2015
DOI: 10.1017/cbo9781316271636
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security and the Politics of Time

Abstract: Time is an under-represented topic in security studies and International Relations (IR). The development and implementation of security measures are often justified as necessary responses to the contemporary rate of global change yet little attention is granted time and temporality as factors influencing the politics and practices of security. This thesis proposes that security can be understood within the framework of a 'politics of time' (chronopolitics), in which collective perceptions of time and temporali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…This work complements other critical engagements with cybersecurity language, particularly the role of analogies and metaphors in knowledge construction (Betz & Stevens, 2013;Lawson, 2012). STS-inflected studies examine non-discursive facets of cybersecurity, generating sociotechnical analyses of the co-construction of material and immaterial actors in cybersecurity assemblages (Aradau, 2010;Balzacq & Dunn Cavelty, 2016;Stevens, 2016). We should also recognize rich deployments of classical IR theory (Kello, 2017) and theories of risk and governmentality (Barnard-Wills & Ashenden, 2012;Deibert & Rohozinski, 2010;Stevens, 2015).…”
Section: Cybersecurity Studies: the State Of The Fieldmentioning
confidence: 82%
“…This work complements other critical engagements with cybersecurity language, particularly the role of analogies and metaphors in knowledge construction (Betz & Stevens, 2013;Lawson, 2012). STS-inflected studies examine non-discursive facets of cybersecurity, generating sociotechnical analyses of the co-construction of material and immaterial actors in cybersecurity assemblages (Aradau, 2010;Balzacq & Dunn Cavelty, 2016;Stevens, 2016). We should also recognize rich deployments of classical IR theory (Kello, 2017) and theories of risk and governmentality (Barnard-Wills & Ashenden, 2012;Deibert & Rohozinski, 2010;Stevens, 2015).…”
Section: Cybersecurity Studies: the State Of The Fieldmentioning
confidence: 82%
“…Cyber security is replete with global and local, public and private agents whose relationships are deeply competitive as well as cooperative, conflictual, and at times coordinated. While the concept of a security assemblage has been applied to cyber security in previous literature (Stevens, 2012(Stevens, , 2016, the argument for why and how the concept should be used and applied to cyber security remains underdeveloped-an imbalance this article hopes to correct.…”
Section: Cyber Security Assemblagesmentioning
confidence: 97%
“…Whether it is encryption disputes, the increasing regulation of cyber security issues, or the knowledge of vulnerabilities that government actors withhold, states increasingly challenge, disrupt and often undermine the norms and practices that have previously been established amongst private actors. Government actors often 'argue through the past' (Stevens, 2016) evoking, for example, historical analogies regarding their previous ability to access the data of criminals and terrorist suspects through wiretaps in an attempt to make normative claims and justify why they should be able to access encrypted data. Here, states play on their broadly-perceived legitimacy within other security issues in the past to justify an expanded role in the context of cyber security in the future.…”
Section: Five: Generativitymentioning
confidence: 99%
“…Apart from cyber issues, the control of the Internet resources reveals political control (Biju 2017;Mueller 2010;Stevens 2016). For, Internet governance is increasingly contested, where global politics and economic power are unfolding entangled within discourses of civil liberties, national security, technology, and information policies.…”
Section: Internet Governance and Global Securitymentioning
confidence: 99%