This book advances a new view of information and surveillance practices, as well as their related agencies, politics, and powers. Drawing on case studies, the author crafts a new methodology of studying information life cycles which will help us navigate information regimes today.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
This book responds to a gap in the literature in International Relations (IR) by integrating technology more systematically into analyses of global politics.Technology facilitates, accelerates, automates, and exercises capabilities that are greater than human abilities. And yet, within IR, the role of technology often remains under-studied. Building on insights from science and technology studies (STS), assemblage theory and new materialism, this volume asks how international politics are made possible, knowable, and durable by and through technology. The contributors provide empirically rich and pertinent accounts of a variety of technologies relevant to the discipline, including drones, algorithms, satellite imagery, border management databases, and blockchains. Problematizing various technologically mediated issues, such as secrecy, violence, and questions of how authority and evidence become constituted in international contexts, this book will be of interest to scholars in IR, in particular those who work in the subfields of (critical) security studies, International Political Economy, and Global Governance.
"This book traces how resilience is conceptually grounded in an understanding of the world as interconnected, complex and emergent. In an interconnected world, we are exposed to radical uncertainties, which require new modes of handling them. Security no longer means the promise of protection, but it is redefined as resilience - as security in-formation. Information and the Internet not only play a key role for our understanding of security in highly connected societies, but also for resilience as a new program of tackling emergencies. Social media, cyber-exercises, the collection of digital data and new developments in Internet policy shape resilience as a new form of security governance. Through case studies in these four areas this book documents and critically discusses the relationship between resilience, the Internet and security governance. It takes the reader on a journey from the rise of complexity narratives in the context of security policy to a discussion of the Internet's influence on resilience practices, and ends with a theory of resilience and the relational. The book shows how the Internet nourishes narratives of connectivity, complexity and emergency in political discourses, and how it brings about new resilience practices. This book will be of much interest to students of resilience studies, Critical Security Studies, Internet-politics, and International Relations in general."--Provided by publisher.
"This book traces how resilience is conceptually grounded in an understanding of the world as interconnected, complex and emergent. In an interconnected world, we are exposed to radical uncertainties, which require new modes of handling them. Security no longer means the promise of protection, but it is redefined as resilience - as security in-formation. Information and the Internet not only play a key role for our understanding of security in highly connected societies, but also for resilience as a new program of tackling emergencies. Social media, cyber-exercises, the collection of digital data and new developments in Internet policy shape resilience as a new form of security governance. Through case studies in these four areas this book documents and critically discusses the relationship between resilience, the Internet and security governance. It takes the reader on a journey from the rise of complexity narratives in the context of security policy to a discussion of the Internet́'s influence on resilience practices, and ends with a theory of resilience and the relational. The book shows how the Internet nourishes narratives of connectivity, complexity and emergency in political discourses, and how it brings about new resilience practices. This book will be of much interest to students of resilience studies, Critical Security Studies, Internet-politics, and International Relations in general."--Provided by publisher
This work introduces examples of ethnic profiling in European counter-terrorism and anlyzes possible after-effects on a theoretical basis. Primary effects, which are generally considered positive, are contrasted with secondary effects and methodological breaches, for instance the over and under-inclusion of a profile substitution and negaitve effects on the social life of the targed group. The implications are documented with examples taken from the European counter-terrorism context and discussed in relation to European legal standards. The discussion closes with proportionality test. (Quelle: Text Verlagseinband / Verlag)
This article establishes the relevance of surveillance and secrecy as methodological tools, and it substantiates the argument that surveillance and secrecy are not oppositional in character, but overlap. It does so by drawing attention to obvious, but scholarly neglected performers of secrecy and surveillance: children. It discusses what it means to "work with" surveillance and secrecy as it develops their relevance in case studies involving children. As a contribution to cultural studies, the article shows how surveillance and secrecy "get to work" by tracing their constitutive character and by providing new angles for understanding points of contact between the two.
This paper describes how hacking can be the act of redefining what is seen and not seen in the context of online surveillance. Based on a qualitative interview study with 22 hackers, it discusses the many practices and purposes of 'hacking online surveillance', with a specific focus on the techniques of disappearing from view while continuing to be online. Not only do these techniques vary in style and the expertise involved, but they all fulfill multiple functions. They are more than just a coded statement against the uneven powers of surveillance, they are tactics of the everyday life, moments of analytical creativity and reflection, instances of pleasure and play, affective encounters, identity work and forms of communication. The paper dedicates space to these sometimes overlapping and sometimes differing conceptualizations of 'hacking online surveillance' by using methodologies that consciously seek out the nonlinear and the multiple.
The idea of the complex emergency has given rise to the notion of resilience as a form of acting out security. While security policies largely embrace the concept of resilience, critical scholarship points to the 'responsibilization' of the threatened subject, who is 'programmed' to act out security in a fashion that internalizes neoliberal values. This behaviour is trained through disciplinary practices, such as exercises, that seek to conduct the conduct of disaster populations. However, is the resilient subject only ever an instance of programmes and disciplinary power? This article takes a look at how self-organization comes about and how this process can be conceptualized through affect. It uses the setting of a cyber-security exercise to describe the dynamic interplay between affect and re/action. Building on Spinoza's understanding of affect as the onset for action, the article discusses what affect theory contributes to resilience theory. It concludes that, as a form of acting out security, resilience incorporates both 'programmed' and 'self-determined' actions. Both forms of acting, however, imply that the resilient subject has no choice but to act out security. Given this fundamental restraint, powerlessness as the incapacity to act appears as one of the few instances that escape the governmental logic of resilience.
Departing from the understanding that resilience is a technique of self-organization during emergencies, this article provides a study on the way in which the use of social media influenced and engendered societal resilience practices during the 2011 Norway attacks. It builds on the concepts of governmentality and mediality to discuss how the interplay between social media and its users created new forms of self-initiated and mediated emergency governance. Empirically, it draws on material from 20 in-depth interviews with Norwegians who explained and reflected upon their social media use during the attacks. The article presents an overview of the different functions that social media assumed in the process of dealing with the attacks and discusses these vis-à-vis their related challenges. It draws conclusions about the way in which resilience practices and the resilient subject are influenced by the networked character of 2.0 technologies.
Departing from the understanding that resilience is a technique of self-organization during emergencies, this article provides a study on the way in which the use of social media influenced and engendered societal resilience practices during the 2011 Norway attacks. It builds on the concepts of governmentality and mediality to discuss how the interplay between social media and its users created new forms of self-initiated and mediated emergency governance. Empirically, it draws on material from 20 in-depth interviews with Norwegians who explained and reflected upon their social media use during the attacks. The article presents an overview of the different functions that social media assumed in the process of dealing with the attacks and discusses these vis-à-vis their related challenges. It draws conclusions about the way in which resilience practices and the resilient subject are influenced by the networked character of 2.0 technologies.