2018
DOI: 10.17645/pag.v6i2.1324
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Assemblages: A Framework for Understanding the Dynamic and Contested Nature of Security Provision

Abstract: In the context of globalisation and privatisation, an emerging body of literature has applied the concept of an 'assemblage' to international relations and security studies. This article will argue that an assemblage framework provides the best means for understanding the complex configuration of cyber security actors, given that contemporary cyber security practices do not conform to the traditional public-private and global-local distinctions used in security studies and International Relations literature. W… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(20 citation statements)
references
References 12 publications
0
19
0
1
Order By: Relevance
“…To the extent that this complexity and breadth of actors in cybersecurity arrangements has been addressed in the literature, it has as mirrored this concern in official policy discourses, describing the role of commercial firms role within the idiom of "public-private partnerships" (Bossong & Wagner, 2016;Carr, 2016;Christensen & Petersen, 2017;Dunn-Cavelty & Suter, 2009). Yet there are distinctive features to the dynamics in cybersecurity which suggest that there are limitations to trying to understand the role of the commercial actors in cybersecurity through the framework of a PPP (Collier, 2018;McCarthy, 2018).…”
Section: How Cybersecurity Gets Madementioning
confidence: 99%
See 2 more Smart Citations
“…To the extent that this complexity and breadth of actors in cybersecurity arrangements has been addressed in the literature, it has as mirrored this concern in official policy discourses, describing the role of commercial firms role within the idiom of "public-private partnerships" (Bossong & Wagner, 2016;Carr, 2016;Christensen & Petersen, 2017;Dunn-Cavelty & Suter, 2009). Yet there are distinctive features to the dynamics in cybersecurity which suggest that there are limitations to trying to understand the role of the commercial actors in cybersecurity through the framework of a PPP (Collier, 2018;McCarthy, 2018).…”
Section: How Cybersecurity Gets Madementioning
confidence: 99%
“…In the context of broader trends in security governance, the PPP model thus has limitations to such a way of conceptualizing the relationships between state-based and commercial security rationales. In fact, the complex social, political, technical, and economic processes that are informing cybersecurity practices have led some scholars to argue that these processes exceed traditional framings of "public" and "private" (Collier, 2018). A further critical point emerges.…”
Section: How Cybersecurity Gets Madementioning
confidence: 99%
See 1 more Smart Citation
“…Within security governance research -while Abrahamsen and Williams established the global security concept as a tool to distance from agent-network theories -it is interesting to watch how Schouten (2014) departs from it to look at global security assemblages' broader impacts on security governance and suggests that the agentnetwork theory widens the scope of what security assemblages are. Within security studies, Collier (2018) departed from the philosophy behind the concept and adjusted it to address cybersecurity reality. Mary Kaldor (2018) took a more sociological turn and used it as a departure for establishing the global security culture concept.…”
Section: Where and How It Has Been Employed So Far?mentioning
confidence: 99%
“…In this case, a hacking groupattributed by the US and UK governments to North Korea-targeted a vulnerability in the Microsoft Windows operating system. The vulnerability had been discovered by the US National Security Agency (NSA) but not disclosed to the public (Collier 2018). A hacking group named the Shadow Brokers stole the vulnerability from the NSA and released it online, making the WannaCry attack possible.…”
Section: Introductionmentioning
confidence: 99%