You are here: Home Contents V10 N3 V10N3_Lapke.html
Personal tools

Power Relationships in The United States Federal Government and Its Effect on Cybersecurity Policy

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 10, Number 3 (2014)
Pages 319
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Michael Lapke — University of Mary Washington, USA
Ramesh Subramanian — Quinnipiac University, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

The United States federal government faces a major challenge as it attempts tosecure the nation’s resources and critical infrastructure: the politics and powerrelationships that form the essence of its very body. Implementing security in anyorganization will affect the power relationships within that organization (Lapke and Dhillon, 2008) and the federal government is one of the largest and most complex.Considering the long standing de jure and de facto power relationships inherent inthe federal government, the implementation of broad reaching cyber security policyhas been a long fought battle. Subramanian (2010) detailed the government’sapproach to cyber security in the 10 year period between to the 2000 and 2010. This paper is an extension of Subramanian’s work and focuses the analysis through the lens of Clegg’s (2002) Circuits of Power. It explores the power relationshipsthat impacted the decisions made by the executive, legislative, and judicial branchesof government. It also describes how these power relationships changed as a resultof the emerging reality of cyber security.

 

 

Keywords

Cyber Security Policy, Power Relationships, Circuits of Power, Government Policy

 

 

References

Aitoro, J. R. (2009). The Comprehensive National Cybersecurity Initiative - The Basics. Retrieved February 28, 2010, from http://www.nextgov.com/the_basics/tb_20090601_8569.php

Backhouse, J., Hsu, C., and Silva, L. (2006). Circuits of power in creating de jure standards:shaping an international information systems security standard. MIS Quarterly, 30, 413-438.

Blair, D. (2009). Hearing of the House Permanent Select Committee on Intelligence AnnualThreat Assessment. from http://www.dni.gov/ testimonies/20090225_transcript.pdf

Clegg, S. (2002). Frameworks of Power. Thousand Oaks, CA: Sage Publications.

Daalder, I. H., Destler, I., Lindsay, J. M., Light, P. C., Litan, R. E., O'Hanlon, M. E., et al. (2002).Assessing the Department of Homeland Security. fromhttp://www.brookings.edu/fp/projects/homeland/assessdhs.pdf

Edelman, A. (2013). Cyberbunker hosting site said to be dropping virtual ‘nuclear bomb’ onInternet with massive, global denial of service attack. fromhttp://www.nydailynews.com/news/national/internet-nuked-massive-ongoing-cyber-attack-experts-article-1.1300372

Fleisher, A. (2002). Press Briefing on Homeland Security. fromhttp://www.fas.org/sgp/news/2002/03/wh031902.html

Gellman, B. (2003). Anti-Terror Pioneer Turns In the Badge. Retrieved February 24, 2010,2010, from http://www.washingtonpost.com/ac2/wp-dyn/A17694-2003Mar12

Gellman, B., and Poitras, L. (2013). U.S., British intelligence mining data from nine U.S.Internet companies in broad secret program. Retrieved July 17, 2013, fromhttp://articles.washingtonpost.com/2013-06-06/news/39784046_1_prism-nsa-u-s-servers

Kolkowska, E., and Dhillon, G. (2012). Organizational power and information security rulecompliance. Computers and Security.

Krebs, B. (2008). More Cyber Security Regulations Recommended. Retrieved February 4,2010, from http://www.washingtonpost.com/wp-dyn/content/article/2008/12/08/AR2008120801944.html

Lapke, M., and Dhillon, G. (2008). Power Relationships in Information Systems Security PolicyFormulation and Implementation. Paper presented at the 16th European Conference forInformation Systems.

Lapke, M., Subramanian, R. (2013). Cyber Security through the Lens of Circuits of Power.Information Institute Annual Security Conferences. Las Vegas, NV

Lieberman, J., and Specter, A. (2001). To establish the Department of National HomelandSecurity. from http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_billsanddocid=f:s1534is.txt.pdf

Lockwood, D. (1964). Social Integration and System Integration. In G. K. Zollschan and W.Hirsch (Eds.), Explorations in Social Change (pp. 244 257). London: Routledge and Kegan Paul.

Markus, M. (1983). Power, Politics, and MIS Implementation. Communications of the ACM,26(6), 430.

Markus, M., and Bjorn-Anderson, N. (1987). Power over users: Its exercise by systemprofessionals. Communications of the ACM, 26(6), 430-444.

Obama, B. (2013). Cybersecurity. from http://www.whitehouse.gov/cybersecurity

Pettigrew, A. (1972). Information Control as a Power Resource. Sociology, 6(2), 187-204.

Ramasastry, A. (2002). The Cyber Security Enhancement Act's "Good Faith Disclosure"Exception. Retrieved February 16, 2010, from http://writ.news.findlaw.com/ramasastry/20020328.html

Silva, L. (1997). Power and Politics in the adoption of information systems by organisations: The caseof a research centre in Latin America. London School of Economics and Political Science,London.

Smith, S., Winchester, D., Bunker, D., and Jamieson, R. (2010). Circuits of Power: A Study ofMandated Compliance to an Information Systems Security De Jure Standard in a GovernmentOrganization. MIS Quarterly, 34(3), 463-486.

SOPA petition gets millions of signatures as internet piracy legislation protests continue.(2012). The Washington Post.

Subramanian, R. (2010). Power, Politics and Cyber Security in the United States: A CriticalAnalysis. Quinnipiac University; Yale University - Information Society Project.

Weisenthal, J., and Ingersoll, G. (2013). An Overwhelming Number Of Cyber-Attacks OnAmerica Are Coming From This Army Building In China. fromhttp://www.businessinsider.com/china-hacking-pla-unit-61398-2013-2

Whittaker, Z. (2013). Obama's cybersecurity executive order: What you need to know. fromhttp://www.zdnet.com/obamas-cybersecurity-executive-order-what-you-need-to-know-7000011221/