TY - JOUR
T1 - Media presentations of Vietnam's cybersecurity law
T2 - A comparative approach with corpus-based critical discourse analysis
AU - Nguyen, Moon QMN
N1 - Publisher copyright:
© 2023 Moon QMN-Nguyen
PY - 2023/9
Y1 - 2023/9
N2 - The study uses corpus-based critical discourse analysis to examine the divergent framing and positioning of cybersecurity issues and Vietnam's Cybersecurity Law by state-sponsored media and international media through topic modeling, bigram and trigram collocation, and concordance analyses. The findings reveal that Vietnam's national media tend to justify the law by emphasizing human-related cyber threats, legitimizing national security, and delegitimizing opposing forces. In contrast, international media outlets focus on providing critical comments, criticism, and real-life events of human rights violations in the country to question and confront the law's legitimacy. The study also analyzes the competitive and tense nature of the discourses, characterized by antagonistic responses between the two media sources.
AB - The study uses corpus-based critical discourse analysis to examine the divergent framing and positioning of cybersecurity issues and Vietnam's Cybersecurity Law by state-sponsored media and international media through topic modeling, bigram and trigram collocation, and concordance analyses. The findings reveal that Vietnam's national media tend to justify the law by emphasizing human-related cyber threats, legitimizing national security, and delegitimizing opposing forces. In contrast, international media outlets focus on providing critical comments, criticism, and real-life events of human rights violations in the country to question and confront the law's legitimacy. The study also analyzes the competitive and tense nature of the discourses, characterized by antagonistic responses between the two media sources.
KW - Authoritarian
KW - Corpus liguistics
KW - Critical discourse analysis
KW - Cybersecurity
KW - Cybersecurity law
UR - https://www.sciencedirect.com/journal/computer-law-and-security-review/vol/50/suppl/C
UR - http://www.scopus.com/inward/record.url?scp=85163709009&partnerID=8YFLogxK
U2 - 10.1016/j.clsr.2023.105835
DO - 10.1016/j.clsr.2023.105835
M3 - Journal article
SN - 0267-3649
VL - 50
JO - Computer Law and Security Review
JF - Computer Law and Security Review
M1 - 105835
ER -