Security and Conspiracy in Modern History

被引:0
作者
Zwierlein, Cornel [1 ]
de Graaf, Beatrice [2 ]
机构
[1] Ruhr Univ Bochum, Fak Geschichtswissensch, Hist Inst, D-44801 Bochum, Germany
[2] Leiden Univ, Ctr Terrorism & Counterterrorism, NL-2501 EE The Hague, Netherlands
来源
HISTORICAL SOCIAL RESEARCH-HISTORISCHE SOZIALFORSCHUNG | 2013年 / 38卷 / 01期
关键词
security; security history; conspiracy; conspiracy theory; communication history; information public sphere; Antichrist; confessional age; Renaissance; Enlightenment; revolution; Modernity; late Modernity; theory of epochs; UNIVERSAL DECLARATION; PUBLIC SPHERE; OESTREICH; GERHARD; 19TH-CENTURY; COMMUNISM; TERRORISM; RIGHTS; PEACE; STATE; FIELD;
D O I
暂无
中图分类号
K [历史、地理];
学科分类号
06 ;
摘要
"Sicherheit und Verschworung in der Neuzeit". Security History is a new field in historical research. Conspiracies and Conspiracy Theories have attracted since some years great attention, both in historical and in social research. A thorough study of those both opposed and mirroring key phenomena and concepts does not exist. This contribution tries to outline a sketch of the development of their interwoven history, how (imagined) conspiracies challenged new means of security production and vice versa. The main assumption is that a) a translocal public sphere, b) concepts, practices and means of institutionalized security production, and c) developed narratives that contain conspiracy theories only emerge together from the Renaissance onwards. Only if there is a public sphere in which conspiracy theories can circulate anonymously they become themselves an element of historical agency. Security as a leading principle of politics emerges only with the development of the state. The contribution outlines the steps of change from confessional age to Enlightenment, to the Revolutionary age and to Modernity, identifying mainly two important systematic changings which affect the security/conspiracy combination (Emergence of observability alongside the politics/religion and Ancien Regime/Bourgeois Society distinctions). It finally asks if there is currently happening a third epochal shift of comparable importance.
引用
收藏
页码:7 / 45
页数:39
相关论文
共 50 条
  • [1] Historicizing Security - Entering the Conspiracy Dispositive
    de Graaf, Beatrice
    Zwierlein, Cornel
    HISTORICAL SOCIAL RESEARCH-HISTORISCHE SOZIALFORSCHUNG, 2013, 38 (01): : 46 - 64
  • [2] Security Politics and Conspiracy Theories in the Emerging European State System (15th/16th c.)
    Zwierlein, Cornel
    HISTORICAL SOCIAL RESEARCH-HISTORISCHE SOZIALFORSCHUNG, 2013, 38 (01): : 65 - 95
  • [3] 'International Terrorism' as Conspiracy: Debating Terrorism in the League of Nations
    Ditrych, Ondrej
    HISTORICAL SOCIAL RESEARCH-HISTORISCHE SOZIALFORSCHUNG, 2013, 38 (01): : 200 - 210
  • [4] Conspiracy and foreign policy
    Aistrope, Tim
    Bleiker, Roland
    SECURITY DIALOGUE, 2018, 49 (03) : 165 - 182
  • [5] On Conspiracy Thinking: Conspiracist Ideology as a Modern Phenomenon
    Christoph, Stefan
    POLITICS AND GOVERNANCE, 2022, 10 (04): : 135 - 145
  • [6] Surveillance by Proxy: Sport and Security in a Modern Age
    Hassan, David
    AMERICAN BEHAVIORAL SCIENTIST, 2016, 60 (09) : 1043 - 1056
  • [7] Information Sovereignty as the Basis of Modern State Information Security
    Zozulia, Oleksandr
    Zozuha, Ihor
    Brusakova, Oksana
    Kholod, Yurii
    Berezhna, Yevheniia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 264 - 268
  • [8] Communicating Security: Technical Communication, Fire Security, and Fire Engine 'Experts' in the Early Modern Period
    Knapp, Rebecca
    HISTORICAL SOCIAL RESEARCH-HISTORISCHE SOZIALFORSCHUNG, 2010, 35 (04): : 66 - 85
  • [9] Conspiracy, Security, and Human Care in Donnersmarck's Leben der Anderen
    Hamilton, John T.
    HISTORICAL SOCIAL RESEARCH-HISTORISCHE SOZIALFORSCHUNG, 2013, 38 (01): : 129 - 141
  • [10] Security and Encryption at Modern Databases
    Ocenas, Martin
    Homoliak, Ivan
    Hanacek, Petr
    Malinka, Kamil
    2020 4TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2020), 2020, : 19 - 23