04.11.2014 Views

thesis

thesis

thesis

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table of Contents<br />

Acknowledgements<br />

vii<br />

1 Introduction 1<br />

1.1 Organising Internet security 3<br />

1.2 The rise of remote collaboration 4<br />

1.3 Existence and viability of peer security production 5<br />

1.4 Research plan 11<br />

2 Theoretical Foundations 15<br />

2.1 Social production and the collaborative turn 16<br />

2.2 The Internet security governance challenge 42<br />

2.3 Secrecy vs. openness 54<br />

2.4 Peer production of Internet security 67<br />

3 Research Design 75<br />

3.1 Research strategy 77<br />

3.2 Analytical model 81<br />

3.3 Data collection and analysis 86<br />

4 Endangering the Internet 91<br />

4.1 Estonian cyberattacks: A country sort of under attack 92<br />

4.2 Conficker botnet: Wasted talent for doom 108<br />

5 Producing Internet Security 123<br />

5.1 Estonia 124<br />

5.2 Conficker 142<br />

5.3 Conclusion 161

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!