IDEAS home Printed from https://ideas.repec.org/a/cog/poango/v6y2018i2p31-40.html
   My bibliography  Save this article

Enacting Expertise: Ritual and Risk in Cybersecurity

Author

Listed:
  • James Shires

    (Department of Politics and International Relations, University of Oxford, UK)

Abstract

This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges. It proposes that cybersecurity expertise is best understood as a skilled performance which satisfies decision-makers’ demands for risk management. This alternative understanding of cybersecurity expertise enables investigation of the types of performance involved in key events which congregate experts together: cybersecurity conferences. The article makes two key claims, which are empirically based on participant observation of cybersecurity conferences in the Middle East. First, that cybersecurity conferences are ritualized activities which create an expert community across international boundaries despite significant political and social differences. Second, that the ritualized physical separation between disinterested knowledge-sharing and commercial advertisement at these conferences enacts an ideal of “pure” cybersecurity expertise rarely encountered elsewhere, without which the claims to knowledge made by cybersecurity experts would be greatly undermined. The approach taken in this article is thus a new direction for cybersecurity research, with significant implications for other areas of international politics.

Suggested Citation

  • James Shires, 2018. "Enacting Expertise: Ritual and Risk in Cybersecurity," Politics and Governance, Cogitatio Press, vol. 6(2), pages 31-40.
  • Handle: RePEc:cog:poango:v:6:y:2018:i:2:p:31-40
    as

    Download full text from publisher

    File URL: https://www.cogitatiopress.com/politicsandgovernance/article/view/1329
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Tim Stevens, 2018. "Global Cybersecurity: New Directions in Theory and Methods," Politics and Governance, Cogitatio Press, vol. 6(2), pages 1-4.
    2. Ola Michalec & Sveta Milyaeva & Awais Rashid, 2022. "Reconfiguring governance: How cyber security regulations are reconfiguring water governance," Regulation & Governance, John Wiley & Sons, vol. 16(4), pages 1325-1342, October.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:cog:poango:v:6:y:2018:i:2:p:31-40. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: António Vieira (email available below). General contact details of provider: https://www.cogitatiopress.com/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.