C24
Caring, negotiating and tinkering for IT in/security

Convenors:
Laura Kocksch (Ruhr-University Bochum)
Katharina Kinder-Kurlanda (GESIS Leibniz Institute for the Social Sciences)
Andreas Poller (Fraunhofer Institute for Secure Information Technology)
Estrid Sørensen (Ruhr-Universität Bochum)
Susann Wagenknecht (University of Siegen)
Location:
Bowland North Seminar Room 20
Start time:
28 July, 2018 at 9:30
Session slots:
2

Short abstract:

This panel discusses IT security as distributed and fragmented efforts to co- and re-configure control and authority together with uncertainties and threats. We explore IT in/security as a matter of careful tinkering and tense negotiations, with both temporal and moral dynamics.

Long abstract:

Warnings on computer screens, the mushrooming of security centres, increasing discourses on hacker attacks and leaks all play a crucial part in re-configuring social and moral orderings. Nonetheless, IT security is commonly framed as a matter of pure technological solutions, as a problem of mismatches between design and individual's competencies and of seemingly indisputable standards. These perspectives fail to account for the ways in which IT in/security is encountered as a matter of caring, negotiating and tinkering. How is IT security enacted as both a technical solution and a collaborative, provisional and contested practice in organizations and beyond? How does IT security re-configure control and authority together with uncertainties and threats? How, where and when are concerns for in/security in IT propagated (or stalled) e.g. by the quest for innovation? Bringing together a broad range of approaches to the study of IT security practices, the panel probes the lens of care and its usefulness in the study, critique and intervention. The panel invites contributions on the following or related topics: new challenges for IT security in the wake of 'big' data, the dynamics of shifts in in-/security, their rhythms of 'leak and fix,' the various areas for which IT security needs to be enacted and upon which it thrives, the practices of locating and translating "weaknesses," "risks" or "breaches," the different imaginaries and thought styles of IT security, the moral economy of IT security and its appeals to public good and evil, etc.