Drawing on an analysis of German national cybersecurity policy, this paper argues that cybersecurity has become a key site in which states mobilize science and technology to produce state power. Contributing to science and technology studies (STS) work on technoscience and statecraft, I develop the concepts of “territorialization projects” and “digital territory” to capture how the production of state power in the digital age increasingly relies on technoscientific expertise about information infrastructure, shifting tasks of government into the domain of computer scientists and network engineers. The notion of territorialization projects describes states’ ongoing struggle to mobilize science and engineering in order to transform globally distributed information infrastructure into bounded national territory and invest it with patriotic meaning: making digital territory. Digital territory, in other words, is nationalized information infrastructure: it includes building and monopolizing infrastructure as well as normative ideas about nation—who is a digital citizen, and who isn’t; or what constitutes “good” and “bad” digital citizens. Nationalizing information infrastructure and placing statecraft into the hands of scientists and engineers might indicate an emerging form of “techno-nationalism”—a combination of nationalist and technocratic tendencies—raising urgent questions for STS scholarship to investigate the consequences of territorialization projects for justice, democracy, and civic life.
...More
Article
Annalisa Pelizza;
(March 2016)
Developing the Vectorial Glance Infrastructural Inversion for the New Agenda on Government Information Systems
(/isis/citation/CBB157462407/)
Article
Rebecca Slayton;
(January 2021)
Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties
(/isis/citation/CBB911361449/)
Article
Cecilia Passanti;
Marie-Emmanuelle Pommerolle;
(2022)
The (un)making of electoral transparency through technology: The 2017 Kenyan presidential election controversy
(/isis/citation/CBB699607308/)
Article
Luciana Landgraf Castelo Branco;
(2023)
Rethinking governance through Samarco’s dam collapse in Brazil: a critique from the STS perspective
(/isis/citation/CBB165051260/)
Article
Michiel Van Oudheusden;
Nathan Charlier;
Pierre Delvenne;
(2017)
Flanders Ahead, Wallonia Behind (But Catching Up): Reconstructing Communities Through Science, Technology, and Innovation Policy Making
(/isis/citation/CBB899358852/)
Article
Tatiana Acevedo-Guerrero;
(2019)
Light is like water: Flooding, blackouts, and the state in Barranquilla
(/isis/citation/CBB476051463/)
Article
Gökçe Günel;
(2018)
The Backbone: Construction of a Regional Electricity Grid in the Arabian Peninsula
(/isis/citation/CBB043986489/)
Article
Paraskevas Vezyridis;
Stephen Timmons;
(August 2021)
E-Infrastructures and the divergent assetization of public health data: Expectations, uncertainties, and asymmetries
(/isis/citation/CBB744787120/)
Article
Ben Collier;
James Stewart;
(2022)
Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network
(/isis/citation/CBB749753638/)
Book
John Cheney-Lippold;
(2017)
We are data : Algorithms and the making of our digital selves
(/isis/citation/CBB593815757/)
Article
Moa Carlsson;
(April 2022)
Computing views, remodeling environments
(/isis/citation/CBB726932342/)
Article
Włodzimierz Gogołek;
(2017)
Refining Big Data
(/isis/citation/CBB158654943/)
Book
Taina Bucher;
(2018)
If ... then: algorithmic power and politics
(/isis/citation/CBB014118736/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB758382142/)
Article
Jeremy Pitt;
Agnieszka Rychwalska;
Magdalena Roszczynska-Kurasinska;
Andrzej Nowak;
(March 2019)
Democratizing Platforms for Social Coordination
(/isis/citation/CBB485378597/)
Article
Siddique Latif;
Adnan Qayyum;
Muhammad Usama;
Junaid Qadir;
Andrej Zwitter;
Muhammad Shahzad;
(September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development
(/isis/citation/CBB326485886/)
Article
Yoshiyasu Takefuji;
(March 2018)
Connected Vehicle Security Vulnerabilities
(/isis/citation/CBB280716653/)
Book
Geoff White;
(2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
(/isis/citation/CBB227937681/)
Article
James Chike Nwankwo;
(February-June 2022)
Analysis of Impact of Industry 4.0 on Africa, Eastern Europe and US: A Case Study of Cyber-Security and Sociopolitical Dynamics of Nigeria, Russia and USA
(/isis/citation/CBB289866626/)
Article
Ons Al-Shamaileh;
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It
(/isis/citation/CBB503279988/)
Be the first to comment!