Protocol and the post-human performativity of security techniques

被引:7
|
作者
O'Grady, Nathaniel [1 ]
机构
[1] Univ Southampton, Human Geog, Southampton, Hants, England
关键词
aesthetics; emergency; exercise; performativity; protocol; security; PREPAREDNESS; PREEMPTION; PRECAUTION;
D O I
10.1177/1474474015609160
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.
引用
收藏
页码:495 / 510
页数:16
相关论文
共 50 条
  • [31] Security and privacy protection protocol based on edge computing in smart campus
    Liang, Jing
    Gong, Yan
    EXPERT SYSTEMS, 2025, 42 (01)
  • [32] Security in VANETs: Lightweight Protocol for Group-of-Vehicles Masters (LPGVM)
    Kalil, Hamacire El Hadj
    Kora, Ahmed Dooguy
    Boumerdassi, Selma
    2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 6 - 11
  • [33] Security analysis of routing protocol for MANET
    Wang, Ying-long
    Wang, Ji-zhi
    Wang, Mei-qin
    2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 920 - 923
  • [34] Security Analysis of the RaSTA Safety Protocol
    Heinrich, Markus
    Vieten, Jannik
    Arul, Tolga
    Katzenbeisser, Stefan
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 199 - 204
  • [35] High Security Communication Protocol for SMS
    Wu, Songyang
    Tan, Chengxiang
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 53 - 56
  • [36] Security Protocol of Social Payment Apps
    Saini, Jasmeen
    INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 139 - 150
  • [37] Security issues in WAP WTLS protocol
    Radhamani, G
    Ramasamy, K
    2002 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS AND WEST SINO EXPOSITION PROCEEDINGS, VOLS 1-4, 2002, : 483 - 487
  • [38] Improving the Security of Cryptographic Protocol Standards
    Basin, David
    Cremers, Cas
    Miyazaki, Kunihiko
    Radomirovic, Sasa
    Watanabe, Dai
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 24 - 31
  • [39] A Lightweight Security Protocol for Beacons BLE
    Jocelyn Campos-Cruz, Karla
    Mancillas-Lopez, Cuauhtemoc
    Ovilla-Martinez, Brisbane
    2021 18TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE 2021), 2021,
  • [40] Security Analysis of an Ownership Transfer Protocol
    Ghadim, Gelare Oudi
    Moazami, Farokhlagha
    Oskuiee, Shabnam Saderi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (06): : 1 - 11