Zusammenfassung
Dieses Kapitel stellt zentrale Themen der Technologieforschung in den Internationalen Beziehungen vor. Zunächst werden einschlägige theoretische und methodologische Positionen der Technikforschung erläutert. Im Hauptteil des Kapitels werden anschließend zwei empirische Felder ausführlicher behandelt: Internet Governance und Sicherheitsforschung. Es zeigt sich, dass Phänomene wie maschinelles Lernen, soziale Netzwerke und Überwachung politische Praktiken grundlegend verändern.
Similar content being viewed by others
Notes
- 1.
Digitalität bezieht sich auf das Speichern und Senden von Daten in einer binären Kodierung. Ein zweiter ‚neuartiger‘ Aspekt ist die Vernetzung: Der vernetzte, dezentrale Charakter bedeutet eine große politische Herausforderung, wie in den Abschnitten 2 und 3 erläutert wird.
- 2.
Selbstverständlich sind auch hier die Fragen nach den Grenzen der IB offen. Nicht jede Autorin, die ich zitiere, wird sich als Politikwissenschaftlerin verstehen. Fragen, die grob zu IG gehören, werden in verschiedenen Disziplinen verhandelt und gleichzeitig bildet sich IG als eigenes Forschungsfeld heraus.
- 3.
Dies liegt daran, dass beispielsweise Ebay eine starke Verschlüsselung braucht, um Zahlungsvorgänge zu sichern. Daher waren in diesem Fall die Interessen der Aktivisten hinsichtlich Privatsphäre und die der Unternehmen ähnlich.
- 4.
Bei dem Einsatz von Ransomware werden Daten auf Endgeräten verschlüsselt und erst durch das Zahlen eines Lösegelds (ransom) wieder entschlüsselt. Diese Art des Betrugs hat schon weltweit Unternehmen und staatliche Organisationen wie die Deutsche Bahn oder die britische NHS betroffen.
- 5.
Doxing oder auch Doxxing bezeichnet das Sammeln und spätere Publizieren persönlicher Daten, um die betreffende Person öffentlich bloßzustellen. Teilwiese geschieht dies mit politischen Untertönen, beispielsweise bei Anonymous, aber es kann sich auch um private Erpressung handeln.
- 6.
Die gesammelten Daten werden sowohl für kommerzielle als auch Sicherheitszwecke gesammelt. Aus Platzgründen kann dieser Prozess hier nicht näher behandelt werden. Der Text von Bellanova und Duez (2012) geht darauf jedoch im Detail ein.
- 7.
Es zeigt sich auch in diesem Feld eine vermehrte Nutzung qualitativer Methoden und STS-Ansätzen. Dies ermöglicht es, die Effekte des PNR Systems auf den Endnutzer zu zeigen und kritisch zu hinterfragen.
Literatur
Allcott, Hunt, und Matthew Gentzkow. 2017. Social media and fake news in the 2016 election. Cambridge, MA: National Bureau of Economic Research. http://www.nber.org/papers/w23089.pdf. Zugegriffen am 14.02.2017.
Amoore, Louise. 2011. Data derivatives: On the emergence of a security risk calculus for our times. Theory, Culture & Society 28:24–43.
Amoore, Louise. 2013. The politics of possibility: Risk and security beyond probability. Durham/London: Duke University Press.
Amoore, Louise, und Marieke De Goede. 2005. Governance, risk and dataveillance in the war on terror. Crime, Law and Social Change 43:149–173.
Anderson, Warwick, und Vincanne Adams. 2007. Pramoedya’s chickens: Postcolonial studies of technoscience. In The handbook of science and technology studies, Hrsg. Edward J. Hackett et al., 181–204. Cambridge, MA/London: MIT Press.
Aradau, Claudia. 2010. Security that matters: Critical infrastructure and objects of protection. Security Dialogue 41:491–514.
Aradau, Claudia, Jef Huysmans, Andrew Neal, und Nadine Voelkner, Hrsg. 2015. Critical Security Methods: New Frameworks for Analysis. The New International Relations Studies. London: Routledge.
Aradau, Claudia, und Tobias Blanke. 2018. Governing others: Anomaly and the algorithmic subject of security. European Journal of International Security 3:1–21.
Arora, Payal. 2019. Decolonizing privacy studies. Television & New Media 20:366–378.
Arquilla, John, und David Ronfeldt. 2001. Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica, CA: Rand Corporation.
Bakir, Vian, und Andrew McStay. 2018. Fake news and the economy of emotions: Problems, causes, solutions. Digital Journalism 6:154–175.
Ball, James, Julian Borger, und Glenn Greenwald. 2013. Revealed: How US and UK spy agencies defeat internet privacy and security. The Guardian, September 6. https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security. Zugegriffen am 28.05.2017.
Balzacq, Thierry, und Myriam Dunn Cavelty. 2016. A theory of actor-network for cyber-security. European Journal of International Security 1:176–198.
Barad, Karen. 1998. Getting real: Technoscientific practices and the materialization of reality. Differences: A Journal of Feminist Cultural Studies 10:87–126.
Barlow, John Perry. 1996. A declaration of the independence of cyberspace. In Crypto anarchy, cyberstates, and pirate utopias, 27–30. Cambridge, MA.: MIT Press.
Barry, Andrew, und William Walters. 2003. From EURATOM to „complex systems“: Technology and European government. Alternatives: Global, Local, Political 28:305–329.
Bauman, Zygmunt, et al. 2014. After snowden: Rethinking the impact of surveillance. International Political Sociology 8:121–144.
Bellanova, Rocco, und Denis Duez (2012) A Different View on the ‚Making‘ of European Security: The EU Passenger Name Record System as a Socio-Technical Assemblage. European Foreign Affairs Review 17(2): 109–112.
Bellanova, Rocco. 2017. Digital, politics, and algorithms: Governing digital data through the lens of data protection. European Journal of Social Theory 20:329–347.
Bellanova, Rocco, Katja Lindskov Jacobsen, und Linda Monsees. 2020. Taking the trouble: Science, technology and security studies. Critical Studies on Security 8:87–100.
Bennett, Colin J. 2011. In defense of privacy: The concept and the regime. Surveillance & Society 8:485–496.
Bigo, Didier. 2012. Security, surveillance and democracy. In Routledge handbook of surveillance studies, Hrsg. Kirstie Ball, Kevin D. Haggerty und David Lyon, 277–284. London/New York: Routledge.
Bijker, Wiebe E. 2010. How is technology made? That is the question! Cambridge Journal of Economics 34:63–76.
Bodó, Balázs, Kristina Irion, Heleen Janssen, und Alexandra Giannopoulou. 2021. Personal data ordering in context: The interaction of meso-level data governance regimes with macro frameworks. Internet Policy Review 10.
Bueger, Christian, und Frank Gadinger. 2015. ‚The Play of International Practice‘. International Studies Quarterly May, 1–12.
Bueger, Christian, und Tobias Liebetrau. 2021. Protecting hidden infrastructure: The security politics of the global submarine data cable network. Contemporary Security Policy 42:391–413.
Čas, Johann, Bellanova Rocco, J. Peter Burgess, Michael Friedewald, und Walter Peissl. 2017. Introduction surveillance, privacy and security. In Surveillance, privacy and security citizens’ perspectives, Hrsg. Friedewald Michael, J. Peter Burgess, Rocco Bellanova und Johann Cas, 1–12. London: Routledge.
Ceyhan, Ayse. 2002. Technologization of security: Management of uncertainty and risk in the age of biometrics. Surveillance & Society 5:102–123.
Chenou, Jean-Marie, und Roxana Radu. 2017. The „right to be forgotten“: Negotiating public and private ordering in the European Union. Business & Society 58:74–102.
Cohen, Julie E. 2007. Cyberspace as/and space. Columbia Law Review 107:210–256.
Coleman, E. Gabriella. 2014. Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. London/New York: Verso.
Coole, Diana H., und Samantha Frost, Hrsg. 2010. New materialisms: Ontology, agency, and politics. Durham/London: Duke University Press.
Couldry, Nick, und Ulises A. Mejias. 2019. Data colonialism: Rethinking big data’s relation to the contemporary subject. Television & New Media 20:336–349.
Creech, Brian. 2020. Fake news and the discursive construction of technology companies’ social power. Media, Culture & Society 42:952–968.
Dahlgren, Peter. 2005. The internet, public spheres, and political communication: Dispersion and deliberation. Political Communication 22:147–162.
Daniel, Jan, und Jakub Eberle. 2018. Hybrid warriors: Transforming Czech security through the ‚Russian hybrid warfare‘ assemblage. Czech Sociological Review 54:907–931.
Daniel, Jan, und Jakub Eberle. 2021. Speaking of hybrid warfare: Multiple narratives and differing expertise in the ‚hybrid warfare‘ debate in Czechia. Cooperation and Conflict 56(4): 432–53.
Davies, Simon G. 1998. Re-engineering the right to privacy: How privacy has been transformed from a right to a commodity. In Technology and privacy: The new landscape, Hrsg. Philip Agre und Marc Rotenberg, 143–166. Cambridge, MA: MIT Press.
DeNardis, Dr. Laura, und Mark Raymond. 2013. Thinking clearly about multistakeholder internet governance. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2354377.
DeNardis, Laura, Derrick Cogburn, Nanette S. Levinson, und Francesca Musiani, Hrsg. 2020. Introduction: Internet governance as an object of research inquiry. In Researching internet governance: Methods, frameworks, futures, 1–20. Cambridge, MA: The MIT Press.
Denning, Dorothy E. 1996. The future of cryptography. In Crypto anarchy, cyberstates, and pirate utopias, 85–101. Cambridge, MA: MIT Press.
Diffie, Whitfield, und Susan Eva Landau. 1998. Privacy on the line the politics of wiretapping and encryption. Cambridge, MA: MIT Press.
Drezner, Daniel W. 2009. Weighing the scales: The Internet’s effect on state-society relations. Brown Journal of World Affairs 16:31–44.
Dunn Cavelty, Myriam. 2007. Cyber-security and threat politics: US efforts to secure the information age. Abingdon/New York: Routledge.
Dunn Cavelty, Myriam, und Andreas Wenger. 2020. Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy 41:5–32.
Dutsyk, Diana, und Marta Dyczok. 2020. Ukraine’s new media laws: Fighting disinformation or targeting freedom of speech? Wilson Center. Wilson Center. https://www.wilsoncenter.org/blog-post/ukraines-new-media-laws-fighting-disinformation-or-targeting-freedom-speech. Zugegriffen am 12.02.2020.
Egbert, Simon, und Matthias Leese. 2021. Criminal futures: Predictive policing and everyday police work. London/New York: Routledge.
Elbe, Stefan, und Gemma Buckland-Merrett. 2019. Entangled security: Science, co-production, and intra-active insecurity. European Journal of International Security 4:123–141.
Elmer, Greg. 2012. Panopticon-discipline-control. In Routledge handbook of surveillance studies, Hrsg. Kirstie Ball, Kevin D. Haggerty und David Lyon, 21–29. Abingdon: Routledge.
Emirbayer, Mustafa, und Ann Mische. 1998. What is agency? American Journal of Sociology 103:962–1023.
Epstein, Dmitry, Christian Katzenbach, und Francesca Musiani. 2016. Doing internet governance: Practices, controversies, infrastructures, and institutions. Internet Policy Review 5.
Ermoshina, Ksenia, und Francesca Musiani. 2019. Hiding from whom?: Threat models and in-the-making encryption technologies. Intermédialités.
European Commission, und High Representative of the Union for Foreign Affairs and Security Policy. 2016. Joint Framework on countering hybrid threats – a European Union response. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52016JC0018&from=EN. Zugegriffen am 24.05.2022.
Feenberg, Andrew. 1999. Questioning technology. London/New York: Routledge.
Fichtner, Laura. 2018. What kind of cyber security? Theorising cyber security and mapping approaches. Internet Policy Review 7.
Flyverbom, Mikkel. 2016. Disclosing and concealing: Internet governance, information control and the management of visibility. Internet Policy Review 5.
Fritsch, Stefan. 2011. Technology and global affairs: Technology and global affairs. International Studies Perspectives 12:27–45.
Gartzke, Erik, und Jon R. Lindsay. 2015. ‚Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace‘. Security Studies 24(2): 316–48. https://doi.org/10.1080/09636412.2015.1038188.
Geuss, Raymond. 2013. Privatheit: eine Genealogie. Berlin: Suhrkamp.
Gillespie, Tarleton. 2018. ‚Regulation of and by Platforms‘. In The SAGE Handbook of Social Media, by Jean Burgess, Alice Marwick, and Thomas Poell, 254–78. 1 Oliver’s Yard, 55 City Road London EC1Y 1SP: SAGE Publications Ltd. https://doi.org/10.4135/9781473984066.n15.
Gilliom, John. 2001. Overseers of the poor: Surveillance, resistance, and the limits of privacy. Chicago: University of Chicago Press.
Gürses, Seda, Arun Kundnani, und Joris Van Hoboken. 2016. Crypto and empire: The contradictions of counter-surveillance advocacy. Media, Culture & Society 38:576–590.
Hacking, Ian. 1988. The participant irrealist at large in the laboratory. The British Journal for the Philosophy of Science 39:277–294.
Haggerty, Kevin D., und Richard V. Ericson. 2000. The surveillant assemblage. British Journal of Sociology 51:605–622.
Haraway, Donna Jeanne. 1991. Simians, cyborgs, and women: The reinvention of nature. New York/London: Routledge.
Haraway, Donna Jeanne. 1997. Modest-Witness@Second-Millennium.FemaleMan-Meets-OncoMouse: Feminism and technoscience. New York: Routledge.
Hayles, N. Katherine. 2017. Unthought: The power of the cognitive nonconscious. Chicago/London: The University of Chicago Press.
Herrera, Geoffrey L. 2002. The politics of bandwidth: International political implications of a global digital information network. Review of International Studies 28:93–122.
Hofmann, Jeanette, Christian Katzenbach, und Kirsten Gollatz. 2016. ‚Between Coordination and Regulation: Finding the Governance in Internet Governance‘. New Media & Society, March, 146144481663997. https://doi.org/10.1177/1461444816639975.
Huysmans, Jef. 2014. Security unbound: Enacting democratic limits. London/New York: Routledge.
Jacobsen, Katja Lindskov. 2015. Experimentation in humanitarian locations: UNHCR and biometric registration of Afghan refugees. Security Dialogue 46:144–164.
Jasanoff, Sheila. 2005. Let them eat cake’: GM foods and the democratic imagination. In Science and citizens: Globalization and the challenge of engagement, Hrsg. Melissa Leach, Ian Scoones und Brian Wynne, 183–198. New York: Zed Books.
Jasanoff, Sheila, Hrsg. 2010. States of knowledge: The co-production of science and social order. London: Routledge.
Jeandesboz, Julien. 2016. Smartening border security in the European Union: An associational inquiry. Security Dialogue 47:292–309.
Kaldor, Mary. 2018. Global security cultures. Cambridge, UK/Medford: Polity Press.
Kannengießer, Sigrid. 2020. Reflecting and acting on datafication – CryptoParties as an example of re-active data activism. Convergence: The International Journal of Research into New Media Technologies 26:1060–1073.
Kessler, Oliver, und Christopher Daase. 2008. From insecurity to uncertainty: Risk and the paradox of security politics. Alternatives: Global, Local, Political 33:211–232.
Kitchin, Rob. 2014. Big Data, new epistemologies and paradigm shifts. Big Data & Society 1:1–12.
Klein, Hans. 2002. ‚ICANN and Internet Governance: Leveraging Technical Coordination to Realize Global Public Policy‘. The Information Society 18(3): 193–207. https://doi.org/10.1080/01972240290074959.
Koddenbrock, Kai. 2015. Strategies of critique in international relations: From Foucault and Latour towards Marx. European Journal of International Relations 21:243–266.
Komasová, Sarah. 2021. Airport security as translation through division and movement. Online First: Social Studies of Science.
Kraft, Ina. 2018. Hybrider Krieg – zu Konjunktur, Dynamik und Funktion eines Konzepts. Zeitschrift für Außen- und Sicherheitspolitik 11:305–323.
Lagerwaard, Pieter. 2020. Flattening the international: Producing financial intelligence through a platform. Critical Studies on Security 8:160–174.
Latour, Bruno. 2010. Eine neue Soziologie für eine neue Gesellschaft: Einführung in die Akteur-Netzwerk-Theorie. Frankfurt a. M.: Suhrkamp.
Leander, Anna. 2013. Technological agency in the co-constitution of legal expertise and the US drone program. Leiden Journal of International Law 26:811–831.
Leese, Matthias. 2014. The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union. Security Dialogue 45:494–511.
Leese, Matthias. 2021. Die Sache mit der Technologie: Zur Neuordnung eines analytischen Bereichs in den Internationalen Beziehungen. Zeitschrift für Internationale Beziehungen 28:151–174.
Levy, Karen, und Bruce Schneier. 2020. Privacy threats in intimate relationships. Journal of Cybersecurity 6:1–13.
Lopez-Neira, Isabel, Trupti Patel, Simon Parkin, George Danezis, und Leonie Tanczer. 2019. ‚Internet of things‘: How abuse is getting smarter safe. The Domestic Abuse Quarterly 63:22–26.
Lyon, David. 2003. Surveillance as social sorting, computer codes and mobile bodies. In Surveillance as social sorting: Privacy, risk, and digital discrimination, Hrsg. David Lyon, 13–30. London/New York: Routledge.
Lyon, David. 2014. Surveillance, snowden, and big data: Capacities, consequences, critique. Big Data & Society 1:1–13.
Mälksoo, Maria. 2018. Countering hybrid warfare as ontological security management: The emerging practices of the EU and NATO. European Security 27:374–392.
Marx, Gary T. 2007. Rocky bottoms: Techno-fallacies of an age of information: Rocky bottoms. International Political Sociology 1:83–110.
May, Tim. 1992. The crypto anarchist manifesto. http://www.activism.net/cypherpunk/crypto-anarchy.html. Zugegriffen am 13.03.2015.
McCarthy, D. R. 2013. Technology and „the International“ or: How I learned to stop worrying and love determinism. Millennium – Journal of International Studies 41:470–490.
Millar, Jason. 2009. Core privacy, a problem for predictive data mining. In Lessons from the identity trail: Anonymity, privacy and identity in a networked society, Hrsg. Ian Kerr, Valerie M. Steeves und Carole Lucock, 103–119. New York/Toronto: Oxford University Press.
Mol, Annemarie. 2010. Actor-network theory: sensitive terms and enduring tensions. Kölner Zeitschrift für Soziologie und Sozialpsychologie. Sonderheft 50:253–269.
Monsees, Linda. 2020a. ‚A war against truth‘ – Understanding the fake news controversy. Critical Studies on Security 8:116–129.
Monsees, Linda. 2020b. Crypto-politics: Encryption and democratic practices in the digital era. Abingdon/New York: Routledge.
Mueller, Milton L. 1999. ICANN and Internet governance: Sorting through the debris of „self-regulation“. info 1:497–520.
Mueller, Milton L. 2010. Networks and states: The global politics of internet governance. Cambridge, MA: MIT Press.
Mueller, Milton L., und Farzaneh Badiei. 2020. Inventing internet governance: The historical trajectory of the phenomenon and the field. In Researching internet governance: Methods, frameworks, futures, Hrsg. Laura DeNardis, Derrick Cogburn, Nanette S. Levinson und Francesca Musiani, 53–89. Cambridge, MA: MIT Press.
Nissenbaum, Helen. 2005. Where computer security meets national security1. Ethics and Information Technology 7:61–73.
Nissenbaum, Helen Fay. 2010. Privacy in context. Technology, policy, and the integrity of social life. Stanford: Stanford Law Books.
Oyedemi, Toks Dele. 2021. Digital coloniality and ‚Next Billion Users‘: The political economy of Google Station in Nigeria. Information, Communication & Society 24:329–343.
Paragi, Beata. 2020. Digital4development? European data protection in the Global South. Third World Quarterly 42:254–273.
Passoth, Jan-Hendrik, und Nicholas J. Rowland. 2010. Actor-network state: Integrating actor-network theory and state theory. International Sociology 25:818–841.
Pinch, Trevor J., und Wiebe E. Bijker. 1984. The social construction of facts and artefacts: Or how the sociology of science and the sociology of technology might benefit each other. Social Studies of Science 14:399–441.
Plessis, Gitte du. 2017. When pathogens determine the territory: Toward a concept of non-human borders. European Journal of International Relations 24:391–413.
Reppy, J. 1990. The technological imperative in strategic thought. Journal of Peace Research 27:101–106.
Reuter, Markus. 2021. Bundeskriminalamt soll Pegasus-Trojaner gekauft haben. Netzpolitik.org https://netzpolitik.org/2021/ueberwachung-bundeskriminalamt-soll-pegasus-trojaner-gekauft-haben/. Zugegriffen am 03.11.2021.
Rider, Karina. 2018. The privacy paradox: How market privacy facilitates government surveillance. Information, Communication & Society 21:1369–1385.
Rid, Thomas. 2013. Cyber War Will Not Take Place. Oxford: Oxford University Press.
Roessler, Beate. 2008. New ways of thinking about privacy. In The Oxford handbook of political theory, Hrsg. John S. Dryzek, Bonnie Honig und Anne Phillips, 694–712. Oxford: Oxford University Press.
Rothe, Delf. 2017. Seeing like a satellite: Remote sensing and the ontological politics of environmental security. Security Dialogue 48:334–353.
Rothe, Delf. 2020. Jellyfish encounters: Science, technology and security in the Anthropocene ocean. Critical Studies on Security 8:145–159.
Saco, Diana. 2002. Cybering democracy: Public space and the Internet. Minneapolis: University of Minnesota Press.
Salter, Mark B., Hrsg. 2015. Making things international.: Circuits and motion. Minneapolis: University of Minnesota Press.
Sauer, F., und N. Schörnig. 2012. Killer drones: The „silver bullet“ of democratic warfare? Security Dialogue 43:363–380.
Saugmann Andersen, Rune. 2017. Video, algorithms and security: How digital video platforms produce post-sovereign security articulations. Security Dialogue 48:354–372.
Sayes, Edwin. 2014. Actor – Network Theory and methodology: Just what does it mean to say that nonhumans have agency? Social Studies of Science 44:134–149.
Schneckener, Ulrich. 2016. Hybrider Krieg in Zeiten der Geopolitik? Zur Deutung und Charakterisierung des Donbass-Konflikts. Politische Vierteljahresschrift 57:586–613.
Schouten, Peer. 2014. Security as controversy: Reassembling security at Amsterdam Airport. Security Dialogue 45:23–42.
Schulze, Matthias. 2015. Patterns of surveillance legitimization. The German discourse on the NSA scandal. Surveillance & Society 13:197–217.
Shires, James. 2020. Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41:82–107.
Shokooh Valle, Firuzeh. 2020. Turning fear into pleasure: Feminist resistance against online violence in the Global South. Feminist Media Studies 4:621–638.
Slupska, Julia. 2019. Safe at home: Towards a feminist critique of cybersecurity. St. Anthony’s International Review 15:83–100.
Solomon, Ty, und Brent J. Steele. 2017. ‚Micro-Moves in International Relations Theory‘. European Journal of International Relations 23(2): 267–91. https://doi.org/10.1177/1354066116634442.
Stalder, Felix. 2011. Autonomy beyond privacy? A rejoinder to Colin Bennett. Surveillance & Society 8:508–512.
Statista. 2021. E-Commerce in Deutschland: Daten und Fakten zum boomenden Onlinegeschäft. https://de.statista.com/themen/247/e-commerce/. Zugegriffen am 03.11.2021.
Steiger, Stefan, Wolf J. Schünemann, und Katharina Dimmroth. 2017. Outrage without consequences? Post-snowden discourses and governmental practice in Germany. Media and Communication 5:7–16.
Stevens, Tim. 2018. Global cybersecurity: New directions in theory and methods. Politics and Governance 6:1–4.
Tanczer, Leonie Maria. 2017. The terrorist – Hacker/hacktivist distinction: An investigation of self-identified hackers and hacktivists. In Terrorists’ use of the internet: Assessment and response, Hrsg. Maura Conway, Lee Jarvis, Orla Lehane, Stuart MacDonald und Lella Nouri, 77–92. Amsterdam: IOS Press.
Teboho Ansorge, J. 2011. Digital power in world politics: Databases, panopticons and Erwin Cuntz. Millennium – Journal of International Studies 40:65–83.
Tsing, Anna Lowenhaupt. 2015. The mushroom at the end of the world: On the possibility of life in capitalist ruins. Princeton: Princeton University Press.
Ulbricht, Lena. 2018. When big data meet securitization. Algorithmic regulation with passenger name records. European Journal for Security Research 3:139–161.
UNHCR. 2015. Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, David Kaye. UNHCR. A/HRC/29/32.
Voelkner, Nadine. 2011. Managing pathogenic circulation: Human security and the migrant health assemblage in Thailand. Security Dialogue 42:239–259.
Warren, Samuel D., und Louis D. Brandeis. 1890. The right to privacy. Harvard Law Review 4:193–220.
Westermeier, Carola. 2020. Money is data – The platformization of financial transactions. Information, Communication & Society 23:2047–2063.
Winner, Langdon. 1980. Do artifacts have politics? Daedalus 109:121–136.
Winner, Langdon. 1993. Upon opening the black box and finding it empty: Social constructivism and the philosophy of technology. Science, Technology, & Human Values 18:362–378.
Wolff, Josephine. 2016. What we talk about when we talk about cybersecurity: Security in internet governance debates. Internet Policy Review 5.
Wyatt, Sally. 2008. Technological determinism is dead: Long live technological determinism. In The handbook of science and technology studies, Hrsg. Edward J. Hackett, 165–180. Cambridge, MA: MIT Press.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Fachmedien Wiesbaden
About this entry
Cite this entry
Monsees, L. (2022). Technik, Digitalisierung und internationale Politik. In: Sauer, F., von Hauff, L., Masala, C. (eds) Handbuch Internationale Beziehungen. Springer Reference Sozialwissenschaften. VS Verlag für Sozialwissenschaften, Wiesbaden. https://doi.org/10.1007/978-3-531-19954-2_59-1
Download citation
DOI: https://doi.org/10.1007/978-3-531-19954-2_59-1
Received:
Accepted:
Published:
Publisher Name: VS Verlag für Sozialwissenschaften, Wiesbaden
Print ISBN: 978-3-531-19954-2
Online ISBN: 978-3-531-19954-2
eBook Packages: Springer Referenz Sozialwissenschaften und Recht