Protocol and the post-human performativity of security techniques

被引:7
|
作者
O'Grady, Nathaniel [1 ]
机构
[1] Univ Southampton, Human Geog, Southampton, Hants, England
关键词
aesthetics; emergency; exercise; performativity; protocol; security; PREPAREDNESS; PREEMPTION; PRECAUTION;
D O I
10.1177/1474474015609160
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.
引用
收藏
页码:495 / 510
页数:16
相关论文
共 50 条
  • [21] Security and Robustness by Protocol Testing
    Fu, Yulong
    Kone, Ousmane
    IEEE SYSTEMS JOURNAL, 2014, 8 (03): : 699 - 707
  • [22] A security protocol for RFID traceability
    Gandino, Filippo
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (06)
  • [23] A Lightweight IoT Security Protocol
    Hammi, Mohamed Tahar
    Livolant, Erwan
    Bellot, Patrick
    Serhrouchni, Ahmed
    Minet, Pascale
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [24] RFID security authentication protocol based on key update mechanism
    Wei, Ruidong
    Jiang, Lei
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1395 - 1401
  • [25] A thin security layer protocol over IP protocol on TCP/IP suite for security enhancement
    Al-Jarrah, Mohammad
    Tamimi, Abdel-Karim R.
    2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 232 - +
  • [26] Redefining the meaning of teaching in the era of (post-) performativity: the voices of Singapore teachers
    Ro, Jina
    OXFORD REVIEW OF EDUCATION, 2022, 48 (05) : 642 - 658
  • [27] Mimesis and the Process of Becoming Human: Performativity, Repetition and Practical Knowledge
    Wulf, Christoph
    COUNTERTEXT-A JOURNAL FOR THE STUDY OF THE POST-LITERARY, 2022, 8 (01): : 46 - 60
  • [29] Doing competence: On the performativity of literacy and numeracy from a post-structural viewpoint
    Lisanne Heilmann
    International Review of Education, 2020, 66 : 167 - 182
  • [30] Investigating the Prevalent Security Techniques in Wireless Sensor Network Protocols
    O'Mahony, George D.
    Harris, Philip J.
    Murphy, Colin C.
    2019 30TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2019,