What Can a Critical Cybersecurity Do?
Abstract Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next “cyber-attack” or the emerg...
Gespeichert in:
Veröffentlicht in: | International political sociology 2022-09, Vol.16 (3), p.1 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 3 |
container_start_page | 1 |
container_title | International political sociology |
container_volume | 16 |
creator | Dwyer, Andrew C Stevens, Clare Muller, Lilly Pijnenburg Cavelty, Myriam Dunn Coles-Kemp, Lizzie Thornton, Pip |
description | Abstract
Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next “cyber-attack” or the emergence of a new vulnerability in highly interconnected supply chains. However, such discursive positioning of threat and its resolution has typically reinforced, and perpetuated, dominant power structures and forms of violence as well as universalist protocols of protection. In this collective discussion, in contrast, six scholars from different disciplines discuss what it means to “do” “critical” research into what many of us uncomfortably refer to as “cybersecurity.” In a series of provocations and reflections, we argue that, as much as cybersecurity may be a dominant discursive mode with associated funding and institutional “benefits,” it is crucial to look outward, in conversation with other moves to consider our technological moment. That is, we question who and what cybersecurity is for, how to engage as academics, and what it could mean to undo cybersecurity in ways that can reassess and challenge power structures in the twenty-first century. |
doi_str_mv | 10.1093/ips/olac013 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2699597331</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A775958635</galeid><oup_id>10.1093/ips/olac013</oup_id><sourcerecordid>A775958635</sourcerecordid><originalsourceid>FETCH-LOGICAL-c298t-bb214aff89f9b8d2449835b2b8d943ebaaba981c0b8b66aab09632c2724e87d13</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhoMouK6e_AMF0Yt0Nx9Nk5xkqZ-w4EXxGJJsolm6TU3aw_57I108yhxm5uV5Z-AF4BLBBYKCLH2flqFVBiJyBGaIVaKkNWfHfzMTp-AspS2ElCLGZ-D640sNRaO6QhVN9IM3qi2avbYxWTNmYV_ch7tzcOJUm-zFoc_B--PDW_Ncrl-fXprVujRY8KHUGqNKOceFE5pvcFUJTqjGeRYVsVoprQRHBmqu6zpvUNQEG8xwZTnbIDIHV9PdPobv0aZBbsMYu_xS4loIKhghv9Rioj5Va6XvXBiiMrk2dudN6KzzWV8xRgXlNaHZcDsZTAwpRetkH_1Oxb1EUP4GJ3Nw8hBcpm8mOoz9v-APVTFszg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2699597331</pqid></control><display><type>article</type><title>What Can a Critical Cybersecurity Do?</title><source>Worldwide Political Science Abstracts</source><source>Sociological Abstracts</source><source>Oxford University Press Journals All Titles (1996-Current)</source><creator>Dwyer, Andrew C ; Stevens, Clare ; Muller, Lilly Pijnenburg ; Cavelty, Myriam Dunn ; Coles-Kemp, Lizzie ; Thornton, Pip</creator><creatorcontrib>Dwyer, Andrew C ; Stevens, Clare ; Muller, Lilly Pijnenburg ; Cavelty, Myriam Dunn ; Coles-Kemp, Lizzie ; Thornton, Pip</creatorcontrib><description>Abstract
Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next “cyber-attack” or the emergence of a new vulnerability in highly interconnected supply chains. However, such discursive positioning of threat and its resolution has typically reinforced, and perpetuated, dominant power structures and forms of violence as well as universalist protocols of protection. In this collective discussion, in contrast, six scholars from different disciplines discuss what it means to “do” “critical” research into what many of us uncomfortably refer to as “cybersecurity.” In a series of provocations and reflections, we argue that, as much as cybersecurity may be a dominant discursive mode with associated funding and institutional “benefits,” it is crucial to look outward, in conversation with other moves to consider our technological moment. That is, we question who and what cybersecurity is for, how to engage as academics, and what it could mean to undo cybersecurity in ways that can reassess and challenge power structures in the twenty-first century.</description><identifier>ISSN: 1749-5679</identifier><identifier>EISSN: 1749-5687</identifier><identifier>DOI: 10.1093/ips/olac013</identifier><language>eng</language><publisher>Oxford: Oxford University Press</publisher><subject>Academic staff ; Book publishing ; Computation ; Computer security ; Cybersecurity ; Cyberterrorism ; Data security ; Internet ; Modern society ; Positioning ; Power ; Safety and security measures ; Supply ; Threats ; Violence</subject><ispartof>International political sociology, 2022-09, Vol.16 (3), p.1</ispartof><rights>The Author(s) (2022). Published by Oxford University Press on behalf of the International Studies Association. 2022</rights><rights>COPYRIGHT 2022 Oxford University Press</rights><rights>The Author(s) (2022). Published by Oxford University Press on behalf of the International Studies Association.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c298t-bb214aff89f9b8d2449835b2b8d943ebaaba981c0b8b66aab09632c2724e87d13</citedby><cites>FETCH-LOGICAL-c298t-bb214aff89f9b8d2449835b2b8d943ebaaba981c0b8b66aab09632c2724e87d13</cites><orcidid>0000-0002-5685-7930 ; 0000-0003-2207-6834</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,781,785,1585,12847,27346,27926,27927,33776</link.rule.ids></links><search><creatorcontrib>Dwyer, Andrew C</creatorcontrib><creatorcontrib>Stevens, Clare</creatorcontrib><creatorcontrib>Muller, Lilly Pijnenburg</creatorcontrib><creatorcontrib>Cavelty, Myriam Dunn</creatorcontrib><creatorcontrib>Coles-Kemp, Lizzie</creatorcontrib><creatorcontrib>Thornton, Pip</creatorcontrib><title>What Can a Critical Cybersecurity Do?</title><title>International political sociology</title><description>Abstract
Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next “cyber-attack” or the emergence of a new vulnerability in highly interconnected supply chains. However, such discursive positioning of threat and its resolution has typically reinforced, and perpetuated, dominant power structures and forms of violence as well as universalist protocols of protection. In this collective discussion, in contrast, six scholars from different disciplines discuss what it means to “do” “critical” research into what many of us uncomfortably refer to as “cybersecurity.” In a series of provocations and reflections, we argue that, as much as cybersecurity may be a dominant discursive mode with associated funding and institutional “benefits,” it is crucial to look outward, in conversation with other moves to consider our technological moment. That is, we question who and what cybersecurity is for, how to engage as academics, and what it could mean to undo cybersecurity in ways that can reassess and challenge power structures in the twenty-first century.</description><subject>Academic staff</subject><subject>Book publishing</subject><subject>Computation</subject><subject>Computer security</subject><subject>Cybersecurity</subject><subject>Cyberterrorism</subject><subject>Data security</subject><subject>Internet</subject><subject>Modern society</subject><subject>Positioning</subject><subject>Power</subject><subject>Safety and security measures</subject><subject>Supply</subject><subject>Threats</subject><subject>Violence</subject><issn>1749-5679</issn><issn>1749-5687</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>TOX</sourceid><sourceid>7UB</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>BHHNA</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kE1LxDAQhoMouK6e_AMF0Yt0Nx9Nk5xkqZ-w4EXxGJJsolm6TU3aw_57I108yhxm5uV5Z-AF4BLBBYKCLH2flqFVBiJyBGaIVaKkNWfHfzMTp-AspS2ElCLGZ-D640sNRaO6QhVN9IM3qi2avbYxWTNmYV_ch7tzcOJUm-zFoc_B--PDW_Ncrl-fXprVujRY8KHUGqNKOceFE5pvcFUJTqjGeRYVsVoprQRHBmqu6zpvUNQEG8xwZTnbIDIHV9PdPobv0aZBbsMYu_xS4loIKhghv9Rioj5Va6XvXBiiMrk2dudN6KzzWV8xRgXlNaHZcDsZTAwpRetkH_1Oxb1EUP4GJ3Nw8hBcpm8mOoz9v-APVTFszg</recordid><startdate>20220901</startdate><enddate>20220901</enddate><creator>Dwyer, Andrew C</creator><creator>Stevens, Clare</creator><creator>Muller, Lilly Pijnenburg</creator><creator>Cavelty, Myriam Dunn</creator><creator>Coles-Kemp, Lizzie</creator><creator>Thornton, Pip</creator><general>Oxford University Press</general><scope>TOX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>0-V</scope><scope>3V.</scope><scope>7U4</scope><scope>7UB</scope><scope>7XB</scope><scope>88J</scope><scope>8BJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BHHNA</scope><scope>CCPQU</scope><scope>DPSOV</scope><scope>DWI</scope><scope>DWQXO</scope><scope>FQK</scope><scope>GNUQQ</scope><scope>HEHIP</scope><scope>JBE</scope><scope>KC-</scope><scope>M2L</scope><scope>M2R</scope><scope>M2S</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>WZK</scope><orcidid>https://orcid.org/0000-0002-5685-7930</orcidid><orcidid>https://orcid.org/0000-0003-2207-6834</orcidid></search><sort><creationdate>20220901</creationdate><title>What Can a Critical Cybersecurity Do?</title><author>Dwyer, Andrew C ; Stevens, Clare ; Muller, Lilly Pijnenburg ; Cavelty, Myriam Dunn ; Coles-Kemp, Lizzie ; Thornton, Pip</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c298t-bb214aff89f9b8d2449835b2b8d943ebaaba981c0b8b66aab09632c2724e87d13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Academic staff</topic><topic>Book publishing</topic><topic>Computation</topic><topic>Computer security</topic><topic>Cybersecurity</topic><topic>Cyberterrorism</topic><topic>Data security</topic><topic>Internet</topic><topic>Modern society</topic><topic>Positioning</topic><topic>Power</topic><topic>Safety and security measures</topic><topic>Supply</topic><topic>Threats</topic><topic>Violence</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dwyer, Andrew C</creatorcontrib><creatorcontrib>Stevens, Clare</creatorcontrib><creatorcontrib>Muller, Lilly Pijnenburg</creatorcontrib><creatorcontrib>Cavelty, Myriam Dunn</creatorcontrib><creatorcontrib>Coles-Kemp, Lizzie</creatorcontrib><creatorcontrib>Thornton, Pip</creatorcontrib><collection>Access via Oxford University Press (Open Access Collection)</collection><collection>CrossRef</collection><collection>ProQuest Social Sciences Premium Collection</collection><collection>ProQuest Central (Corporate)</collection><collection>Sociological Abstracts (pre-2017)</collection><collection>Worldwide Political Science Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Social Science Database (Alumni Edition)</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Social Science Premium Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Sociological Abstracts</collection><collection>ProQuest One Community College</collection><collection>Politics Collection</collection><collection>Sociological Abstracts</collection><collection>ProQuest Central Korea</collection><collection>International Bibliography of the Social Sciences</collection><collection>ProQuest Central Student</collection><collection>Sociology Collection</collection><collection>International Bibliography of the Social Sciences</collection><collection>ProQuest Politics Collection</collection><collection>Political Science Database</collection><collection>Social Science Database</collection><collection>Sociology Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>Sociological Abstracts (Ovid)</collection><jtitle>International political sociology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dwyer, Andrew C</au><au>Stevens, Clare</au><au>Muller, Lilly Pijnenburg</au><au>Cavelty, Myriam Dunn</au><au>Coles-Kemp, Lizzie</au><au>Thornton, Pip</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>What Can a Critical Cybersecurity Do?</atitle><jtitle>International political sociology</jtitle><date>2022-09-01</date><risdate>2022</risdate><volume>16</volume><issue>3</issue><spage>1</spage><pages>1-</pages><issn>1749-5679</issn><eissn>1749-5687</eissn><abstract>Abstract
Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next “cyber-attack” or the emergence of a new vulnerability in highly interconnected supply chains. However, such discursive positioning of threat and its resolution has typically reinforced, and perpetuated, dominant power structures and forms of violence as well as universalist protocols of protection. In this collective discussion, in contrast, six scholars from different disciplines discuss what it means to “do” “critical” research into what many of us uncomfortably refer to as “cybersecurity.” In a series of provocations and reflections, we argue that, as much as cybersecurity may be a dominant discursive mode with associated funding and institutional “benefits,” it is crucial to look outward, in conversation with other moves to consider our technological moment. That is, we question who and what cybersecurity is for, how to engage as academics, and what it could mean to undo cybersecurity in ways that can reassess and challenge power structures in the twenty-first century.</abstract><cop>Oxford</cop><pub>Oxford University Press</pub><doi>10.1093/ips/olac013</doi><orcidid>https://orcid.org/0000-0002-5685-7930</orcidid><orcidid>https://orcid.org/0000-0003-2207-6834</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1749-5679 |
ispartof | International political sociology, 2022-09, Vol.16 (3), p.1 |
issn | 1749-5679 1749-5687 |
language | eng |
recordid | cdi_proquest_journals_2699597331 |
source | Worldwide Political Science Abstracts; Sociological Abstracts; Oxford University Press Journals All Titles (1996-Current) |
subjects | Academic staff Book publishing Computation Computer security Cybersecurity Cyberterrorism Data security Internet Modern society Positioning Power Safety and security measures Supply Threats Violence |
title | What Can a Critical Cybersecurity Do? |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T10%3A41%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=What%20Can%20a%20Critical%20Cybersecurity%20Do?&rft.jtitle=International%20political%20sociology&rft.au=Dwyer,%20Andrew%20C&rft.date=2022-09-01&rft.volume=16&rft.issue=3&rft.spage=1&rft.pages=1-&rft.issn=1749-5679&rft.eissn=1749-5687&rft_id=info:doi/10.1093/ips/olac013&rft_dat=%3Cgale_proqu%3EA775958635%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2699597331&rft_id=info:pmid/&rft_galeid=A775958635&rft_oup_id=10.1093/ips/olac013&rfr_iscdi=true |