Show simple item record

[journal article]

dc.contributor.authorColes-Kemp, Lizziede
dc.contributor.authorAshenden, Debide
dc.contributor.authorO'Hara, Kieronde
dc.date.accessioned2021-09-27T15:23:21Z
dc.date.available2021-09-27T15:23:21Z
dc.date.issued2018de
dc.identifier.issn2183-2463de
dc.identifier.urihttps://www.ssoar.info/ssoar/handle/document/74973
dc.description.abstractAssumptions are made by government and technology providers about the power relationships that shape the use of technological security controls and the norms under which technology usage occurs. We present a case study carried out in the North East of England that examined how a community might work together using a digital information sharing platform to respond to the pressures of welfare policy change. We describe an inductive consideration of this highly local case study before reviewing it in the light of broader security theory. By taking this approach we problematise the tendency of the state to focus on the security of technology at the expense of the security of the citizen. From insights gained from the case study and the subsequent literature review, we conclude that there are three main absences not addressed by the current designs of cybersecurity architectures. These are absences of: consensus as to whose security is being addressed, evidence of equivalence between the mechanisms that control behaviour, and two-way legibility. We argue that by addressing these absences the foundations of trust and collaboration can be built which are necessary for effective cybersecurity. Our consideration of the case study within the context of sovereignty indicates that the design of the cybersecurity architecture and its concomitant service design has a significant bearing on the social contract between citizen and state. By taking this novel perspective new directions emerge for the understanding of the effectiveness of cybersecurity technologies.de
dc.languageende
dc.subject.ddcSoziologie, Anthropologiede
dc.subject.ddcSociology & anthropologyen
dc.subject.othercybersecurity; cyberspace; power; social contract; sovereigntyde
dc.titleWhy Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizende
dc.description.reviewbegutachtet (peer reviewed)de
dc.description.reviewpeer revieweden
dc.identifier.urlhttps://www.cogitatiopress.com/politicsandgovernance/article/view/1333de
dc.source.journalPolitics and Governance
dc.source.volume6de
dc.publisher.countryPRTde
dc.source.issue2de
dc.subject.classozWissenschaftssoziologie, Wissenschaftsforschung, Technikforschung, Techniksoziologiede
dc.subject.classozSociology of Science, Sociology of Technology, Research on Science and Technologyen
dc.rights.licenceCreative Commons - Namensnennung 4.0de
dc.rights.licenceCreative Commons - Attribution 4.0en
internal.statusformal und inhaltlich fertig erschlossende
dc.type.stockarticlede
dc.type.documentZeitschriftenartikelde
dc.type.documentjournal articleen
dc.source.pageinfo41-48de
internal.identifier.classoz10220
internal.identifier.journal787
internal.identifier.document32
internal.identifier.ddc301
dc.source.issuetopicGlobal Cybersecurity: New Directions in Theory and Methodsde
dc.identifier.doihttps://doi.org/10.17645/pag.v6i2.1333de
dc.description.pubstatusVeröffentlichungsversionde
dc.description.pubstatusPublished Versionen
internal.identifier.licence16
internal.identifier.pubstatus1
internal.identifier.review1
internal.dda.referencehttps://www.cogitatiopress.com/politicsandgovernance/oai/@@oai:ojs.cogitatiopress.com:article/1333
ssoar.urn.registrationfalsede


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record