Show simple item record

[journal article]

dc.contributor.authorShires, Jamesde
dc.date.accessioned2021-04-07T09:25:57Z
dc.date.available2021-04-07T09:25:57Z
dc.date.issued2018de
dc.identifier.issn2183-2463de
dc.identifier.urihttps://www.ssoar.info/ssoar/handle/document/72244
dc.description.abstractThis article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity "skills gap": the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges. It proposes that cybersecurity expertise is best understood as a skilled performance which satisfies decision-makers' demands for risk management. This alternative understanding of cybersecurity expertise enables investigation of the types of performance involved in key events which congregate experts together: cybersecurity conferences. The article makes two key claims, which are empirically based on participant observation of cybersecurity conferences in the Middle East. First, that cybersecurity conferences are ritualized activities which create an expert community across international boundaries despite significant political and social differences. Second, that the ritualized physical separation between disinterested knowledge-sharing and commercial advertisement at these conferences enacts an ideal of "pure" cybersecurity expertise rarely encountered elsewhere, without which the claims to knowledge made by cybersecurity experts would be greatly undermined. The approach taken in this article is thus a new direction for cybersecurity research, with significant implications for other areas of international politics.de
dc.languageende
dc.subject.ddcInternationale Beziehungende
dc.subject.ddcInternational relationsen
dc.subject.otherMiddle East; conference; cybersecurity; expertise; performance; skills gapde
dc.titleEnacting Expertise: Ritual and Risk in Cybersecurityde
dc.description.reviewbegutachtet (peer reviewed)de
dc.description.reviewpeer revieweden
dc.identifier.urlhttps://www.cogitatiopress.com/politicsandgovernance/article/view/1329de
dc.source.journalPolitics and Governance
dc.source.volume6de
dc.publisher.countryPRT
dc.source.issue2de
dc.subject.classozinternationale Beziehungen, Entwicklungspolitikde
dc.subject.classozInternational Relations, International Politics, Foreign Affairs, Development Policyen
dc.rights.licenceCreative Commons - Namensnennung 4.0de
dc.rights.licenceCreative Commons - Attribution 4.0en
internal.statusformal und inhaltlich fertig erschlossende
dc.type.stockarticlede
dc.type.documentZeitschriftenartikelde
dc.type.documentjournal articleen
dc.source.pageinfo31-40de
internal.identifier.classoz10505
internal.identifier.journal787
internal.identifier.document32
internal.identifier.ddc327
dc.source.issuetopicGlobal Cybersecurity: New Directions in Theory and Methodsde
dc.identifier.doihttps://doi.org/10.17645/pag.v6i2.1329de
dc.description.pubstatusVeröffentlichungsversionde
dc.description.pubstatusPublished Versionen
internal.identifier.licence16
internal.identifier.pubstatus1
internal.identifier.review1
internal.dda.referencehttps://www.cogitatiopress.com/politicsandgovernance/oai/@@oai:ojs.cogitatiopress.com:article/1329
ssoar.urn.registrationfalsede


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record