Protocol and the post-human performativity of security techniques

被引:7
|
作者
O'Grady, Nathaniel [1 ]
机构
[1] Univ Southampton, Human Geog, Southampton, Hants, England
关键词
aesthetics; emergency; exercise; performativity; protocol; security; PREPAREDNESS; PREEMPTION; PRECAUTION;
D O I
10.1177/1474474015609160
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.
引用
收藏
页码:495 / 510
页数:16
相关论文
共 50 条
  • [1] POST-HUMAN BODY AND BEAUTY
    Teresa Russo, Maria
    Di Stefano, Nicola
    CUADERNOS DE BIOETICA, 2014, 25 (85): : 457 - 466
  • [2] Forensic Architecture and the Aesthetics of Post-Human Testimony
    Romeo, Francesca
    DIGITAL JOURNALISM, 2025, 13 (01) : 97 - 114
  • [3] Questioning security devices: Performativity, resistance, politics
    Amicelle, Anthony
    Aradau, Claudia
    Jeandesboz, Julien
    SECURITY DIALOGUE, 2015, 46 (04) : 293 - 306
  • [4] Rethinking, "Rethinking: Post-Human Boundaries": Pre-given or Performed?
    Orsatti, Jo
    Hafermalz, Ella
    Hovorka, Dirk S.
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2016, 47 (04): : 41 - 44
  • [5] Performativity and the project: enacting urban transport security in Europe
    Hoijtink, Marijn
    CRITICAL STUDIES ON TERRORISM, 2015, 8 (01) : 130 - 146
  • [6] "Securing the state" in post-2011 Tunisia: performativity of the authoritarian neoliberal state
    Maryon, Rosa
    CRITICAL STUDIES ON TERRORISM, 2024, 17 (02) : 224 - 247
  • [7] A Survey of DHT Security Techniques
    Urdaneta, Guido
    Pierre, Guillaume
    Van Steen, Maarten
    ACM COMPUTING SURVEYS, 2011, 43 (02)
  • [8] Design on Security Communication Protocol of Electricity Acquisition Terminal Based on the Password Techniques
    Xu, Wen-jing
    Li, Bao-feng
    Lv, Ying-jie
    He, Bao-ling
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 261 - 264
  • [9] A Security Protocol for Vehicular Distributed Systems
    Gosman, Catalin
    Dobre, Ciprian
    Cristea, Valentin
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 321 - 327
  • [10] Performativity: Model and meaning in a post-Austinian frame
    Strand, Michael
    Leonard, Samantha
    EUROPEAN JOURNAL OF SOCIAL THEORY, 2025, 28 (01) : 48 - 67