Skip to main content
Top

2020 | OriginalPaper | Chapter

4. Critical Human Security and Cyberspace: Enablement Besides Constraint

Author : Alan Collins

Published in: Digitalisation and Human Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter applies a critical human security perspective to cyberspace. It contends that emancipation provides human security with its core purpose, as it frees people both from the constraints imposed by despotic regimes (freedom from fear) and from an exploitative economic system (freedom from want). The idea that human emancipation can challenge the pre-existing order is reflected in the literature that foresees the digital revolution ushering in an age of transparency and empowerment. Conceiving security as emancipation, this chapter utilises the conceptual tool of the “three faces” of power to examine how human agency is enabled by the digital revolution (freedom from) as well as being simultaneously constrained by it (oppressed by).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
1
Booth (2007) has subsequently added to this original definition of emancipation by including the caveat that one’s freedom cannot come at the expense of others and, further, that emancipation serves as a means of understanding the world we inhabit and as a framework for actualising change. I quote Booth’s original definition here to show that a critical approach to human security, even though it was not self-identified as such, predates the UN Human Development Report.
 
2
Once algorithms are conceived of as restricting access and constraining human agency, challenging those elites who use algorithms for this purpose becomes an example of the open face of power.
 
3
On 25 May 2018, the General Data Protection Regulation (GDPR), a new EU law, came into effect, which changes how companies can collect personal data and how that data can be used. It applies to all companies that offer their services to EU citizens, even if they are based outside the EU. Failure to abide by the requirements of the GDPR can result in a fine of 20 million euros or 4% of a company’s global turnover. The severity of this punishment explains the deluge of emails users received from companies that hold their data requesting that the users review their data privacy policies. In terms of the secretive power of framing how humans can use the internet, it makes the ways in which companies intend to use personal data more explicit (consent must be given by ticking a box, for example) and this consent must be clearly distinguishable from other matters in the terms of service. It is also not legal to require additional personal data in return for extra or premium services, as this does not constitute freely given consent. Users also have the right to access the data held about them and to require errors to be rectified and erased. The right to erase accurate data can also be requested.
Within hours of the GDPR coming into effect, a privacy protection group called none-of-your-business (noyb) filed four complaints against Facebook, Google, Instagram and WhatsApp. They accused these companies of forcing users to consent to targeted advertising to use their services; if that consent was not given, they prevented users from using their services. Max Schrems, chairman of noyb, claimed that this did not amount to people being given a free choice (noyb, 2018). Whether or not the complaint will be upheld is likely to rest upon whether social networking sites or instant messaging services can make the argument that processing users’ data for targeted advertising is a necessary requirement for the service they provide. That is, that processing data for targeted advertising is a core feature of what it means to share in cyberspace. If this argument is not persuasive, then their processing of data for targeted advertising will require separate consent that the user can decline without being denied use of the service (Hern, 2018). This could have significant consequences for the economic model that underpins SNS, but in terms of the secretive power, because consent is more explicitly required, it is likely to make users more aware that their data are as much shared as protected.
 
Literature
go back to reference Bachrach, P., & Baratz, M. S. (1962). Two faces of power. American Political Science Review, 56(4), 947–952.CrossRef Bachrach, P., & Baratz, M. S. (1962). Two faces of power. American Political Science Review, 56(4), 947–952.CrossRef
go back to reference Booth, K. (1991). Security and emancipation. Review of International Studies, 17(4), 313–326.CrossRef Booth, K. (1991). Security and emancipation. Review of International Studies, 17(4), 313–326.CrossRef
go back to reference Booth, K. (2007). Theory of world security. Cambridge: Cambridge University Press.CrossRef Booth, K. (2007). Theory of world security. Cambridge: Cambridge University Press.CrossRef
go back to reference Breslin, S., & Christou, G. (2015). Has the human security agenda come of age? Definitions, discourses and debates. Contemporary Politics, 21(1), 1–10.CrossRef Breslin, S., & Christou, G. (2015). Has the human security agenda come of age? Definitions, discourses and debates. Contemporary Politics, 21(1), 1–10.CrossRef
go back to reference Bruns, A. (2008). Blogs, wikipedia, second life, and beyond: From production to produsage. New York, NY: Peter Lang. Bruns, A. (2008). Blogs, wikipedia, second life, and beyond: From production to produsage. New York, NY: Peter Lang.
go back to reference Dahl, R. A. (1957). The concept of power. Behavioral Science, 2(3), 201–215.CrossRef Dahl, R. A. (1957). The concept of power. Behavioral Science, 2(3), 201–215.CrossRef
go back to reference Digeser, P. (1992). The fourth face of power. The Journal of Politics, 54(4), 977–1007.CrossRef Digeser, P. (1992). The fourth face of power. The Journal of Politics, 54(4), 977–1007.CrossRef
go back to reference Dubois, E., & Blank, G. (2018). The echo chamber is overstated: The moderating effect of political interest and diverse media. Information, Communication & Society, 21(5), 729–745.CrossRef Dubois, E., & Blank, G. (2018). The echo chamber is overstated: The moderating effect of political interest and diverse media. Information, Communication & Society, 21(5), 729–745.CrossRef
go back to reference Dunn Cavelty, M. (2016). Cyber-security. In A. Collins (Ed.), Contemporary security studies (4th ed., pp. 400–416). Oxford: Oxford University Press. Dunn Cavelty, M. (2016). Cyber-security. In A. Collins (Ed.), Contemporary security studies (4th ed., pp. 400–416). Oxford: Oxford University Press.
go back to reference Groshek, J., & Koc-Michalska, K. (2017). Helping populism win? Social media use, filter bubbles, and support for populist presidential candidates in the 2016 US election campaign. Information, Communication & Society, 20(9), 1389–1407.CrossRef Groshek, J., & Koc-Michalska, K. (2017). Helping populism win? Social media use, filter bubbles, and support for populist presidential candidates in the 2016 US election campaign. Information, Communication & Society, 20(9), 1389–1407.CrossRef
go back to reference Grossman, L. (2006, December 25). 2006 person of the year. Time Magazine, pp. 38–41. Grossman, L. (2006, December 25). 2006 person of the year. Time Magazine, pp. 38–41.
go back to reference Grossman, L. (2010, December 27). 2010 person of the year. Time Magazine, pp. 44–75. Grossman, L. (2010, December 27). 2010 person of the year. Time Magazine, pp. 44–75.
go back to reference Hayward, C. R. (2000). De-facing power. New York, NY: Cambridge University Press. Hayward, C. R. (2000). De-facing power. New York, NY: Cambridge University Press.
go back to reference Hermida, A. (2014). Tell everyone: Why we share & why it matters. Toronto: Doubleday Canada. Hermida, A. (2014). Tell everyone: Why we share & why it matters. Toronto: Doubleday Canada.
go back to reference Hossain, K., Zojer, G., Greaves, W., Miguel Roncero, J., & Sheehan, M. (2017). Constructing Arctic security: An inter-disciplinary approach to understanding security in the Barents Region. Polar Record, 53(1), 52–66.CrossRef Hossain, K., Zojer, G., Greaves, W., Miguel Roncero, J., & Sheehan, M. (2017). Constructing Arctic security: An inter-disciplinary approach to understanding security in the Barents Region. Polar Record, 53(1), 52–66.CrossRef
go back to reference Hynek, N., & Chandler, D. (2011). Introduction: Emancipation and power in human security. In D. Chandler & N. Hynek (Eds.), Critical perspectives on human security: Rethinking emancipation and power in international relations (pp. 1–10). London: Routledge. Hynek, N., & Chandler, D. (2011). Introduction: Emancipation and power in human security. In D. Chandler & N. Hynek (Eds.), Critical perspectives on human security: Rethinking emancipation and power in international relations (pp. 1–10). London: Routledge.
go back to reference Hynek, N., & Chandler, D. (2013). No emancipatory alternative, no critical security studies. Critical Studies on Security, 1(1), 46–63.CrossRef Hynek, N., & Chandler, D. (2013). No emancipatory alternative, no critical security studies. Critical Studies on Security, 1(1), 46–63.CrossRef
go back to reference Karlsen, R., Steen-Johnsen, K., Wollebæk, D., & Enjolras, B. (2017). Echo chamber and trench warfare dynamics in online debates. European Journal of Communication, 32(3), 257–273.CrossRef Karlsen, R., Steen-Johnsen, K., Wollebæk, D., & Enjolras, B. (2017). Echo chamber and trench warfare dynamics in online debates. European Journal of Communication, 32(3), 257–273.CrossRef
go back to reference Kerr, P. (2013). Human security. In A. Collins (Ed.), Contemporary security studies (3rd ed., pp. 104–116). Oxford: Oxford University Press. Kerr, P. (2013). Human security. In A. Collins (Ed.), Contemporary security studies (3rd ed., pp. 104–116). Oxford: Oxford University Press.
go back to reference Lindgren, S., & Cocq, C. (2017). Turning the inside out: Social media and the broadcasting of indigenous discourse. European Journal of Communication, 32(2), 131–150.CrossRef Lindgren, S., & Cocq, C. (2017). Turning the inside out: Social media and the broadcasting of indigenous discourse. European Journal of Communication, 32(2), 131–150.CrossRef
go back to reference McLaren, D., & Agyeman, J. (2015). Sharing cities: A case for truly smart and sustainable cities. Cambridge: MIT Press. McLaren, D., & Agyeman, J. (2015). Sharing cities: A case for truly smart and sustainable cities. Cambridge: MIT Press.
go back to reference Morozov, E. (2011). The net delusion: How not to liberate the world. London: Penguin Books. Morozov, E. (2011). The net delusion: How not to liberate the world. London: Penguin Books.
go back to reference Newman, E. (2010). Critical human security studies. Review of International Studies, 36(1), 77–94.CrossRef Newman, E. (2010). Critical human security studies. Review of International Studies, 36(1), 77–94.CrossRef
go back to reference Paris, R. (2004). Still an inscrutable concept. Security Dialogue, 35(3), 370–371.CrossRef Paris, R. (2004). Still an inscrutable concept. Security Dialogue, 35(3), 370–371.CrossRef
go back to reference Pariser, E. (2011). The filter bubble: What the internet is hiding from you. London: Penguin Books. Pariser, E. (2011). The filter bubble: What the internet is hiding from you. London: Penguin Books.
go back to reference Peou, S. (2014). Human security studies: Theories, methods and themes. Singapore: World Scientific.CrossRef Peou, S. (2014). Human security studies: Theories, methods and themes. Singapore: World Scientific.CrossRef
go back to reference Salminen, M., & Hossain, K. (2018). Digitalisation and human security dimensions in cybersecurity: An appraisal for the European High North. The Polar Record, 54(2), 108–118.CrossRef Salminen, M., & Hossain, K. (2018). Digitalisation and human security dimensions in cybersecurity: An appraisal for the European High North. The Polar Record, 54(2), 108–118.CrossRef
go back to reference Swartz, D. (1997). Culture and power: The sociology of Pierre Bourdieu. Chicago: The University of Chicago Press.CrossRef Swartz, D. (1997). Culture and power: The sociology of Pierre Bourdieu. Chicago: The University of Chicago Press.CrossRef
go back to reference Tadjbakhsh, S., & Chenoy, A. M. (2009). Human security: Concepts and implications. London: Routledge. Tadjbakhsh, S., & Chenoy, A. M. (2009). Human security: Concepts and implications. London: Routledge.
go back to reference van Dijck, J. (2013). The culture of connectivity: A critical history of social media. New York, NY: Oxford University Press.CrossRef van Dijck, J. (2013). The culture of connectivity: A critical history of social media. New York, NY: Oxford University Press.CrossRef
Metadata
Title
Critical Human Security and Cyberspace: Enablement Besides Constraint
Author
Alan Collins
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-48070-7_4