Security and Conspiracy in Modern History

被引:0
作者
Zwierlein, Cornel [1 ]
de Graaf, Beatrice [2 ]
机构
[1] Ruhr Univ Bochum, Fak Geschichtswissensch, Hist Inst, D-44801 Bochum, Germany
[2] Leiden Univ, Ctr Terrorism & Counterterrorism, NL-2501 EE The Hague, Netherlands
来源
HISTORICAL SOCIAL RESEARCH-HISTORISCHE SOZIALFORSCHUNG | 2013年 / 38卷 / 01期
关键词
security; security history; conspiracy; conspiracy theory; communication history; information public sphere; Antichrist; confessional age; Renaissance; Enlightenment; revolution; Modernity; late Modernity; theory of epochs; UNIVERSAL DECLARATION; PUBLIC SPHERE; OESTREICH; GERHARD; 19TH-CENTURY; COMMUNISM; TERRORISM; RIGHTS; PEACE; STATE; FIELD;
D O I
暂无
中图分类号
K [历史、地理];
学科分类号
06 ;
摘要
"Sicherheit und Verschworung in der Neuzeit". Security History is a new field in historical research. Conspiracies and Conspiracy Theories have attracted since some years great attention, both in historical and in social research. A thorough study of those both opposed and mirroring key phenomena and concepts does not exist. This contribution tries to outline a sketch of the development of their interwoven history, how (imagined) conspiracies challenged new means of security production and vice versa. The main assumption is that a) a translocal public sphere, b) concepts, practices and means of institutionalized security production, and c) developed narratives that contain conspiracy theories only emerge together from the Renaissance onwards. Only if there is a public sphere in which conspiracy theories can circulate anonymously they become themselves an element of historical agency. Security as a leading principle of politics emerges only with the development of the state. The contribution outlines the steps of change from confessional age to Enlightenment, to the Revolutionary age and to Modernity, identifying mainly two important systematic changings which affect the security/conspiracy combination (Emergence of observability alongside the politics/religion and Ancien Regime/Bourgeois Society distinctions). It finally asks if there is currently happening a third epochal shift of comparable importance.
引用
收藏
页码:7 / 45
页数:39
相关论文
共 50 条
  • [31] CONSPIRACY AND CONSPIRACY THEORIES IN DEMOCRATIC POLITICS
    Moore, Alfred
    CRITICAL REVIEW, 2016, 28 (01) : 1 - 23
  • [32] From eu internal security to global security
    Popescu, C.
    CRIMINAL REPRESSION IN THE CONTEXT OF THE ECONOMIC CRISIS AND THE MAXIMIZATION OF CRIME AT EUROPEAN AND GLOBAL LEVEL, 2013, : 461 - 464
  • [33] Linguistic imperialism: a conspiracy, or a conspiracy of silence?
    Robert Phillipson
    Language Policy, 2007, 6 (3-4) : 377 - 383
  • [34] Emerging Research in the Security of Modern and Autonomous Vehicles
    Tout, Samir
    Abualkibash, Munther
    Patil, Pooj A.
    2018 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2018, : 543 - 547
  • [35] Cyber security attacks to modern vehicular systems
    Pan, L.
    Zheng, X.
    Chen, H. X.
    Luan, T.
    Bootwala, H.
    Batten, L.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 : 90 - 100
  • [36] ON IDENTIFICATION, IDENTITY, AND SECURITY ISSUES IN MODERN ARMENIA
    Atoyan, Vardan
    Ohanyan, Sofya
    Malkjyan, Arpine
    Movsisyan, Nane
    WISDOM, 2022, 2 (01): : 5 - +
  • [37] Modern Applications of QR-Code for Security
    Saranya, K.
    Reminaa, R. S.
    Subhitsha, S.
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 173 - 177
  • [38] Investigating Security Vulnerabilities in Modern Vehicle Systems
    Zheng, Xi
    Pan, Lei
    Chen, Hongxu
    Wang, Peiyin
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 29 - 40
  • [39] Security and history management: Improvements to PBSWeb
    Ma, G
    Salamon, V
    Lu, P
    HIGH PERFORMANCE COMPUTING SYSTEMS AND APPLICATIONS, 2003, 727 : 105 - 118
  • [40] The Plot Thickens: A Sociology of Conspiracy Theories
    Rao, Hayagreeva
    Greve, Henrich R.
    ANNUAL REVIEW OF SOCIOLOGY, 2024, 50 : 191 - 207