Javascript must be enabled to continue!
Enacting Expertise: Ritual and Risk in Cybersecurity
View through CrossRef
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges. It proposes that cybersecurity expertise is best understood as a skilled performance which satisfies decision-makers’ demands for risk management. This alternative understanding of cybersecurity expertise enables investigation of the types of performance involved in key events which congregate experts together: cybersecurity conferences. The article makes two key claims, which are empirically based on participant observation of cybersecurity conferences in the Middle East. First, that cybersecurity conferences are ritualized activities which create an expert community across international boundaries despite significant political and social differences. Second, that the ritualized physical separation between disinterested knowledge-sharing and commercial advertisement at these conferences enacts an ideal of “pure” cybersecurity expertise rarely encountered elsewhere, without which the claims to knowledge made by cybersecurity experts would be greatly undermined. The approach taken in this article is thus a new direction for cybersecurity research, with significant implications for other areas of international politics.
Title: Enacting Expertise: Ritual and Risk in Cybersecurity
Description:
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges.
It proposes that cybersecurity expertise is best understood as a skilled performance which satisfies decision-makers’ demands for risk management.
This alternative understanding of cybersecurity expertise enables investigation of the types of performance involved in key events which congregate experts together: cybersecurity conferences.
The article makes two key claims, which are empirically based on participant observation of cybersecurity conferences in the Middle East.
First, that cybersecurity conferences are ritualized activities which create an expert community across international boundaries despite significant political and social differences.
Second, that the ritualized physical separation between disinterested knowledge-sharing and commercial advertisement at these conferences enacts an ideal of “pure” cybersecurity expertise rarely encountered elsewhere, without which the claims to knowledge made by cybersecurity experts would be greatly undermined.
The approach taken in this article is thus a new direction for cybersecurity research, with significant implications for other areas of international politics.
Related Results
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Purpose
The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challe...
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
<div class="section abstract">
<div class="htmlview paragraph">This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and ...
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
<div class="section abstract">
<div class="htmlview paragraph">This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and ...
Cybersecurity in Digital Transformation in Healthcare : A Systematic Literature Review (Preprint)
Cybersecurity in Digital Transformation in Healthcare : A Systematic Literature Review (Preprint)
BACKGROUND
In an era of rapid digital transformation, the healthcare sector stands as a beacon of innovation, leveraging the latest technologies to improve ...
Digital access and inclusion for SMEs in the financial services industry through Cybersecurity GRC: A pathway to safer digital ecosystems
Digital access and inclusion for SMEs in the financial services industry through Cybersecurity GRC: A pathway to safer digital ecosystems
The integration of digital technologies into the financial services industry has revolutionized how small and medium-sized enterprises (SMEs) access and utilize financial services....
Smart home cybersecurity awareness and behavioral incentives
Smart home cybersecurity awareness and behavioral incentives
Purpose
Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studi...
CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA
CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA
This paper provides a comprehensive review and comparative analysis of cybersecurity challenges and strategies within the financial sectors of the United States of America (USA) an...
Cybersecurity in cars: history of digitalization of cars, current status of the problem, sustainable development goals and standards
Cybersecurity in cars: history of digitalization of cars, current status of the problem, sustainable development goals and standards
Problem. At present, information security issues are a priority. The need for specialists with appropriate qualifications is growing, and educational institutions face the task of ...

