Hyper-securitization, Everyday Security Practice and Technification: Cyber-security Logics in Switzerland

被引:5
|
作者
Dunn Cavelty, Myriam [1 ]
Egloff, Florian J. [2 ]
机构
[1] Swiss Fed Inst Technol, Ctr Secur Studies, CSS, Res & Teaching, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Ctr Secur Studies, CSS, Cybersecur, Zurich, Switzerland
关键词
Cyber-security; Securitization Theory; Swiss Politics; Bureaucratic Politics; CONFLICT;
D O I
10.1111/spsr.12433
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
This contribution to the SPSR debate about technology and security in Switzerland looks at how and by whom cyber-security is constructed in Swiss security politics. Using three securitization logics as developed by reflexive Security Studies - hyper-securitization, everyday security practices, and technification - it illustrates how Swiss actors have sorted out roles and responsibilities over the years. The article suggests that all three logics are present in the political process, but that 'technification' - a way to construct the issue as reliant upon technical knowledge and the supposition that this serves a political and normatively neutral agenda - is currently the dominant one. For democratic politics, technification is a big challenge. Assigning an issue to the technical realm has a depoliticizing influence and makes contestation from those with less technical expertise very hard.
引用
收藏
页码:139 / 149
页数:11
相关论文
共 50 条
  • [21] Cyber-security fortresses built on quicksand
    Flexera Software, United States
    Netw. Secur., 8 (5-8):
  • [22] Cyber-Security Incidents and Audit Quality
    Rosati, Pierangelo
    Gogolin, Fabian
    Lynn, Theo
    EUROPEAN ACCOUNTING REVIEW, 2022, 31 (03) : 701 - 728
  • [23] Cyber-Security Threats Origins and their Analysis
    Cerget, Maros
    Hudec, Jan
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (09) : 23 - 41
  • [24] Cyber-security in substation automation systems
    Moreira, Naiara
    Molina, Elias
    Lazaro, Jesus
    Jacob, Eduardo
    Astarloa, Armando
    RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2016, 54 : 1552 - 1562
  • [25] A genetic epidemiology approach to cyber-security
    Santiago Gil
    Alexander Kott
    Albert-László Barabási
    Scientific Reports, 4
  • [26] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [27] Cultural and psychological factors in cyber-security
    Halevi, Tzipora
    Memon, Nasir
    Lewis, James
    Kumaraguru, Ponnurangam
    Arora, Sumit
    Dagar, Nikita
    Aloul, Fadi
    Chen, Jay
    Journal of Mobile Multimedia, 2017, 13 (1-2): : 43 - 56
  • [28] A genetic epidemiology approach to cyber-security
    Gil, Santiago
    Kott, Alexander
    Barabasi, Albert-Laszlo
    SCIENTIFIC REPORTS, 2014, 4
  • [29] Special Issue on Cyber-Security for Development
    Osei-Bryson, Kweku-Muata
    Vogel, Doug
    INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2014, 20 (02) : 93 - 95
  • [30] Pennsylvania starts cyber-security initiative
    不详
    COMPUTERS & SECURITY, 2001, 20 (08) : 650 - 650