Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: http://hdl.handle.net/11701/47434
Полная запись метаданных
Поле DCЗначениеЯзык
dc.contributor.authorStadnik, Ilona T.-
dc.date.accessioned2024-09-04T20:03:09Z-
dc.date.available2024-09-04T20:03:09Z-
dc.date.issued2024-06-
dc.identifier.citationStadnik I. T. How to study ICT-security policy: Opportunities and challenges for critical discourse-analysis. Vestnik of Saint Petersburg University. International Relations, 2024, vol. 17, issue 2, pp. 183–200. https://doi.org/10.21638/spbu06.2024.205 (In Russian)en_GB
dc.identifier.otherhttps://doi.org/10.21638/spbu06.2024.205-
dc.identifier.urihttp://hdl.handle.net/11701/47434-
dc.description.abstractThe article examines the method of critical discourse-analysis (CDA) on the example of the relations between the United States and Russia in the field of ICT security, as well as in the context of negotiations at the UN level in the same area, where both countries have a significant influence on the processes. CDA can be used to study ICT security policy in order to understand how different actors use language to discuss problems: what terms and concepts are used, as well as how they can influence public perception of the problem. CDA can also be used to study the dynamics of interaction between different actors: what interests they pursue and what compromises they are willing to make to achieve common goals. The method is connected with the theoretical framework of A. Holzscheiter, which identifies the levels of analysis (micro-agents and macro-structures), as well as the types of power/influence realization in discourse (deliberative and productive). As a demonstration of the method, the author has made a brief analysis of the discourses of ICT threats to the United States and Russia based on strategic documents of the states. It is inscribed in the structures of bilateral relations and international negotiations, presented in the form of events on a timeline. Depending on the level of analysis or the starting point of the study — agents or structures — we get completely different explanations of the causal relationships of possible explanations for policy change through discourse (productive or deliberative). The study of ICT security is further complicated by the fact that we must keep both the bilateral and international levels of interaction in focus, since these processes are closely interrelated. In conclusion, the article describes important limitations of the method, including the weak explanatory potential of the reasons for the change in ICT security policy.en_GB
dc.language.isoruen_GB
dc.publisherSt Petersburg State Universityen_GB
dc.relation.ispartofseriesVestnik of St Petersburg University. International Relations;Volume 17; Issue 2-
dc.subjectcritical discourse-analysisen_GB
dc.subjectcybersecurityen_GB
dc.subjectinformation securityen_GB
dc.subjectagent-structure problemen_GB
dc.subjectUnited Statesen_GB
dc.subjectRussiaen_GB
dc.titleHow to study ICT-security policy: Opportunities and challenges for critical discourse-analysisen_GB
dc.typeArticleen_GB
Располагается в коллекциях:Issue 2

Файлы этого ресурса:
Файл Описание РазмерФормат 
6-2-2024+для+сайта-73-90.pdf661,45 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.