protection Commission website: https://www.ppc.go.jp/files/pdf/191011_houdou.pdf
  • Peters, B. G. (2005). Institutional theory in political science: the “new institutionalism” (Fourth). Glos, United Kingdom: Edward Elgar Publishing.
  • PurpleSec. (2022). 2021 Cyber Security Statistics: The Ultimate List Of Stats, Data & Trends. PurpleSec LLC. https://purplesec.us/resources/cyber-security-statistics/
  • Scopus. (2021, April 7). Scopus - Analyze Search Results. Retrieved April 7, 2021, from Scopus website: https://www.scopus.com/term/analyzer.uri?sid=6e7586bbd400032e5385837b9747777f&origin=resultslist&src=s&s=TITLE-ABS-KEY%28cybersecurity%29+AND+PUBYEAR+%3E+2013+AND+PUBYEAR+%3C+2021&sort=plf-f&sdt=b&sot=b&sl=66&count=8572&analyzeResults=Analyze+results&txGi Sigholm, J. (2013). Non-State Actors in Cyberspace Operations. Journal of Military Studies, 4(1), 1–37. https://doi.org/10.1515/JMS-2016-0184
  • Suzuki, K. (2019). Opening Speech of Cyber Initiative Tokyo 2019 on December 12, 2019. Retrieved September 20, 2020, from Cyber Initiative Tokyo 2019 website: https://www.mofa.go.jp/mofaj/files/000550682.pdf
  • United Nations. (2022, April 7). UN General Assembly votes to suspend Russia from the Human Rights Council. UN News. https://news.un.org/en/story/2022/04/1115782
  • Waltz, K. N. (1979). Theory of International Politics (1st ed.). McGraw-Hill. https://dl1.cuni.cz/pluginfile.php/486328/mod_resource/content/0/Kenneth N. Waltz Theory of International Politics Addison-Wesley series in political science 1979.pdf
  • Watson, N. (2016). US Election: Isolationism and Global Power. Australian Institute of International Affairs. https://www.internationalaffairs.org.au/us-election-isolationism-and-global-power/
  • Web of Science. (2021). Web of Science [v.5.35] - Citation Report. Retrieved April 7, 2021, from Web of Science Website website: https://apps.webofknowledge.com/CitationReport.do?product=WOS&search_mode=CitationReport&SID=F1EceKdecdlogQLOM34&page=1&cr_pqid=6&viewType=summary

Theoretical, Empirical, and Normative Dimensions of State Involvement in Cybersecurity: The Case of Japan

Yıl 2022, Cilt: 12 Sayı: 2, 689 - 708, 02.08.2022
https://doi.org/10.48146/odusobiad.1079425

Öz

Unlike other major liberal democratic countries where the states can be argued to have oriented their involvement in cybersecurity relatively more towards the national security aspect such as the US, the role of the state in the cybersecurity realm has a less clear-cut orientation in the case of Japan. This paper clarifies the nature of the role of state in cybersecurity in Japan using the framework utilized by Cavelty and Egloff’s 2019 article (Cavelty & Egloff, 2019). Within this framework, the role of the state is analyzed in theoretical, empirical, and normative dimensions. The theoretical dimension analysis focuses on different theories in literature regarding the Japanese state whereas the data for the empirical dimension analysis come from publicly available records by key Japanese state and private organizations involved in cybersecurity. The normative dimension analysis emphasizes the time horizon aspect of cybersecurity policies the Japanese state should be directing its attention. In conclusion, it is found that the Japanese state embodies the roles of “knowledge creator/disseminator”, “supporter/representative of society”, “partner”, and “guarantor and protector” in addition to a necessity for government bodies to turn towards proactive long-term policies and initiatives for better cybersecurity in Japan.

Kaynakça

  • Armitage, R., & Cooper, Z. (2021, November 14). Japan should be admitted to the Five Eyes network. Nikkei Asia. https://asia.nikkei.com/Opinion/Japan-should-be-admitted-to-the-Five-Eyes-network
  • Bernes, T., Brozus, L., Hatuel-Radoshitzky, M., Heistein, A., Greco, E., Sasnal, P., Yurgens, I., Kulik, S., Turianskyi, Y., & Gruzd, S. (2020, May 21). Challenges of Global Governance Amid the COVID-19 Pandemic. Council on Foreign Relations. https://www.cfr.org/report/challenges-global-governance-amid-covid-19-pandemic
  • Cavelty, M. D., & Egloff, F. J. (2019). The Politics of Cybersecurity: Balancing Different Roles of the State. St Antony’s International Review, 15(1), 37–57.
  • CISCO. (2020). What Is Cybersecurity? Retrieved March 31, 2021, from CISCO Homepage website: https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
  • Deibert, R., & Rohozinski, R. (2011). Contesting cyberspace and the coming crisis of authority. In Access Contested: Security, Identity, and Resistance in Asian Cyberspace. https://doi.org/10.7551/mitpress/9780262016780.003.0002
  • Engerer, H. (2011). Security As a Public, Private Or Club Good: Some Fundamental Considerations. Defence and Peace Economics, 22(2), 135–145. https://doi.org/10.1080/10242694.2011.542333
  • Fukuyama, F. (1989). The End of History? The National Interest, 16, 3–18. https://www.jstor.org/stable/24027184?seq=1
  • Hatakeyama, K., & Freedman, C. F. (2010). Snow on the pine: Japan’s quest for a leadership role in Asia. In Snow on the Pine: Japan’s Quest for a Leadership Role in Asia. World Scientific Publishing Co. https://doi.org/10.1142/7534/SUPPL_FILE/7534_CHAP01.PDF
  • Higashi, C., & Lauer, G. P. (1990). The Internationalization of the Japanese Economy (2nd ed.). Springer Science+Business Media. http://lib.bus.umich.edu/cgi-bin/koha/opac-detail.pl?biblionumber=217900&query_desc=su%3A%22Industrial management%22
  • Honda, M. (2001). Gendai nihon no seiji to gyōsei (Government and Politics in Contemporary Japan). Hokuju Shuppan.
  • Inoue, K. (2012, May 8). Elpida and the Failure of Japan Inc. Nippon.Com. https://www.nippon.com/en/currents/d00032/elpida-and-the-failure-of-japan-inc.html#
  • IPA. (2016, March 18). Password Awareness Posters in Languages Used by ASEAN Member Countries. Retrieved March 31, 2021, from Japan Information-Technology Promotion Agency website: https://www.ipa.go.jp/security/english/passwordposter.html
  • IPA. (2017). IPA/ISEC: Information Security Early Warning Partnership. Retrieved March 31, 2021, from Japan Information Technology Promotion Agency website: https://www.ipa.go.jp/security/english/about_partnership.html
  • Kawabata, E. (2006). Contemporary Government Reform in Japan: The Dual State in Flux. Palgrave Macmillan. https://cornerstone.lib.mnsu.edu/university-archives-msu-authors/234/
  • Kayama, K. (2015). Kōdo hyōteki-gata kōgeki taisaku ni muketa shisutemusetsukei gaido ~ kansen suru koto o zentei to shita `bōgyo gurando dezain’ ni muketa shisutemusetsukei no kandokoro ~ (System design guide for highly targeted attack countermeasures-The key points of system design for “defense grand design” on the premise of infection-). https://www.ipa.go.jp/files/000045950.pdf
  • Khanna, D. M. (1997). The Rise, Decline, and Renewal of Silicon Valley’s High Technology Industry (1st ed.). Routledge. https://www.routledge.com/The-Rise-Decline-and-Renewal-of-Silicon-Valleys-High-Technology-Industry/Khanna/p/book/9780815353614
  • Klimburg, A. (2018). The Darkening Web: The War for Cyberspace. New York: Penguin Books.
  • Lee, Y. W. (2008). The Japanese Challenge to the American Neoliberal World Order: Identity, Meaning, and Foreign Policy. Stanford University Press. https://www.sup.org/books/title/?id=10889
  • Liaropoulos, A. (2013). Exercising State Sovereignty in Cyberspace: An International Cyber-Order under Construction? Journal of Information Warfare, 12(2), 19–26. https://www.jstor.org/stable/26486852
  • Lowenthal, M. M. (2019). Intelligence: From Secrets to Policy (Eighth). California: CQ Press.
  • Matsukawa, B., Flores, R., Remorin, L. A., & Yarochkin, F. (n.d.). Top Countries With ICS Endpoint Malware Detections. Trend Micro. Retrieved April 12, 2022, from https://www.trendmicro.com/en_be/research/21/f/top-countries-with-ics-endpoint-malware-detections-.html
  • Miyashita, A. (2008). Where Do Norms Come From? Foundations of Japan’s Postwar Pacifism. In Y. Sato & K. Hirata (Eds.), Norms, Interests, and Power in Japanese Foreign Policy (pp. 21–46). New York: Palgrave Macmillan. https://doi.org/10.1057/9780230615809_2
  • Myers, L. (2013, October 23). Is this how Indonesia topped the malicious traffic charts? WeLiveSecurity by ESET. https://www.welivesecurity.com/2013/10/23/is-this-how-indonesia-topped-the-malicious-traffic-charts/
  • Okimoto, D. I., Sugano, T., & Weinstein, F. B. (1984). Technological Resources. In D. I. Okimoto, T. Sugano, & F. B. Weinstein (Eds.), Competitive Edge: The Semiconductor Industry in the U.S. and Japan (pp. 35–77). Stanford University Press. https://www.sup.org/books/extra/?id=2964&isbn=0804712255&gvp=1
  • Osborne, C. (2021, April 1). Google: North Korean hackers are targeting researchers through fake offensive security firm. Retrieved April 6, 2021, from ZDNet website: https://www.zdnet.com/article/google-north-korean-hackers-targeting-researchers-now-pretend-to-be-from-offensive-security-firm/
  • Personal Information Protection Commission, G. of J. (2019, October 11). About the incorrect display of users’ personal information that occurred on Amazon’s mail order site (Japanese: Amazon no tsūhan saito de hassei shita riyōsha no kojin jōhō no go hyōji ni tsuite). Retrieved April 3, 2021, from Personal Information Protection Commission website: https://www.ppc.go.jp/files/pdf/191011_houdou.pdf
  • Peters, B. G. (2005). Institutional theory in political science: the “new institutionalism” (Fourth). Glos, United Kingdom: Edward Elgar Publishing.
  • PurpleSec. (2022). 2021 Cyber Security Statistics: The Ultimate List Of Stats, Data & Trends. PurpleSec LLC. https://purplesec.us/resources/cyber-security-statistics/
  • Scopus. (2021, April 7). Scopus - Analyze Search Results. Retrieved April 7, 2021, from Scopus website: https://www.scopus.com/term/analyzer.uri?sid=6e7586bbd400032e5385837b9747777f&origin=resultslist&src=s&s=TITLE-ABS-KEY%28cybersecurity%29+AND+PUBYEAR+%3E+2013+AND+PUBYEAR+%3C+2021&sort=plf-f&sdt=b&sot=b&sl=66&count=8572&analyzeResults=Analyze+results&txGi Sigholm, J. (2013). Non-State Actors in Cyberspace Operations. Journal of Military Studies, 4(1), 1–37. https://doi.org/10.1515/JMS-2016-0184
  • Suzuki, K. (2019). Opening Speech of Cyber Initiative Tokyo 2019 on December 12, 2019. Retrieved September 20, 2020, from Cyber Initiative Tokyo 2019 website: https://www.mofa.go.jp/mofaj/files/000550682.pdf
  • United Nations. (2022, April 7). UN General Assembly votes to suspend Russia from the Human Rights Council. UN News. https://news.un.org/en/story/2022/04/1115782
  • Waltz, K. N. (1979). Theory of International Politics (1st ed.). McGraw-Hill. https://dl1.cuni.cz/pluginfile.php/486328/mod_resource/content/0/Kenneth N. Waltz Theory of International Politics Addison-Wesley series in political science 1979.pdf
  • Watson, N. (2016). US Election: Isolationism and Global Power. Australian Institute of International Affairs. https://www.internationalaffairs.org.au/us-election-isolationism-and-global-power/
  • Web of Science. (2021). Web of Science [v.5.35] - Citation Report. Retrieved April 7, 2021, from Web of Science Website website: https://apps.webofknowledge.com/CitationReport.do?product=WOS&search_mode=CitationReport&SID=F1EceKdecdlogQLOM34&page=1&cr_pqid=6&viewType=summary
Toplam 34 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Kamu Yönetimi
Bölüm ARAŞTIRMA MAKALESİ
Yazarlar

Elif Sercen Nurcan 0000-0002-7104-0283

Yayımlanma Tarihi 2 Ağustos 2022
Gönderilme Tarihi 25 Şubat 2022
Yayımlandığı Sayı Yıl 2022 Cilt: 12 Sayı: 2

Kaynak Göster

APA Nurcan, E. S. (2022). Theoretical, Empirical, and Normative Dimensions of State Involvement in Cybersecurity: The Case of Japan. Ordu Üniversitesi Sosyal Bilimler Enstitüsü Sosyal Bilimler Araştırmaları Dergisi, 12(2), 689-708. https://doi.org/10.48146/odusobiad.1079425

  Bilginin ışığında aydınlanmak dileğiyle....

 ODÜSOBİAD