Protocol and the post-human performativity of security techniques

被引:7
|
作者
O'Grady, Nathaniel [1 ]
机构
[1] Univ Southampton, Human Geog, Southampton, Hants, England
关键词
aesthetics; emergency; exercise; performativity; protocol; security; PREPAREDNESS; PREEMPTION; PRECAUTION;
D O I
10.1177/1474474015609160
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.
引用
收藏
页码:495 / 510
页数:16
相关论文
共 50 条
  • [41] Emerging Solutions for Time Protocol Security
    O'Donoghue, Karen
    2016 IEEE INTERNATIONAL SYMPOSIUM ON PRECISION CLOCK SYNCHRONIZATION FOR MEASUREMENT, CONTROL AND COMMUNICATION (ISPCS 2016), 2016, : 18 - 23
  • [42] Impact of Security Aspects at the IOTA Protocol
    Janecko, Tomas
    Zelinka, Ivan
    PROCEEDINGS OF THE THIRD INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'18), VOL 2, 2019, 875 : 41 - 48
  • [43] A security analysis of LOADng routing protocol
    Glissa, Ghada
    Meddeb, Aref
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1070 - 1074
  • [44] The right to life: Human life, bio-power and the performativity of law
    MacGregor, Casimir
    JOURNAL OF SOCIOLOGY, 2015, 51 (01) : 47 - 62
  • [45] On security of wireless sensor networks: a data authentication protocol using digital signature
    Huei-Wen Ferng
    Nguyen Minh Khoa
    Wireless Networks, 2017, 23 : 1113 - 1131
  • [46] Round-Efficient Security Authentication Protocol for 5G Network
    Geng, Guining
    Miao, Junfeng
    Xiao, Nan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 269 - 283
  • [47] PROTOCOL FOR A SYSTEMATIC REVIEW OF TELEHEALTH PRIVACY AND SECURITY RESEARCH TO IDENTIFY BEST PRACTICES
    Watzlaf, Valerie J. M.
    Dealmeida, Dilhari R.
    Zhou, Leming
    Hartman, Linda M.
    INTERNATIONAL JOURNAL OF TELEREHABILITATION, 2015, 7 (02): : 15 - 22
  • [48] On security of wireless sensor networks: a data authentication protocol using digital signature
    Ferng, Huei-Wen
    Nguyen Minh Khoa
    WIRELESS NETWORKS, 2017, 23 (04) : 1113 - 1131
  • [49] Teachers, performative techniques and professional values: how performativity becomes humanistic through interplay mechanisms
    Frostenson, Magnus
    Englund, Hans
    CAMBRIDGE JOURNAL OF EDUCATION, 2020, 50 (06) : 695 - 710
  • [50] A Perspective on Available Security Techniques in IoT
    Punia, Aanchal
    Gupta, Daya
    Jaiswal, Shruti
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 1553 - 1559