2021
DOI: 10.1017/s0260210521000681
|View full text |Cite
|
Sign up to set email alerts
|

The non-anthropocentric informational agents: Codes, software, and the logic of emergence in cybersecurity

Abstract: Many theoretical approaches to cybersecurity adopt an anthropocentric conceptualisation of agency; that is, tying the capacity to act to human subjectivity and disregarding the role of the non-human in co-constructing its own (in)security. This article argues that such approaches are insufficient in capturing the complexities of cyber incidents, particularly those that involve self-perpetuating malware and autonomous cyber attacks that can produce unintentional and unpredictable consequences. Using interdiscip… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…Their specificity along with the growing complexity of multiple-use technologies, like Bitcoin, all limit more general claims as to where ‘techno-agency’ might be found, assessed and potentially countered. Locating agential qualities in activities surrounding the development of computer protocols, we contend, widens possibilities for linking specific sociotechnical relations to their wider ‘emergent security’ implications while avoiding ‘the centrality of human intentionality as a basis for constructing enmity, and by acknowledging the role of codes/software unexpected paths’ (Fouad, 2022: 768).…”
Section: Techno-agency: What Do Computer Protocols Do?mentioning
confidence: 99%
“…Their specificity along with the growing complexity of multiple-use technologies, like Bitcoin, all limit more general claims as to where ‘techno-agency’ might be found, assessed and potentially countered. Locating agential qualities in activities surrounding the development of computer protocols, we contend, widens possibilities for linking specific sociotechnical relations to their wider ‘emergent security’ implications while avoiding ‘the centrality of human intentionality as a basis for constructing enmity, and by acknowledging the role of codes/software unexpected paths’ (Fouad, 2022: 768).…”
Section: Techno-agency: What Do Computer Protocols Do?mentioning
confidence: 99%
“…Just like spies can infiltrate social institutions and secretly turn them into agents of the subverter, computer viruses or malware can infiltrate targeted systems and secretly turn them into agents of the sponsor of the cyber operation, producing outcomes in direct conflict with the ICTs intended and designed purpose. Accordingly, recent literature suggests the term “non-anthropocentric agents” (Fouad, 2021).…”
Section: The Subversive Nature Of Cyber Operationsmentioning
confidence: 99%
“…Objects of cyber securitysensors, buildings, codeare not passive technologies waiting to be filled with discourses. They are not characterised by 'essential' features separating them from humans, either (Fouad, 2021). Instead, materiality is critical for noticing how objects become 'agents' of social change through practices which are both discursive and material (Aradau, 2010).…”
Section: Operational Technologies Versus Information Technologiesmentioning
confidence: 99%
“…However, as cyber security 'spills out' beyond simply protecting computers, there is a call for broadening the scope of threat modelling. Critical social scientists argued for anticipating risks of emerging technologies by including non-experts (Slupska et al, 2021), understanding security in tandem with privacy and surveillance (Kazansky, 2021;Wuyts et al, 2020), and approaching non-human actors (code, hardware, algorithms) as active co-creators of geopolitics (Dwyer, 2021;Fouad, 2021). The strength of such a 'critical threat modelling' approach would then lie in the capacity to imagine and anticipate a wide range of outcomes and curate a space for explicitly normative discussions about living with digital technologies.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
See 1 more Smart Citation