Hyper-securitization, Everyday Security Practice and Technification: Cyber-security Logics in Switzerland

被引:5
|
作者
Dunn Cavelty, Myriam [1 ]
Egloff, Florian J. [2 ]
机构
[1] Swiss Fed Inst Technol, Ctr Secur Studies, CSS, Res & Teaching, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Ctr Secur Studies, CSS, Cybersecur, Zurich, Switzerland
关键词
Cyber-security; Securitization Theory; Swiss Politics; Bureaucratic Politics; CONFLICT;
D O I
10.1111/spsr.12433
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
This contribution to the SPSR debate about technology and security in Switzerland looks at how and by whom cyber-security is constructed in Swiss security politics. Using three securitization logics as developed by reflexive Security Studies - hyper-securitization, everyday security practices, and technification - it illustrates how Swiss actors have sorted out roles and responsibilities over the years. The article suggests that all three logics are present in the political process, but that 'technification' - a way to construct the issue as reliant upon technical knowledge and the supposition that this serves a political and normatively neutral agenda - is currently the dominant one. For democratic politics, technification is a big challenge. Assigning an issue to the technical realm has a depoliticizing influence and makes contestation from those with less technical expertise very hard.
引用
收藏
页码:139 / 149
页数:11
相关论文
共 50 条
  • [31] Self-Healing for Cyber-Security
    Gijsen, Bart
    Montalto, Ruggero
    Panneman, Jeffrey
    Falconieri, Federico
    Wiper, Paul
    Zuraniewski, Piotr
    2021 SIXTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2021, : 84 - 90
  • [32] Strategic Communication for Supporting Cyber-Security
    Kuusisto, Tuija
    Kuusisto, Rauno
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 72 - 79
  • [33] The cyber-security challenge at the connected industry
    Garcia-Bringas, Pablo
    Angulo, Ignacio
    Goti-Elordi, Aitor
    Pastor, Iker
    DYNA, 2019, 94 (03): : 258 - 261
  • [34] Physical Cyber-Security of SCADA Systems
    Bichmou, Ahmed
    Chiocca, Joseph
    Hernandez, Leonarndo
    Hoffmann, R. Wade
    Horsham, Brandon
    Huy Lam
    McKinsey, Vince
    Bibyk, Steven
    PROCEEDINGS OF THE 2019 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2019, : 243 - 248
  • [35] Cyber-Security Training Evaluation Metrics
    Koutsouris, Nikolaos
    Vassilakis, Costas
    Kolokotronis, Nicholas
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 192 - 197
  • [36] Cyber-security initiative now underway
    Jevtic, N
    CHEMICAL PROCESSING, 2003, 66 (02): : 17 - 17
  • [37] Plugging the cyber-security skills gap
    Caldwell, Tracey
    Computer Fraud and Security, 2013, 2013 (07): : 5 - 10
  • [38] Fuzz Testing for Automotive Cyber-security
    Fowler, Daniel
    Bryans, Jeremy
    Shaikh, Siraj Ahmed
    Wooderson, Paul
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 239 - 246
  • [39] The Effects of Cyber-Security on Healthcare Industry
    Alharam, Aysha K.
    El-madany, Wael
    2017 9TH IEEE-GCC CONFERENCE AND EXHIBITION (GCCCE), 2018, : 689 - 694
  • [40] European Cyber-Security Research and Innovation
    Maggi, Federico
    Zanero, Stefano
    Markatos, Evangelos
    ERCIM NEWS, 2015, (100): : 43 - 43