Hyper-securitization, Everyday Security Practice and Technification: Cyber-security Logics in Switzerland

被引:5
|
作者
Dunn Cavelty, Myriam [1 ]
Egloff, Florian J. [2 ]
机构
[1] Swiss Fed Inst Technol, Ctr Secur Studies, CSS, Res & Teaching, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Ctr Secur Studies, CSS, Cybersecur, Zurich, Switzerland
关键词
Cyber-security; Securitization Theory; Swiss Politics; Bureaucratic Politics; CONFLICT;
D O I
10.1111/spsr.12433
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
This contribution to the SPSR debate about technology and security in Switzerland looks at how and by whom cyber-security is constructed in Swiss security politics. Using three securitization logics as developed by reflexive Security Studies - hyper-securitization, everyday security practices, and technification - it illustrates how Swiss actors have sorted out roles and responsibilities over the years. The article suggests that all three logics are present in the political process, but that 'technification' - a way to construct the issue as reliant upon technical knowledge and the supposition that this serves a political and normatively neutral agenda - is currently the dominant one. For democratic politics, technification is a big challenge. Assigning an issue to the technical realm has a depoliticizing influence and makes contestation from those with less technical expertise very hard.
引用
收藏
页码:139 / 149
页数:11
相关论文
共 50 条
  • [41] Cyber-Security Considerations for the Smart Grid
    Clements, Sam
    Kirkham, Harold
    IEEE POWER AND ENERGY SOCIETY GENERAL MEETING 2010, 2010,
  • [42] Repercussions of Coronavirus on Cyber-Security Threats
    Pandharipande, Aryan
    Parashar, Ritik
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 45 - 48
  • [43] Scorecard Approach for Cyber-Security Awareness
    Shabe, Tsosane
    Kritzinger, Elmarie
    Loock, Marianne
    EMERGING TECHNOLOGIES FOR EDUCATION, 2018, 10676 : 144 - 153
  • [44] Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities
    Myriam Dunn Cavelty
    Science and Engineering Ethics, 2014, 20 : 701 - 715
  • [45] A theory of actor-network for cyber-security
    Balzacq, Thierry
    Cavelty, Myriam Dunn
    EUROPEAN JOURNAL OF INTERNATIONAL SECURITY, 2016, 1 (02) : 176 - 198
  • [46] Impact of Cyber-Security Issues on Smart Grid
    Yang, Y.
    Littler, Tim
    Sezer, S.
    McLaughlin, K.
    Wang, H. F.
    2011 2ND IEEE PES INTERNATIONAL CONFERENCE AND EXHIBITION ON INNOVATIVE SMART GRID TECHNOLOGIES (ISGT EUROPE), 2011,
  • [47] Cyber-security in smart cities: the case of Dubai
    Efthymiopoulos M.-P.
    Journal of Innovation and Entrepreneurship, 5 (1)
  • [48] Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities
    Cavelty, Myriam Dunn
    SCIENCE AND ENGINEERING ETHICS, 2014, 20 (03) : 701 - 715
  • [49] Security operation modes for enhancement of utility computer network cyber-security
    Wang, Lin
    Mander, Todd
    Cheung, Helen
    Nabhani, Farhad
    Cheung, Richard
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 4316 - +
  • [50] Cyber-Security and a Potential Role for the Maritime Cloud
    Wimpenny, G.
    Safar, J.
    Grant, A.
    Bransby, M.
    Ward, N.
    PROCEEDINGS OF THE 30TH INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2017), 2017, : 1800 - 1808