2019
DOI: 10.1177/0967010619870364
|View full text |Cite
|
Sign up to set email alerts
|

Public relations: Theorizing the contestation of security technology

Abstract: This article contributes to the emerging literature on publics within critical security studies. Its particular focus is on contestation in the context of diffuse security technology. Contemporary security practices are characterized by diffusion and dispersion. As a result, contestation of security technology is also dispersed and diffuse and requires an account of publics that is sensitive to this aspect. The article conceptualizes ‘multiple publics’ as a mode of fundamental contestation of established polit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 57 publications
0
9
0
Order By: Relevance
“…The two phenomena, besides requiring different regulatory responses, are also potentially interpreted differently by the public. Both the issues of safety and function expansion/function creep may have implications in terms of public acceptance of technology, especially if we acknowledge that ‘new technologies foster the diffusion and decentring of security practices’ (Monsees, 2019, p. 531). The public contestation of emerging technologies is ‘thus equally diffuse and require an understanding of “publics” that can account for the diffuse situation from which they emerge’ (Monsees, 2019, p. 532).…”
Section: Conceptual Toolsmentioning
confidence: 99%
See 2 more Smart Citations
“…The two phenomena, besides requiring different regulatory responses, are also potentially interpreted differently by the public. Both the issues of safety and function expansion/function creep may have implications in terms of public acceptance of technology, especially if we acknowledge that ‘new technologies foster the diffusion and decentring of security practices’ (Monsees, 2019, p. 531). The public contestation of emerging technologies is ‘thus equally diffuse and require an understanding of “publics” that can account for the diffuse situation from which they emerge’ (Monsees, 2019, p. 532).…”
Section: Conceptual Toolsmentioning
confidence: 99%
“…Both the issues of safety and function expansion/function creep may have implications in terms of public acceptance of technology, especially if we acknowledge that ‘new technologies foster the diffusion and decentring of security practices’ (Monsees, 2019, p. 531). The public contestation of emerging technologies is ‘thus equally diffuse and require an understanding of “publics” that can account for the diffuse situation from which they emerge’ (Monsees, 2019, p. 532). Hence, the acceleration of the processes of technology integration, and the new practices coming along with technology development, challenge law and regulatory design, but also public perception and acceptance.…”
Section: Conceptual Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…The growing interest of STS in IR is also due to the fact that it speaks to adjacent trends. These trends include an emphasis on the socio-political significance of the seemingly mundane (Guillaume and Huysmans 2018;Lisle and Johnson 2019), the conditions of possibility for politics and contestation (Mandelmaum, Friis Kristensen, and Athanassiou 2016;Monsees 2019), and the need for creative methods and deeper methodological reflection (Aradau et al 2015;Naumes 2015). Recent conceptual exchange with IR also places an emphasis on those entanglements (Bellanova and Fuster 2013;Voelkner 2011) and processes (Jackson and Nexon 1999;Passoth and Rowland 2010) that create both the 'state' and the 'international', which make them look like frictionless wholes.…”
Section: The Conceptual Exchangementioning
confidence: 99%
“…The engagement between STS and Critical Security Studies offers empirically rich examples of such critical attentiveness, including, for example, border policing (Dijstelbloem and Pelizza 2020; Bourne and Lisle 2019), weapons technologies (Shah 2017;Saugmann, this volume), and data mining and biometrics (Bellanova and Gonzalez-Fuster 2013;Jacobsen 2020;Weber 2016). These studies offer novel approaches to studying security practices, for example, by analysing how human and nonhuman actors are enrolled and associated to normalise or to contest particular security technologies, and by showing how publics are (not) constituted around security questions (Monsees 2019; also this volume). However, the redeployment of STS concepts and tools to sites of security also raises considerable questions.…”
Section: The Science-and-technology Of Securitymentioning
confidence: 99%