Skip to main content
Top

2023 | OriginalPaper | Chapter

8. Conclusions on Social Media and Critical Security Studies in a Digital Age

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Concluding on social media and security seems premature as the field is likely only going to grow and mutate in the coming years. However, some initial reflections are possible. In particular, the need to challenge disciplinary boundaries, to expect the unexpected, and take account of the undulating topography of social media have helped to highlight how diverse security is on social media. Added to this, the chapters in this book have shed light on a, although limited, aspect of “discursive emancipation” where social media clearly does give voice on security questions to users that previously would have been excluded from security discussions. The range of actors that have been shown to have been influential in security debates in this book is important, from a football YouTuber to a pop music fan and individuals thousands of miles away from the UK who shape British security debates on Twitter. Additionally, this book has demonstrated the paradoxical and unexpected narratives, discourses and symbols that emerge to subvert, challenge and construct security debates on social media. These have included the use of football songs to contest ISIS security threats, many local themes of urban identity intertwined with local and international security concerns and a range of anti-Semitic conspiracy theories. As such, the important work to come from future scholars would do well to maintain an open mind and entertain a wide range of viewpoints and articulations of security in the digital age.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Alavi, S., et al. (2010). Building participation, reciprocity and trust: Netnography of an online community of APPLE using regression analysis for prediction. Apeejay Business Review, 11, 82–96. Alavi, S., et al. (2010). Building participation, reciprocity and trust: Netnography of an online community of APPLE using regression analysis for prediction. Apeejay Business Review, 11, 82–96.
go back to reference Alexandrou, A. (2021). Cybercrime and information technology: The computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices. CRC Press (Google-Books-ID: mZhFEAAAQBAJ). Alexandrou, A. (2021). Cybercrime and information technology: The computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices. CRC Press (Google-Books-ID: mZhFEAAAQBAJ).
go back to reference Ali, A. H. (2011). The power of social media in developing nations: New tools for closing the global digital divide and beyond note. Harvard Human Rights Journal, 24(1), 185–220. Ali, A. H. (2011). The power of social media in developing nations: New tools for closing the global digital divide and beyond note. Harvard Human Rights Journal, 24(1), 185–220.
go back to reference Aradau, C., et al. (2019). Acts of digital parasitism: Hacking, humanitarian apps and platformisation. New Media & Society, 21(11–12), 2548–2565.CrossRef Aradau, C., et al. (2019). Acts of digital parasitism: Hacking, humanitarian apps and platformisation. New Media & Society, 21(11–12), 2548–2565.CrossRef
go back to reference Aradau, C., Coward, M., et al. (2015). Discourse/materiality. In Critical security methods: New framework for analysis (pp. 57–84). The New International Relations Series. Routledge. Aradau, C., Coward, M., et al. (2015). Discourse/materiality. In Critical security methods: New framework for analysis (pp. 57–84). The New International Relations Series. Routledge.
go back to reference Aradau, C., Huysmans, J., et al. (2015). Critical security methods: New frameworks for analysis. The New International Relations Series. Routledge. Aradau, C., Huysmans, J., et al. (2015). Critical security methods: New frameworks for analysis. The New International Relations Series. Routledge.
go back to reference Aradau, C. (2004). Security and the democratic scene: Desecuritization and emancipation. Journal of International Relations and Development, 7(4), 26.CrossRef Aradau, C. (2004). Security and the democratic scene: Desecuritization and emancipation. Journal of International Relations and Development, 7(4), 26.CrossRef
go back to reference Armstrong, G., & Harris, R. (1991). Football hooligans: Theory and evidence. The Sociological Review, 39(3), 427–458.CrossRef Armstrong, G., & Harris, R. (1991). Football hooligans: Theory and evidence. The Sociological Review, 39(3), 427–458.CrossRef
go back to reference Bayer, J. B., et al. (2016). Sharing the small moments: Ephemeral social interaction on Snapchat. Information, Communication & Society, 19(7), 956–977.CrossRef Bayer, J. B., et al. (2016). Sharing the small moments: Ephemeral social interaction on Snapchat. Information, Communication & Society, 19(7), 956–977.CrossRef
go back to reference Bertsou, E. (2019). Rethinking political distrust. European Political Science Review, 11(2), 213–230.CrossRef Bertsou, E. (2019). Rethinking political distrust. European Political Science Review, 11(2), 213–230.CrossRef
go back to reference Breen Smyth, M., et al. (2008). Critical terrorism studies—An introduction. Critical Studies on Terrorism, 1(1), 1–4.CrossRef Breen Smyth, M., et al. (2008). Critical terrorism studies—An introduction. Critical Studies on Terrorism, 1(1), 1–4.CrossRef
go back to reference Bubandt, N. (2005). Vernacular security: The politics of feeling safe in global, national and local worlds. Security Dialogue, 36(3), 275–296.CrossRef Bubandt, N. (2005). Vernacular security: The politics of feeling safe in global, national and local worlds. Security Dialogue, 36(3), 275–296.CrossRef
go back to reference Buzan, B., et al. (1997). Security: A new framework for analysis (UK ed.). Lynne Rienner.CrossRef Buzan, B., et al. (1997). Security: A new framework for analysis (UK ed.). Lynne Rienner.CrossRef
go back to reference Cleland, J., & Cashmore, E. (2018). Nothing will be the same again after the Stade de France attack: Reflections of association football fans on terrorism, security and surveillance. Journal of Sport and Social Issues, 42(6), 454–469.CrossRef Cleland, J., & Cashmore, E. (2018). Nothing will be the same again after the Stade de France attack: Reflections of association football fans on terrorism, security and surveillance. Journal of Sport and Social Issues, 42(6), 454–469.CrossRef
go back to reference Croft, S., & Vaughan-Williams, N. (2017). Fit for purpose? Fitting ontological security studies ‘into’ the discipline of International Relations: Towards a vernacular turn. Cooperation and Conflict, 52(1), 12–30.CrossRef Croft, S., & Vaughan-Williams, N. (2017). Fit for purpose? Fitting ontological security studies ‘into’ the discipline of International Relations: Towards a vernacular turn. Cooperation and Conflict, 52(1), 12–30.CrossRef
go back to reference Cullen, R. (2001). Addressing the digital divide. Online Information Review, 25(5), 311–320.CrossRef Cullen, R. (2001). Addressing the digital divide. Online Information Review, 25(5), 311–320.CrossRef
go back to reference Davey, J., & Weinberg, D. (2021). Inspiration and influence: Discussions of the US military in extreme right-wing telegram channels (p. 20). Institute for Strategic Dialogue. Davey, J., & Weinberg, D. (2021). Inspiration and influence: Discussions of the US military in extreme right-wing telegram channels (p. 20). Institute for Strategic Dialogue.
go back to reference Dencik, L., & Leistert, O. (2015). Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield (Google-Books-ID: iOHaDwAAQBAJ). Dencik, L., & Leistert, O. (2015). Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield (Google-Books-ID: iOHaDwAAQBAJ).
go back to reference Erickson, C. W. (2008). Thematics of counterterrorism: Comparing 24 and MI-5/Spooks. Critical Studies on Terrorism, 1(3), 343–358.CrossRef Erickson, C. W. (2008). Thematics of counterterrorism: Comparing 24 and MI-5/Spooks. Critical Studies on Terrorism, 1(3), 343–358.CrossRef
go back to reference Foltz, K. E., & Simpson, W. R. (2020). Enterprise level security 2: Advanced techniques for information technology in an uncertain world. CRC Press (Google-Books-ID: B4X3DwAAQBAJ). Foltz, K. E., & Simpson, W. R. (2020). Enterprise level security 2: Advanced techniques for information technology in an uncertain world. CRC Press (Google-Books-ID: B4X3DwAAQBAJ).
go back to reference Garland, J., & Treadwell, J. (2010). “No surrender to the Taliban”: Football hooliganism, Islamophobia and the rise of the English defence league. Papers from the British Criminology Conference, pp. 19–35. Garland, J., & Treadwell, J. (2010). “No surrender to the Taliban”: Football hooliganism, Islamophobia and the rise of the English defence league. Papers from the British Criminology Conference, pp. 19–35.
go back to reference Gillespie, M., & O’Loughlin, B. (2009). News media, threats and insecurities: An ethnographic approach. Cambridge Review of International Affairs, 22(4), 667–685.CrossRef Gillespie, M., & O’Loughlin, B. (2009). News media, threats and insecurities: An ethnographic approach. Cambridge Review of International Affairs, 22(4), 667–685.CrossRef
go back to reference Gunning, J. (2007). Babies and bathwaters: Reflecting on the pitfalls of critical terrorism studies. European Political Science, 6(3), 236–243.CrossRef Gunning, J. (2007). Babies and bathwaters: Reflecting on the pitfalls of critical terrorism studies. European Political Science, 6(3), 236–243.CrossRef
go back to reference Herring, E. (2008). Critical terrorism studies: An activist scholar perspective. Critical Studies on Terrorism, 1(2), 197–211.CrossRef Herring, E. (2008). Critical terrorism studies: An activist scholar perspective. Critical Studies on Terrorism, 1(2), 197–211.CrossRef
go back to reference Hultin, N. (2010). Repositioning the front lines? Reflections on the ethnography of African securityscapes. African Security, 3(2), 104–125.CrossRef Hultin, N. (2010). Repositioning the front lines? Reflections on the ethnography of African securityscapes. African Security, 3(2), 104–125.CrossRef
go back to reference Huysmans, J. (2011). What’s in an act? On security speech acts and little security nothings. Security Dialogue, 42(4–5), 371–383.CrossRef Huysmans, J. (2011). What’s in an act? On security speech acts and little security nothings. Security Dialogue, 42(4–5), 371–383.CrossRef
go back to reference Hynek, N., & Chandler, D. (2013). No emancipatory alternative, no critical security studies. Critical Studies on Security, 1(1), 46–63.CrossRef Hynek, N., & Chandler, D. (2013). No emancipatory alternative, no critical security studies. Critical Studies on Security, 1(1), 46–63.CrossRef
go back to reference Jackson, R., et al. (2007). Introduction: The case for a critical terrorism studies. Paper of the American Political Science Association. Jackson, R., et al. (2007). Introduction: The case for a critical terrorism studies. Paper of the American Political Science Association.
go back to reference Jarvis, L. (2019). Toward a vernacular security studies: Origins, interlocutors, contributions, and challenges. International Studies Review, 21(1), 107–126.CrossRef Jarvis, L. (2019). Toward a vernacular security studies: Origins, interlocutors, contributions, and challenges. International Studies Review, 21(1), 107–126.CrossRef
go back to reference Jarvis, L., & Lister, M. (2012). Vernacular securities and their study: A qualitative analysis and research agenda. International Relations, 27(2), 158–179.CrossRef Jarvis, L., & Lister, M. (2012). Vernacular securities and their study: A qualitative analysis and research agenda. International Relations, 27(2), 158–179.CrossRef
go back to reference Kozinets, R. V. (2002). The field behind the screen: Using netnography for marketing research in online communities. Journal of Marketing Research, 39(1), 61–72.CrossRef Kozinets, R. V. (2002). The field behind the screen: Using netnography for marketing research in online communities. Journal of Marketing Research, 39(1), 61–72.CrossRef
go back to reference Leckie, G. J., & Buschman, J. E. (2008). Information technology in librarianship: New critical approaches. ABC-CLIO (Google-Books-ID: gZRxDwAAQBAJ). Leckie, G. J., & Buschman, J. E. (2008). Information technology in librarianship: New critical approaches. ABC-CLIO (Google-Books-ID: gZRxDwAAQBAJ).
go back to reference Leistert, O. (2015). The revolution will not be liked: On the systemic constraints of corporate social media platforms for protests. In Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield. Leistert, O. (2015). The revolution will not be liked: On the systemic constraints of corporate social media platforms for protests. In Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield.
go back to reference McSweeney, B. (1996). Identity and security: Buzan and the Copenhagen school. Review of International Studies, 22(1), 81–93.CrossRef McSweeney, B. (1996). Identity and security: Buzan and the Copenhagen school. Review of International Studies, 22(1), 81–93.CrossRef
go back to reference Oliver, J. E., & Wood, T. J. (2014). Conspiracy theories and the paranoid style(s) of mass opinion. American Journal of Political Science, 58(4), 952–966.CrossRef Oliver, J. E., & Wood, T. J. (2014). Conspiracy theories and the paranoid style(s) of mass opinion. American Journal of Political Science, 58(4), 952–966.CrossRef
go back to reference Porro, N., & Russo, P. (2000). Berlusconi and other matters: The era of ‘football-politics’. Journal of Modern Italian Studies, 5(3), 348–371.CrossRef Porro, N., & Russo, P. (2000). Berlusconi and other matters: The era of ‘football-politics’. Journal of Modern Italian Studies, 5(3), 348–371.CrossRef
go back to reference Reuter, C. (2019). Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace. Springer (Google-Books-ID: 9aqMDwAAQBAJ). Reuter, C. (2019). Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace. Springer (Google-Books-ID: 9aqMDwAAQBAJ).
go back to reference Reuter, C., et al. (2019). IT in peace, conflict and security research. In Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war and peace. Springer. Reuter, C., et al. (2019). IT in peace, conflict and security research. In Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war and peace. Springer.
go back to reference Salter, M. B., & Mutlu, C. E. (2013). Research methods in critical security studies. Routledge.CrossRef Salter, M. B., & Mutlu, C. E. (2013). Research methods in critical security studies. Routledge.CrossRef
go back to reference Shobe, H. (2008). Football and the politics of place: Football Club Barcelona and Catalonia, 1975–2005. Journal of Cultural Geography, 25(1), 87–105.CrossRef Shobe, H. (2008). Football and the politics of place: Football Club Barcelona and Catalonia, 1975–2005. Journal of Cultural Geography, 25(1), 87–105.CrossRef
go back to reference Stanley, L., & Jackson, R. (2016). Introduction: Everyday narratives in world politics. Politics, 36(3), 223–235.CrossRef Stanley, L., & Jackson, R. (2016). Introduction: Everyday narratives in world politics. Politics, 36(3), 223–235.CrossRef
go back to reference Stępka, M. (2022). The Copenhagen school and beyond. A closer look at securitisation theory. In Identifying security logics in the EU policy discourse: The ‘migration crisis’ and the EU (pp. 17–31). IMISCOE Research Series. Springer. Available from: https://doi.org/10.1007/978-3-030-93035-6_2 (Accessed 22 August 2022). Stępka, M. (2022). The Copenhagen school and beyond. A closer look at securitisation theory. In Identifying security logics in the EU policy discourse: The ‘migration crisis’ and the EU (pp. 17–31). IMISCOE Research Series. Springer. Available from: https://​doi.​org/​10.​1007/​978-3-030-93035-6_​2 (Accessed 22 August 2022).
go back to reference van Dijk, J. A. G. M. (2006). Digital divide research, achievements and shortcomings. Poetics, 34(4), 221–235.CrossRef van Dijk, J. A. G. M. (2006). Digital divide research, achievements and shortcomings. Poetics, 34(4), 221–235.CrossRef
go back to reference Vaughan-Williams, N., & Stevens, D. (2016). Vernacular theories of everyday (in)security: The disruptive potential of non-elite knowledge. Security Dialogue, 47(1), 40–58.CrossRef Vaughan-Williams, N., & Stevens, D. (2016). Vernacular theories of everyday (in)security: The disruptive potential of non-elite knowledge. Security Dialogue, 47(1), 40–58.CrossRef
go back to reference Veloso, F., & Bateman, J. (2013). The multimodal construction of acceptability: Marvel’s Civil War comic books and the PATRIOT Act. Critical Discourse Studies, 10(4), 427–443.CrossRef Veloso, F., & Bateman, J. (2013). The multimodal construction of acceptability: Marvel’s Civil War comic books and the PATRIOT Act. Critical Discourse Studies, 10(4), 427–443.CrossRef
go back to reference Wyn Jones, R. (1999). Security, strategy and critical theory. Lynne Rienner. Wyn Jones, R. (1999). Security, strategy and critical theory. Lynne Rienner.
Metadata
Title
Conclusions on Social Media and Critical Security Studies in a Digital Age
Author
Joseph Downing
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-20734-1_8

Premium Partner