Click the star to add/remove an item to/from your individual schedule.
You need to be logged in to avail of this functionality.

C24


Caring, negotiating and tinkering for IT in/security 
Convenors:
Laura Anna Kocksch (Aalborg University Copenhagen)
Katharina Kinder-Kurlanda (University of Klagenfurt)
Andreas Poller (Fraunhofer Institute for Secure Information Technology)
Estrid Sørensen (Ruhr-Universität Bochum)
Susann Wagenknecht (University of Siegen)
Send message to Convenors
Stream:
Confluence, collaboration and intersection
Location:
Bowland North Seminar Room 20
Start time:
28 July, 2018 at
Time zone: Europe/London
Session slots:
2

Short Abstract:

This panel discusses IT security as distributed and fragmented efforts to co- and re-configure control and authority together with uncertainties and threats. We explore IT in/security as a matter of careful tinkering and tense negotiations, with both temporal and moral dynamics.

Long Abstract:

Warnings on computer screens, the mushrooming of security centres, increasing discourses on hacker attacks and leaks all play a crucial part in re-configuring social and moral orderings. Nonetheless, IT security is commonly framed as a matter of pure technological solutions, as a problem of mismatches between design and individual's competencies and of seemingly indisputable standards.

These perspectives fail to account for the ways in which IT in/security is encountered as a matter of caring, negotiating and tinkering. How is IT security enacted as both a technical solution and a collaborative, provisional and contested practice in organizations and beyond? How does IT security re-configure control and authority together with uncertainties and threats? How, where and when are concerns for in/security in IT propagated (or stalled) e.g. by the quest for innovation?

Bringing together a broad range of approaches to the study of IT security practices, the panel probes the lens of care and its usefulness in the study, critique and intervention. The panel invites contributions on the following or related topics:

new challenges for IT security in the wake of 'big' data,

the dynamics of shifts in in-/security, their rhythms of 'leak and fix,'

the various areas for which IT security needs to be enacted and upon which it thrives,

the practices of locating and translating "weaknesses," "risks" or "breaches,"

the different imaginaries and thought styles of IT security,

the moral economy of IT security and its appeals to public good and evil, etc.

Accepted papers:

Session 1