Cyberthreats in Popular Visual Culture

Myriam Dunn Cavelty,

Lorretta Holloway

Abstrakt
This paper focuses on how cyberthreats have been represented in popular visual culture (Western and Asian). These cultural products are an interesting site where the technical and the political effects of cyberthreats are presented together, giving them a particular weight and place in the discourse. The paper discusses three dominant representations (machine out-of-control, computers used as weapons, and amassing or withholding of data as threat) and then identifies three commonalities between them. The first concerns the surprising “passivity” of technology, making the human the main problem in this story, the second is the importance of non-virtual geography, turning machines into mere additions of normal human life, and the third concerns the normalization of the threat through time. Cyberthreats are part of our lives now and they are so deeply embedded, they cannot be separated from them anymore.
Słowa kluczowe: cybersecurity, cyberthreats, popular visual culture, security politics, visual studies, visuality
References
1. Andersen R. S, Vuori J. and Mutlu C. E. (2015) Visuality [in:] Claudia Aradau, Jef Huysmans, Andrew Neal, and Nadine Voelkner (eds) Critical Security Methods: New frameworks for analysis, Routledge, London 2015, pp. 85–117.
2. Balzacq T., The Three Faces of Securitization: Political Agency, Audience and Context, “European Journal of International Relations” 111 (2/2005), pp. 171–201.
3. Balzacq T. and Dunn Cavelty M., A theory of actor-network for cybersecurity, “European Journal of International Security” 1(2) 2016, pp. 176–198.
4. Bleiker R., Aesthetics and World Politics, Palgrave Macmillan, London 2009.
5. Buzan B., Wæver O. & de Wilde J., Security: A New Framework for Analysis, Lynne Rienner, Boulder 1998.
6. Carlin J., A Farewell to Arms, “Wired Magazin”, 5 January 1997, https://www.wired.com/1997/05/netizen-2/
7. Carver T., Cinematic Ontologies and Viewer Epistemologies: Knowing International Politics as Moving Images, “Global Society” 24 (3/2010), pp. 421–431.
8. Cresswell T. Dixon D., Introduction: Engaging Film [in:] T. Cresswell and D. Dixon (eds), Engaging Film: Geographies of Mobility and Identity, Rowman and Littlefield, London 2002, pp. 1–10.
9. Dunn Cavelty M., Cybersecurity Research Meets Science and Technology Studies, “Politics and Governance” 6 (2/2018), pp. 22–30.
10. Gross M. J., Stuxnet Worm: A Declaration of CyberWar, “Vanity Fair” 4 (2011).
11. Hansen L., The politics of securitization and the Muhammad cartoon crisis: A post-structuralist perspective, “Security Dialogue” 42 (4–5/2011), pp. 357–369.
12. Hansen L., How images make world politics: International icons and the case of Abu Ghraib, “Review of International Studies” 41 (2015), pp. 263–288.
13. Hansen L. and Nissenbaum H., Digital Disaster, Cyber Security, and the Copenhagen School, “International Studies Quarterly” 53 (4/2009), pp. 1155–75.
14. Huysmans J., The Politics of Insecurity: Fear, Migration and Asylum in the EU, Routledge, London 2006.
15. Massumi B., From Parables for the Virtual: Movement, Affect, Sensation, Duke University Press, Durham 2002.
16. Möller F., Photographic Interventions in Post-9/11 Security Policy, “Security Dialogue” 38 (2/2007), pp. 179–196.
17. Neal A., Securitization and Risk at the EU Border: The Origins of FRONTEX, “Journal of Common Market Studies” 47 (2/2009), pp. 333–356.
18. Neumann I. and Nexon D. (eds), Harry Potter and International Relations, Rowman & Littlefield, 2006.
19. Neumann Iver B., “Grab a phaser, Ambassador:” diplomacy in Star Trek, “Millennium: Journal of International Studies” 30 (3/2001), pp. 603–624.
20. Parikka J., Ethologies of Software Art: What Can a Digital Body of Code Do? [in:] Stephen Zepke (ed.), Deleuze and Contemporary Art, Edinburgh University Press, Edinburgh 2010.
21. President’s Commission on Critical Infrastructure Protection (1997). Critical Foundations: Protecting America’s Infrastructures. Washington: US Government Printing Office.
22. Rose G., Visual Methodologies: An Introduction to Researching with Visual Materials, 4th Edition (Sage), 2016.
23. Salter M., Securitization and desecuritization: a dramaturgical analysis of the Canadian Air Transport Security Authority, “Journal of International Relations and Development” 11 (2008), pp. 321–349.
24. Skibell R., The Myth of the Computer Hacker, “Information, Communication & Society” 5 (3/2002), pp. 336–356.
25. Stritzel H., Towards a Theory of Securitization: Copenhagen and Beyond, “European Journal of International Relations” 13 (3/2007), pp. 357–383.
26. Weldes J., Going Cultural: Star Trek, State Action, and Popular Culture, “Millennium: Journal of International Studies” 28 (1/1999), pp. 117–134.

Czasopismo ukazuje się w sposób ciągły on-line.
Pierwotną formą czasopisma jest wersja elektroniczna.