What Can a Critical Cybersecurity Do?

Abstract Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next “cyber-attack” or the emerg...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International political sociology 2022-09, Vol.16 (3), p.1
Hauptverfasser: Dwyer, Andrew C, Stevens, Clare, Muller, Lilly Pijnenburg, Cavelty, Myriam Dunn, Coles-Kemp, Lizzie, Thornton, Pip
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 3
container_start_page 1
container_title International political sociology
container_volume 16
creator Dwyer, Andrew C
Stevens, Clare
Muller, Lilly Pijnenburg
Cavelty, Myriam Dunn
Coles-Kemp, Lizzie
Thornton, Pip
description Abstract Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next “cyber-attack” or the emergence of a new vulnerability in highly interconnected supply chains. However, such discursive positioning of threat and its resolution has typically reinforced, and perpetuated, dominant power structures and forms of violence as well as universalist protocols of protection. In this collective discussion, in contrast, six scholars from different disciplines discuss what it means to “do” “critical” research into what many of us uncomfortably refer to as “cybersecurity.” In a series of provocations and reflections, we argue that, as much as cybersecurity may be a dominant discursive mode with associated funding and institutional “benefits,” it is crucial to look outward, in conversation with other moves to consider our technological moment. That is, we question who and what cybersecurity is for, how to engage as academics, and what it could mean to undo cybersecurity in ways that can reassess and challenge power structures in the twenty-first century.
doi_str_mv 10.1093/ips/olac013
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2699597331</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A775958635</galeid><oup_id>10.1093/ips/olac013</oup_id><sourcerecordid>A775958635</sourcerecordid><originalsourceid>FETCH-LOGICAL-c298t-bb214aff89f9b8d2449835b2b8d943ebaaba981c0b8b66aab09632c2724e87d13</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhoMouK6e_AMF0Yt0Nx9Nk5xkqZ-w4EXxGJJsolm6TU3aw_57I108yhxm5uV5Z-AF4BLBBYKCLH2flqFVBiJyBGaIVaKkNWfHfzMTp-AspS2ElCLGZ-D640sNRaO6QhVN9IM3qi2avbYxWTNmYV_ch7tzcOJUm-zFoc_B--PDW_Ncrl-fXprVujRY8KHUGqNKOceFE5pvcFUJTqjGeRYVsVoprQRHBmqu6zpvUNQEG8xwZTnbIDIHV9PdPobv0aZBbsMYu_xS4loIKhghv9Rioj5Va6XvXBiiMrk2dudN6KzzWV8xRgXlNaHZcDsZTAwpRetkH_1Oxb1EUP4GJ3Nw8hBcpm8mOoz9v-APVTFszg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2699597331</pqid></control><display><type>article</type><title>What Can a Critical Cybersecurity Do?</title><source>Worldwide Political Science Abstracts</source><source>Sociological Abstracts</source><source>Oxford University Press Journals All Titles (1996-Current)</source><creator>Dwyer, Andrew C ; Stevens, Clare ; Muller, Lilly Pijnenburg ; Cavelty, Myriam Dunn ; Coles-Kemp, Lizzie ; Thornton, Pip</creator><creatorcontrib>Dwyer, Andrew C ; Stevens, Clare ; Muller, Lilly Pijnenburg ; Cavelty, Myriam Dunn ; Coles-Kemp, Lizzie ; Thornton, Pip</creatorcontrib><description>Abstract Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next “cyber-attack” or the emergence of a new vulnerability in highly interconnected supply chains. However, such discursive positioning of threat and its resolution has typically reinforced, and perpetuated, dominant power structures and forms of violence as well as universalist protocols of protection. In this collective discussion, in contrast, six scholars from different disciplines discuss what it means to “do” “critical” research into what many of us uncomfortably refer to as “cybersecurity.” In a series of provocations and reflections, we argue that, as much as cybersecurity may be a dominant discursive mode with associated funding and institutional “benefits,” it is crucial to look outward, in conversation with other moves to consider our technological moment. That is, we question who and what cybersecurity is for, how to engage as academics, and what it could mean to undo cybersecurity in ways that can reassess and challenge power structures in the twenty-first century.</description><identifier>ISSN: 1749-5679</identifier><identifier>EISSN: 1749-5687</identifier><identifier>DOI: 10.1093/ips/olac013</identifier><language>eng</language><publisher>Oxford: Oxford University Press</publisher><subject>Academic staff ; Book publishing ; Computation ; Computer security ; Cybersecurity ; Cyberterrorism ; Data security ; Internet ; Modern society ; Positioning ; Power ; Safety and security measures ; Supply ; Threats ; Violence</subject><ispartof>International political sociology, 2022-09, Vol.16 (3), p.1</ispartof><rights>The Author(s) (2022). Published by Oxford University Press on behalf of the International Studies Association. 2022</rights><rights>COPYRIGHT 2022 Oxford University Press</rights><rights>The Author(s) (2022). Published by Oxford University Press on behalf of the International Studies Association.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c298t-bb214aff89f9b8d2449835b2b8d943ebaaba981c0b8b66aab09632c2724e87d13</citedby><cites>FETCH-LOGICAL-c298t-bb214aff89f9b8d2449835b2b8d943ebaaba981c0b8b66aab09632c2724e87d13</cites><orcidid>0000-0002-5685-7930 ; 0000-0003-2207-6834</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,781,785,1585,12847,27346,27926,27927,33776</link.rule.ids></links><search><creatorcontrib>Dwyer, Andrew C</creatorcontrib><creatorcontrib>Stevens, Clare</creatorcontrib><creatorcontrib>Muller, Lilly Pijnenburg</creatorcontrib><creatorcontrib>Cavelty, Myriam Dunn</creatorcontrib><creatorcontrib>Coles-Kemp, Lizzie</creatorcontrib><creatorcontrib>Thornton, Pip</creatorcontrib><title>What Can a Critical Cybersecurity Do?</title><title>International political sociology</title><description>Abstract Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next “cyber-attack” or the emergence of a new vulnerability in highly interconnected supply chains. However, such discursive positioning of threat and its resolution has typically reinforced, and perpetuated, dominant power structures and forms of violence as well as universalist protocols of protection. In this collective discussion, in contrast, six scholars from different disciplines discuss what it means to “do” “critical” research into what many of us uncomfortably refer to as “cybersecurity.” In a series of provocations and reflections, we argue that, as much as cybersecurity may be a dominant discursive mode with associated funding and institutional “benefits,” it is crucial to look outward, in conversation with other moves to consider our technological moment. That is, we question who and what cybersecurity is for, how to engage as academics, and what it could mean to undo cybersecurity in ways that can reassess and challenge power structures in the twenty-first century.</description><subject>Academic staff</subject><subject>Book publishing</subject><subject>Computation</subject><subject>Computer security</subject><subject>Cybersecurity</subject><subject>Cyberterrorism</subject><subject>Data security</subject><subject>Internet</subject><subject>Modern society</subject><subject>Positioning</subject><subject>Power</subject><subject>Safety and security measures</subject><subject>Supply</subject><subject>Threats</subject><subject>Violence</subject><issn>1749-5679</issn><issn>1749-5687</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>TOX</sourceid><sourceid>7UB</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>BHHNA</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kE1LxDAQhoMouK6e_AMF0Yt0Nx9Nk5xkqZ-w4EXxGJJsolm6TU3aw_57I108yhxm5uV5Z-AF4BLBBYKCLH2flqFVBiJyBGaIVaKkNWfHfzMTp-AspS2ElCLGZ-D640sNRaO6QhVN9IM3qi2avbYxWTNmYV_ch7tzcOJUm-zFoc_B--PDW_Ncrl-fXprVujRY8KHUGqNKOceFE5pvcFUJTqjGeRYVsVoprQRHBmqu6zpvUNQEG8xwZTnbIDIHV9PdPobv0aZBbsMYu_xS4loIKhghv9Rioj5Va6XvXBiiMrk2dudN6KzzWV8xRgXlNaHZcDsZTAwpRetkH_1Oxb1EUP4GJ3Nw8hBcpm8mOoz9v-APVTFszg</recordid><startdate>20220901</startdate><enddate>20220901</enddate><creator>Dwyer, Andrew C</creator><creator>Stevens, Clare</creator><creator>Muller, Lilly Pijnenburg</creator><creator>Cavelty, Myriam Dunn</creator><creator>Coles-Kemp, Lizzie</creator><creator>Thornton, Pip</creator><general>Oxford University Press</general><scope>TOX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>0-V</scope><scope>3V.</scope><scope>7U4</scope><scope>7UB</scope><scope>7XB</scope><scope>88J</scope><scope>8BJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BHHNA</scope><scope>CCPQU</scope><scope>DPSOV</scope><scope>DWI</scope><scope>DWQXO</scope><scope>FQK</scope><scope>GNUQQ</scope><scope>HEHIP</scope><scope>JBE</scope><scope>KC-</scope><scope>M2L</scope><scope>M2R</scope><scope>M2S</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>WZK</scope><orcidid>https://orcid.org/0000-0002-5685-7930</orcidid><orcidid>https://orcid.org/0000-0003-2207-6834</orcidid></search><sort><creationdate>20220901</creationdate><title>What Can a Critical Cybersecurity Do?</title><author>Dwyer, Andrew C ; Stevens, Clare ; Muller, Lilly Pijnenburg ; Cavelty, Myriam Dunn ; Coles-Kemp, Lizzie ; Thornton, Pip</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c298t-bb214aff89f9b8d2449835b2b8d943ebaaba981c0b8b66aab09632c2724e87d13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Academic staff</topic><topic>Book publishing</topic><topic>Computation</topic><topic>Computer security</topic><topic>Cybersecurity</topic><topic>Cyberterrorism</topic><topic>Data security</topic><topic>Internet</topic><topic>Modern society</topic><topic>Positioning</topic><topic>Power</topic><topic>Safety and security measures</topic><topic>Supply</topic><topic>Threats</topic><topic>Violence</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dwyer, Andrew C</creatorcontrib><creatorcontrib>Stevens, Clare</creatorcontrib><creatorcontrib>Muller, Lilly Pijnenburg</creatorcontrib><creatorcontrib>Cavelty, Myriam Dunn</creatorcontrib><creatorcontrib>Coles-Kemp, Lizzie</creatorcontrib><creatorcontrib>Thornton, Pip</creatorcontrib><collection>Access via Oxford University Press (Open Access Collection)</collection><collection>CrossRef</collection><collection>ProQuest Social Sciences Premium Collection</collection><collection>ProQuest Central (Corporate)</collection><collection>Sociological Abstracts (pre-2017)</collection><collection>Worldwide Political Science Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Social Science Database (Alumni Edition)</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Social Science Premium Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Sociological Abstracts</collection><collection>ProQuest One Community College</collection><collection>Politics Collection</collection><collection>Sociological Abstracts</collection><collection>ProQuest Central Korea</collection><collection>International Bibliography of the Social Sciences</collection><collection>ProQuest Central Student</collection><collection>Sociology Collection</collection><collection>International Bibliography of the Social Sciences</collection><collection>ProQuest Politics Collection</collection><collection>Political Science Database</collection><collection>Social Science Database</collection><collection>Sociology Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>Sociological Abstracts (Ovid)</collection><jtitle>International political sociology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dwyer, Andrew C</au><au>Stevens, Clare</au><au>Muller, Lilly Pijnenburg</au><au>Cavelty, Myriam Dunn</au><au>Coles-Kemp, Lizzie</au><au>Thornton, Pip</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>What Can a Critical Cybersecurity Do?</atitle><jtitle>International political sociology</jtitle><date>2022-09-01</date><risdate>2022</risdate><volume>16</volume><issue>3</issue><spage>1</spage><pages>1-</pages><issn>1749-5679</issn><eissn>1749-5687</eissn><abstract>Abstract Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next “cyber-attack” or the emergence of a new vulnerability in highly interconnected supply chains. However, such discursive positioning of threat and its resolution has typically reinforced, and perpetuated, dominant power structures and forms of violence as well as universalist protocols of protection. In this collective discussion, in contrast, six scholars from different disciplines discuss what it means to “do” “critical” research into what many of us uncomfortably refer to as “cybersecurity.” In a series of provocations and reflections, we argue that, as much as cybersecurity may be a dominant discursive mode with associated funding and institutional “benefits,” it is crucial to look outward, in conversation with other moves to consider our technological moment. That is, we question who and what cybersecurity is for, how to engage as academics, and what it could mean to undo cybersecurity in ways that can reassess and challenge power structures in the twenty-first century.</abstract><cop>Oxford</cop><pub>Oxford University Press</pub><doi>10.1093/ips/olac013</doi><orcidid>https://orcid.org/0000-0002-5685-7930</orcidid><orcidid>https://orcid.org/0000-0003-2207-6834</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1749-5679
ispartof International political sociology, 2022-09, Vol.16 (3), p.1
issn 1749-5679
1749-5687
language eng
recordid cdi_proquest_journals_2699597331
source Worldwide Political Science Abstracts; Sociological Abstracts; Oxford University Press Journals All Titles (1996-Current)
subjects Academic staff
Book publishing
Computation
Computer security
Cybersecurity
Cyberterrorism
Data security
Internet
Modern society
Positioning
Power
Safety and security measures
Supply
Threats
Violence
title What Can a Critical Cybersecurity Do?
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T10%3A41%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=What%20Can%20a%20Critical%20Cybersecurity%20Do?&rft.jtitle=International%20political%20sociology&rft.au=Dwyer,%20Andrew%20C&rft.date=2022-09-01&rft.volume=16&rft.issue=3&rft.spage=1&rft.pages=1-&rft.issn=1749-5679&rft.eissn=1749-5687&rft_id=info:doi/10.1093/ips/olac013&rft_dat=%3Cgale_proqu%3EA775958635%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2699597331&rft_id=info:pmid/&rft_galeid=A775958635&rft_oup_id=10.1093/ips/olac013&rfr_iscdi=true