Article ID: CBB777052436

Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State (January 2021)

unapi

Drawing on an analysis of German national cybersecurity policy, this paper argues that cybersecurity has become a key site in which states mobilize science and technology to produce state power. Contributing to science and technology studies (STS) work on technoscience and statecraft, I develop the concepts of “territorialization projects” and “digital territory” to capture how the production of state power in the digital age increasingly relies on technoscientific expertise about information infrastructure, shifting tasks of government into the domain of computer scientists and network engineers. The notion of territorialization projects describes states’ ongoing struggle to mobilize science and engineering in order to transform globally distributed information infrastructure into bounded national territory and invest it with patriotic meaning: making digital territory. Digital territory, in other words, is nationalized information infrastructure: it includes building and monopolizing infrastructure as well as normative ideas about nation—who is a digital citizen, and who isn’t; or what constitutes “good” and “bad” digital citizens. Nationalizing information infrastructure and placing statecraft into the hands of scientists and engineers might indicate an emerging form of “techno-nationalism”—a combination of nationalist and technocratic tendencies—raising urgent questions for STS scholarship to investigate the consequences of territorialization projects for justice, democracy, and civic life.

...More
Citation URI
https://data.isiscb.org/isis/citation/CBB777052436/

Similar Citations

Article Rebecca Slayton; (January 2021)
Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties (/isis/citation/CBB911361449/)

Article Cecilia Passanti; Marie-Emmanuelle Pommerolle; (2022)
The (un)making of electoral transparency through technology: The 2017 Kenyan presidential election controversy (/isis/citation/CBB699607308/)

Article Luciana Landgraf Castelo Branco; (2023)
Rethinking governance through Samarco’s dam collapse in Brazil: a critique from the STS perspective (/isis/citation/CBB165051260/)

Article Michiel Van Oudheusden; Nathan Charlier; Pierre Delvenne; (2017)
Flanders Ahead, Wallonia Behind (But Catching Up): Reconstructing Communities Through Science, Technology, and Innovation Policy Making (/isis/citation/CBB899358852/)

Article Tatiana Acevedo-Guerrero; (2019)
Light is like water: Flooding, blackouts, and the state in Barranquilla (/isis/citation/CBB476051463/)

Article Gökçe Günel; (2018)
The Backbone: Construction of a Regional Electricity Grid in the Arabian Peninsula (/isis/citation/CBB043986489/)

Article Paraskevas Vezyridis; Stephen Timmons; (August 2021)
E-Infrastructures and the divergent assetization of public health data: Expectations, uncertainties, and asymmetries (/isis/citation/CBB744787120/)

Article Ben Collier; James Stewart; (2022)
Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network (/isis/citation/CBB749753638/)

Book John Cheney-Lippold; (2017)
We are data : Algorithms and the making of our digital selves (/isis/citation/CBB593815757/)

Article Moa Carlsson; (April 2022)
Computing views, remodeling environments (/isis/citation/CBB726932342/)

Article Włodzimierz Gogołek; (2017)
Refining Big Data (/isis/citation/CBB158654943/)

Book Taina Bucher; (2018)
If ... then: algorithmic power and politics (/isis/citation/CBB014118736/)

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB758382142/)

Article Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; Andrzej Nowak; (March 2019)
Democratizing Platforms for Social Coordination (/isis/citation/CBB485378597/)

Article Siddique Latif; Adnan Qayyum; Muhammad Usama; Junaid Qadir; Andrej Zwitter; Muhammad Shahzad; (September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development (/isis/citation/CBB326485886/)

Article Yoshiyasu Takefuji; (March 2018)
Connected Vehicle Security Vulnerabilities (/isis/citation/CBB280716653/)

Book Geoff White; (2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global (/isis/citation/CBB227937681/)

Article Ons Al-Shamaileh; (June 2018)
I Have Issues with Facebook: But I Will Keep Using It (/isis/citation/CBB503279988/)

Authors & Contributors
James Stewart
James Chike Nwankwo
Włodzimierz Gogołek
Pierre Delvenne
Andrej Zwitter
Agnieszka Rychwalska
Journals
IEEE Technology and Society Magazine
Social Studies of Science
Science, Technology and Human Values
Bulletin of Science, Technology & Society
Tapuya: Latin American Science, Technology and Society
Engineering Studies
Publishers
Reaktion Books Ltd
Oxford University Press
New York University Press
Cornell University Press
Concepts
Technoscience; science and technology studies
Information technology
Computer security; cyber security
Computers and computing
Privacy
Technology and society
Time Periods
21st century
20th century
20th century, late
Places
United States
Great Britain
Barranquilla
Wallonia (Belgium)
Middle and Near East
Arabian peninsula
Institutions
Facebook (firm)
Gulf Cooperation Council
National Health Services--Great Britain
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment