Skip to main content
Top

2023 | OriginalPaper | Chapter

2. Conceptualising Social Media and Critical Security Studies in the Digital Age

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter sets out with an ambitious goal—to situate a discussion of social media and critical security studies in its broader conceptual and theoretical context. A key take-home is that the critical turn in security studies has a lot of gain from an increased focus on social media. The deeply hierarchical Copenhagen school’s notion of elite actors being those that can, and do, securitise situations (Buzan and Wæver in Review of International Studies 23:241–250, 1997) needs significantly revisiting if we are to take account of both the greater range of voices taking part in security debates on social media, and indeed how, if and when security elites use social media to deploy this kind of security speak. The Welsh school, with its focus on emancipation (Wyn Jones 1999), did not consider the possibilities for both progress and impediment made possible for “discursive emancipation” by social media platforms. The Paris school has insights as it argues for the broadening of the field and the destruction of disciplinary which specifically argues for the incorporation of criminology and sociology into the security studies lexicon. The vernacular security studies (Bubandt in Security Dialogue 36:275–296, 2005; Jarvis in International Studies Review 21:107–126, 2019; Jarvis and Lister in International Relations 27:158–179, 2012) agenda aims to take account for the ever multiplying range of security speak “from below” that their exciting theoretical work entails. The same can be said for the daunting possibilities that critical terrorism studies (Jackson in European consortium for political research) opens up for understanding the constructions of terrorism on social media. However, examining the literature on critical security studies only takes this book so far, and it is also required to examine the plethora of excellent work on a range of technology and security intersections from other disciplines, such as information systems and criminology. While the relationship of technology and security goes back to antiquity, the growth of hacking and cybercrime (Alexandrou in Cybercrime and information technology: The computer network infrastructure and computer security, cybersecurity laws, Internet of things (IoT), and mobile devices. CRC Press, 2021) are also important areas that have received, and no doubt deserve to receive, only ever more and more attention from a range of security scholars because of their enormous range of applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Adler, E. (2012). Constructivism in international relations: Sources, contributions and debates. In The handbook of international relations. Sage Adler, E. (2012). Constructivism in international relations: Sources, contributions and debates. In The handbook of international relations. Sage
go back to reference Alexandrou, A. (2021). Cybercrime and information technology: The computer network infrastructure and computer security, cybersecurity laws, Internet of things (IoT), and mobile devices. CRC Press.CrossRef Alexandrou, A. (2021). Cybercrime and information technology: The computer network infrastructure and computer security, cybersecurity laws, Internet of things (IoT), and mobile devices. CRC Press.CrossRef
go back to reference Aradau, C. (2004). Security and the democratic scene: Desecuritization and emancipation. Journal of International Relations and Development, 7(4), 26.CrossRef Aradau, C. (2004). Security and the democratic scene: Desecuritization and emancipation. Journal of International Relations and Development, 7(4), 26.CrossRef
go back to reference Berger, P. L., & Luckman, T. (1966). The social construction of reality (Later Reprint ed.). Anchor Books. Berger, P. L., & Luckman, T. (1966). The social construction of reality (Later Reprint ed.). Anchor Books.
go back to reference Bhaskar, P. R. (2008). A realist theory of science. Verso. Bhaskar, P. R. (2008). A realist theory of science. Verso.
go back to reference Bigo, D. (2008). Security studies: An introduction. In International political sociology in Williams P. Routledge. Bigo, D. (2008). Security studies: An introduction. In International political sociology in Williams P. Routledge.
go back to reference Burnett, J., & Whyte, D. (2005). Embedded expertise and the new terrorism. Journal for Crime, Conflict and the Media, 1, 1–18. Burnett, J., & Whyte, D. (2005). Embedded expertise and the new terrorism. Journal for Crime, Conflict and the Media, 1, 1–18.
go back to reference Buzan, B., & Wæver, O. (1997). Slippery? Contradictory? Sociologically untenable? The Copenhagen school replies. Review of International Studies, 23(2), 241–250.CrossRef Buzan, B., & Wæver, O. (1997). Slippery? Contradictory? Sociologically untenable? The Copenhagen school replies. Review of International Studies, 23(2), 241–250.CrossRef
go back to reference Buzan, B., Waever, O., & de Wilde, J. (1997). Security: A new framework for analysis (UK ed.). Lynne Rienner Publishers. Buzan, B., Waever, O., & de Wilde, J. (1997). Security: A new framework for analysis (UK ed.). Lynne Rienner Publishers.
go back to reference Dencik, L., & Leistert, O. (2015). Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield. Dencik, L., & Leistert, O. (2015). Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield.
go back to reference Elder-Vass, D. (2013). The reality of social construction (Reprint). Cambridge University Press. Elder-Vass, D. (2013). The reality of social construction (Reprint). Cambridge University Press.
go back to reference Floyd, R. (2006). When Foucault met security studies: A critique of the ‘Paris school’ of security studies. In Paper. University of Cork, Ireland. Floyd, R. (2006). When Foucault met security studies: A critique of the ‘Paris school’ of security studies. In Paper. University of Cork, Ireland.
go back to reference Floyd, R. (2007). Towards a consequentialist evaluation of security: Bringing together the Copenhagen and the Welsh schools of security studies. Review of International Studies, 33(2), 327–350.CrossRef Floyd, R. (2007). Towards a consequentialist evaluation of security: Bringing together the Copenhagen and the Welsh schools of security studies. Review of International Studies, 33(2), 327–350.CrossRef
go back to reference Foltz, K. E., Simpson, W. R., and Institute for Defense Analyses. (2020). Enterprise level security 2: Advanced techniques for information technology in an uncertain world. CRC Press. Foltz, K. E., Simpson, W. R., and Institute for Defense Analyses. (2020). Enterprise level security 2: Advanced techniques for information technology in an uncertain world. CRC Press.
go back to reference Gunning, J. (2007). Babies and bathwaters: Reflecting on the pitfalls of critical terrorism studies. European Political Science, 6(3), 236–243 [Online]. Gunning, J. (2007). Babies and bathwaters: Reflecting on the pitfalls of critical terrorism studies. European Political Science, 6(3), 236–243 [Online].
go back to reference Hobsbawm, E. J., Ranger, T. O. (1984). The invention of tradition. Cambridge University Press. Hobsbawm, E. J., Ranger, T. O. (1984). The invention of tradition. Cambridge University Press.
go back to reference Jackson, R. et al. (2007). Introduction: The case for a critical terrorism studies. Paper of the American political science association. Jackson, R. et al. (2007). Introduction: The case for a critical terrorism studies. Paper of the American political science association.
go back to reference Jarvis, L. (2009, February). The spaces and faces of critical terrorism studies. Security Dialogue, 40(1), 5–27 (23 pages). Jarvis, L. (2009, February). The spaces and faces of critical terrorism studies. Security Dialogue, 40(1), 5–27 (23 pages).
go back to reference Jones, R. W., & Jones, R. L. W. (1999). Security, strategy, and critical theory. Lynne Rienner Publishers. Jones, R. W., & Jones, R. L. W. (1999). Security, strategy, and critical theory. Lynne Rienner Publishers.
go back to reference Keohane, R., & Jr, J. N. (1977). Power & interdependence (4th ed.). Pearson. Keohane, R., & Jr, J. N. (1977). Power & interdependence (4th ed.). Pearson.
go back to reference Leckie, G. J., & Buschman, J. E. (2008). Information technology in librarianship: New critical approaches: New critical approaches. ABC-CLIO. Leckie, G. J., & Buschman, J. E. (2008). Information technology in librarianship: New critical approaches: New critical approaches. ABC-CLIO.
go back to reference Means, A. J. (2021). Foucault, biopolitics, and the critique of state reason. Educational Philosophy and Theory, 54(12), 1968–1969 [Online]. Means, A. J. (2021). Foucault, biopolitics, and the critique of state reason. Educational Philosophy and Theory, 54(12), 1968–1969 [Online].
go back to reference Mearsheimer, J. J. (2014, September/October). Why the Ukraine Crisis Is the West’s Fault, 12. Mearsheimer, J. J. (2014, September/October). Why the Ukraine Crisis Is the West’s Fault, 12.
go back to reference Morgenthau, H. J. (1948). Politics among nations: The struggle for power and peace. Knopf. Morgenthau, H. J. (1948). Politics among nations: The struggle for power and peace. Knopf.
go back to reference Nussbaum, E. (Ed.). (2017, January 23). How jokes won the election. The New Yorker. Nussbaum, E. (Ed.). (2017, January 23). How jokes won the election. The New Yorker.
go back to reference Persily, N., & Tucker, J. A. (2020). Introduction. In Social media and democracy, the state of the field and prospects for reform (pp. 1–9). Cambridge University Press. Persily, N., & Tucker, J. A. (2020). Introduction. In Social media and democracy, the state of the field and prospects for reform (pp. 1–9). Cambridge University Press.
go back to reference Reuter, C. (2019). Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace. Springer.CrossRef Reuter, C. (2019). Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace. Springer.CrossRef
go back to reference Reuter, C., Aldehoff, L., Riebe, T., & Kaufhold, M.-A. (2019). IT in peace, conflict and security research. In Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war and peace. Springer. Reuter, C., Aldehoff, L., Riebe, T., & Kaufhold, M.-A. (2019). IT in peace, conflict and security research. In Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war and peace. Springer.
go back to reference Sagemen, M. (2014). The stagnation in terrorism research. Terrorism and Political Violence, 26, 565–580. Sagemen, M. (2014). The stagnation in terrorism research. Terrorism and Political Violence, 26, 565–580.
go back to reference Séraphin, A., Divina, F.-M., & Ghayda, H. (2017). Youth and violent extremism on social media: Mapping the research. UNESCO Publishing. Séraphin, A., Divina, F.-M., & Ghayda, H. (2017). Youth and violent extremism on social media: Mapping the research. UNESCO Publishing.
go back to reference Waltz, K. N. (1979). Theory of international politics (Reissue ed.). Waveland Pr Inc. Waltz, K. N. (1979). Theory of international politics (Reissue ed.). Waveland Pr Inc.
go back to reference Wyn Jones, R. (1999). Security, strategy and critical theory. Lynne Rienner Publishers, Inc. Wyn Jones, R. (1999). Security, strategy and critical theory. Lynne Rienner Publishers, Inc.
Metadata
Title
Conceptualising Social Media and Critical Security Studies in the Digital Age
Author
Joseph Downing
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-20734-1_2

Premium Partner