Skip to main content
Top
Published in:

2023 | OriginalPaper | Chapter

1. Introduction to Social Media and Critical Security Studies in the Digital Age

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter introduces the key debates about critical security studies and social media that will frame the discussions in the rest of this book. Key in this is challenging simplistic and unidirectional assumptions about social media and its role in the sphere of politics and security. To do this, this introduction sets out three key assumptions that underpin the rest of this book. The first takes up the call within critical security studies to shatter disciplinary boundaries when we examine security in the unregulated space of social media. Secondly, related to this expansion of disciplines, scholars need to “expect the unexpected” when examining security on social media as the range of idioms, symbols, narratives and ideas used to re-frame, subvert and contest security on social media is breath-taking. Thirdly, scholars also need to be aware of the fickle nature of social media, and the constantly changeable nature of platforms, data sources and locations of security on social media which requires significant and ongoing methods and methodological innovations. Fourthly, the emancipatory burden of critical theory, and by extension critical security studies, weighs heavily also on broader discussions of social media’s political potential. The results are extremely mixed, with social media being enmeshed in relations of control, commodification and emancipation. This book argues that social media offers only a “thin” form of discursive emancipation, where it gives previously unheard voices a platform, but the potential of this to change power relations in the “real world” are unclear.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Ali, A. H. (2011). The power of social media in developing nations: New tools for closing the global digital divide and beyond note. Harvard Human Rights Journal, 24(1), 185–220. Ali, A. H. (2011). The power of social media in developing nations: New tools for closing the global digital divide and beyond note. Harvard Human Rights Journal, 24(1), 185–220.
go back to reference Aradau, C. (2004). Security and the democratic scene: Desecuritization and emancipation. Journal of International Relations and Development, 7(4), 26.CrossRef Aradau, C. (2004). Security and the democratic scene: Desecuritization and emancipation. Journal of International Relations and Development, 7(4), 26.CrossRef
go back to reference Aradau, C., Coward, M., Herschinger, E., Thomas, O. D., & Veolkner, N. 2015. Discourse/materiality. In Critical security methods: New framework for analysis (pp. 57–84). The New International Relations Series. Routledge. Aradau, C., Coward, M., Herschinger, E., Thomas, O. D., & Veolkner, N. 2015. Discourse/materiality. In Critical security methods: New framework for analysis (pp. 57–84). The New International Relations Series. Routledge.
go back to reference Aradau, C., Huysmans, J., Neal, A., & Voelkner, N. (2015). Critical security methods: New frameworks for analysis. The New International Relations Series. Routledge. Aradau, C., Huysmans, J., Neal, A., & Voelkner, N. (2015). Critical security methods: New frameworks for analysis. The New International Relations Series. Routledge.
go back to reference Baker, C. E. (2001). Media, markets, and democracy. Cambridge University Press. Baker, C. E. (2001). Media, markets, and democracy. Cambridge University Press.
go back to reference Bilgin, P. (2010). The ‘western-centrism’ of security studies: ‘Blind spot’ or constitutive practice? Security Dialogue, 41(6), 615–622. Bilgin, P. (2010). The ‘western-centrism’ of security studies: ‘Blind spot’ or constitutive practice? Security Dialogue, 41(6), 615–622.
go back to reference Buzan, B., Waever, O., & de Wilde, J. (1997). Security: A new framework for analysis (UK ed.). Lynne Rienner. Buzan, B., Waever, O., & de Wilde, J. (1997). Security: A new framework for analysis (UK ed.). Lynne Rienner.
go back to reference Davey, J., & Weinberg, D. (2021). Inspiration and influence: Discussions of the US military in extreme right-wing telegram channels. Institute for Strategic Dialogue. Davey, J., & Weinberg, D. (2021). Inspiration and influence: Discussions of the US military in extreme right-wing telegram channels. Institute for Strategic Dialogue.
go back to reference Dencik, L., & Leistert, O. (2015). Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield. Dencik, L., & Leistert, O. (2015). Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield.
go back to reference Filimon, L.-M. (2016). An overview of the Copenhagen school’s approach to security studies: Constructing (in)security through performative power. The Romanian Journal for Baltic and Nordic Studies, 8(2), 47–72.CrossRef Filimon, L.-M. (2016). An overview of the Copenhagen school’s approach to security studies: Constructing (in)security through performative power. The Romanian Journal for Baltic and Nordic Studies, 8(2), 47–72.CrossRef
go back to reference Floyd, R. (2007). Towards a consequentialist evaluation of security: Bringing together the Copenhagen and the Welsh Schools of security studies. Review of International Studies, 33(2), 327–350.CrossRef Floyd, R. (2007). Towards a consequentialist evaluation of security: Bringing together the Copenhagen and the Welsh Schools of security studies. Review of International Studies, 33(2), 327–350.CrossRef
go back to reference Jackson, R., Gunning, J., & Breen-Smyth, M. (2007). Introduction: The case for a critical terrorism studies. Paper of the American Political Science Association. Jackson, R., Gunning, J., & Breen-Smyth, M. (2007). Introduction: The case for a critical terrorism studies. Paper of the American Political Science Association.
go back to reference Kellner, D. (2007). The media in and after 9/11. International Journal of Communication, 1, 123–142. Kellner, D. (2007). The media in and after 9/11. International Journal of Communication, 1, 123–142.
go back to reference Nussbaum, E. (Ed.). (2017, January 23). How Jokes won the election. The New Yorker. Nussbaum, E. (Ed.). (2017, January 23). How Jokes won the election. The New Yorker.
go back to reference Oliver, J. E., & Wood, T. J. (2014). Conspiracy theories and the paranoid style(s) of mass opinion. American Journal of Political Science, 58(4), 952–966.CrossRef Oliver, J. E., & Wood, T. J. (2014). Conspiracy theories and the paranoid style(s) of mass opinion. American Journal of Political Science, 58(4), 952–966.CrossRef
go back to reference Persily, N., & Tucker, J. A. (2020). Introduction. In Social media and democracy: The state of the field and prospects for reform (pp. 1–9). Cambridge University Press. Persily, N., & Tucker, J. A. (2020). Introduction. In Social media and democracy: The state of the field and prospects for reform (pp. 1–9). Cambridge University Press.
go back to reference Reuter, C. (2019). Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace. Springer.CrossRef Reuter, C. (2019). Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace. Springer.CrossRef
go back to reference Reuter, C., Aldehoff, L., Riebe, T., & Kaufhold, M.-A. (2019). IT in peace, conflict and security research. In Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war and peace. Springer. Reuter, C., Aldehoff, L., Riebe, T., & Kaufhold, M.-A. (2019). IT in peace, conflict and security research. In Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war and peace. Springer.
go back to reference Salter, M. B., & Mutlu, C. E. (2013). Research methods in critical security studies. Routledge. Salter, M. B., & Mutlu, C. E. (2013). Research methods in critical security studies. Routledge.
go back to reference Titley, G., Freedman, D., Khiabany, G., & Mondon, A. (2017). After Charlie Hebdo: Terror. Bloomsbury.CrossRef Titley, G., Freedman, D., Khiabany, G., & Mondon, A. (2017). After Charlie Hebdo: Terror. Bloomsbury.CrossRef
go back to reference Vilmer, J.-B. J. (2019). The ‘Macron Leaks’ operation. Atlantic Council. Vilmer, J.-B. J. (2019). The ‘Macron Leaks’ operation. Atlantic Council.
go back to reference Wyn Jones, R. (1999). Security, strategy and critical theory. Lynne Rienner.CrossRef Wyn Jones, R. (1999). Security, strategy and critical theory. Lynne Rienner.CrossRef
Metadata
Title
Introduction to Social Media and Critical Security Studies in the Digital Age
Author
Joseph Downing
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-20734-1_1

Premium Partner