Suchergebnisse
Filter
10 Ergebnisse
Sortierung:
Surveillance and identity: discourse, subjectivity and the state
Surveillance and Identity analyses the discourse of surveillance in the contemporary United Kingdom, drawing upon public language from central government, governmental agencies, activist movements, finance and banking and the news media. Examining the logics of these discourses and revealing the manner in which they construct problems of governance in the light of the insecurity of identity, this book shows how identity is fundamentally linked to surveillance, as governmental discourses privilege surveillance as a response to social problems.
UK News Media Discourses of Surveillance
In: The sociological quarterly: TSQ, Band 52, Heft 4, S. 548-567
ISSN: 1533-8525
"This is not a cyber war, it's a...?": Wikileaks, Anonymous and the Politics of Hegemony
In: International journal of cyber warfare and terrorism: IJCWT ; an official publication of the Information Resources Management Association, Band 1, Heft 1, S. 13-23
ISSN: 1947-3443
This paper is a political theory analysis using the conflict, attacks, and 'hactivism' surrounding the WikiLeaks organisations following diplomatic cable releases as a case study to demonstrate the complexity of contemporary cyber conflict. This complexity is reflected in the motivations, identities, and values of a multiplicity of (often non-state) actors. Termed 'the first visible cyber war' this conflict (having already drawn in states, media organisations, banks and payments companies, and loose coalitions of individuals) is one where traditional metaphors of war occlude as much as they reveal. International relations and critical security studies have developed a range of approaches to international conflict that focus on identities, values, and normative frameworks. Securitization, hegemony, and democratic demands offer a productive way of understanding cyber conflict. Distributed denial of service attacks are interpreted as an attempt to establish a dominant discursive position and to construct a coalition around political issues
Playing with Privacy: Games for Education and Communication in the Politics of Online Privacy
In: Political studies: the journal of the Political Studies Association of the United Kingdom, Band 63, Heft 1, S. 142-160
ISSN: 1467-9248
Using the politics of personal information and online privacy as a case study, this article sets out the justification for the use of games in the education and communication of online privacy issues. It draws upon existing research into privacy knowledge and behaviour, game design for education and the experience of the Visualisation and Other Methods of Expression (VOME) project in designing a privacy education game. Adapted from the source document.
Playing with Privacy: Games for Education and Communication in the Politics of Online Privacy
In: Political studies: the journal of the Political Studies Association of the United Kingdom, Band 63, Heft 1, S. 142-160
ISSN: 1467-9248
Using the politics of personal information and online privacy as a case study, this article sets out the justification for the use of games in the education and communication of online privacy issues. It draws upon existing research into privacy knowledge and behaviour, game design for education and the experience of the Visualisation and Other Methods of Expression (VOME) project in designing a privacy education game.
Securing Virtual Space: Cyber War, Cyber Terror, and Risk
In: Space and Culture, Band 15, Heft 2, S. 110-123
ISSN: 1552-8308
This article uses a governmentality and discourse analysis approach to analyze cyber security policy literature. It examines the problems of construction of virtual space and current efforts to secure this space political and technologically. It extracts a model of cyber security discourse that constructs cyberspace as ungovernable, unknowable, a cause of vulnerability, inevitably threatening, and a home to threatening actors.
The terrorism of the other: towards a contrapuntal reading of terrorism in India
In: Critical studies on terrorism, Band 3, Heft 3, S. 383-402
ISSN: 1753-9161
Introduction: Spaces of Terror and Risk
In: Space and Culture, Band 15, Heft 2, S. 92-97
ISSN: 1552-8308
Data protection authority perspectives on the impact of data protection reform on cooperation in the EU
This article presents the findings of interviews with representatives from the majority of EU data protection authorities in the context of the ongoing data protection reform process. It identifies commonalities between the authorities to the extent it is possible to speak about a EU DPA perspective, but also identifies areas of tension and disagreement as well as future intentions. The focus of the article is upon the impact of the data protection reform process on the way that these independent bodies, located in EU Member States will increasingly have to cooperate at an EU-level. Capturing these perspectives at this moment in the reform process provides insight into the process from a group of concerned stakeholders, but also insight into how these stakeholders are (re-)positioning themselves, planning, and anticipating the impacts of the reform. ; This article is based upon research conducted as part of the PHAEDRA II project ("Improving practical and helpful cooperation between data protection authorities" and the article is possible due to the assistance and contribution of all project partners. The project is co-funded by the European Union and the Fundamental Rights and Citizenship Programme (JUST/2013/FRAC/AG6068), however the contents of this article are the sole responsibility of the authors and cannot be taken to represent the views of the European Commission. More information on the project can be found at http://www.phaedra-project.eu/
BASE