Skip to main content

(Un)Sicherheit hinter dem Bildschirm: Die Versicherheitlichung des Internets

  • Chapter
  • First Online:
Innere Sicherheit nach 9/11

Zusammenfassung

Dieser Beitrag analysiert die Versicherheitlichung des Internets, welche in verschiedenen gesellschaftlichen Diskursen vorangetrieben wird. Es werden die distinktiven Merkmale dieser Diskurse, insbesondere die konstruierten Bedrohungen und die darauf geforderten Sicherheitsmaßnahmen im digitalen Raum analysiert. Das Internet erzeugt aufgrund seiner technischen Eigenheiten verschiedene Unsicherheitspotenziale, die anschießend rhetorisch aufgeladen werden. Obwohl sich die Bedrohungen (Cybercrime, Cyberwar, Terrorismus, File-Sharing, Hate-Speech) unterscheiden, gleichen sich die geforderten Sicherheitsmaßnahmen auf technologischer Ebene. Sie zielen darauf ab, die dezentrale und hierarchiefreie Kommunikationsstruktur des Internets zugunsten von mehr Kontrolle zu verändern. Aus diesen Debatten ergeben sich verschiedene Entwicklungen und Trends der Versicherheitlichung und Militarisierung des Internets, die im letzten Teil diskutiert werden.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Literatur

  • Anderson, R., & Murdoch, S. (2008). Tools and technology of internet filtering. In R. Deibert, J. Palfrey, R. Rohozinski, & J. Zittrain (Hrsg.), Access denied. The practice and policy of global internet filtering (S. 57–72). Cambridge: MIT Press.

    Google Scholar 

  • Aradau, C., & Van Munster, R. (2007). Governing terrorism through risk: Taking precautions, (Un)Knowing the future. European Journal of International Relations, 13(1), 89–115.

    Article  Google Scholar 

  • Arquilla, J., & Ronfeldt, D. (2001). Networks and netwars: The future of terror, crime, and militancy. Erste Aufl. Santa Monica: Rand Corporation.

    Google Scholar 

  • Bendrath, R. (2003). The American Cyber-Angst and the real world – Any link? In R. Latham (Hrsg.), Bombs and bandwidth: The emerging relationship between information technology and security (Kap. 2). New York: The New Press.

    Google Scholar 

  • Bigo, D. (2004). Identifier, categoriser et controller: Police et logiques proactives. In L. Bonelli & G. Sainati (Hrsg.), La Machine à punir: pratiques et discourse sécuritaires (S. 56–88). Paris: L’Esprit frappeur.

    Google Scholar 

  • Bug, M., & Münch, U. (2012). Politik verändert Internet (und Medien) – Innere Sicherheit, Vorratsdatenspeicherung und die Wahrnehmung durch die Bevölkerung. In M. Schröder (Hrsg.), Die Web-Revolution. Das Internet verändert Politik und Medien (S. 147–174). München: Olzog.

    Google Scholar 

  • Buzan, B., & Hansen, L. (2009). The evolution of international security studies (1. Aufl.). Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner Publishers.

    Google Scholar 

  • Dartnell, M. (2003). Information technology and the web activism of the Revolutionary Association of the Women of Afghanistan (Rawa) – Electronic politics and new global conflict. In R. Latham (Hrsg.), Bombs and bandwidth: The emerging relationship between information technology and security (Kap. 12). New York: The New Press.

    Google Scholar 

  • Deibert, R. J. (2003). Black code: Censorship, surveillance, and the militarisation of cyberspace. Millennium – Journal of International Studies, 32(3), 501–530.

    Article  Google Scholar 

  • Deibert, R. J., & Rohozinski, R. (2012). Liberation vs. control: The future of cyberspace. Journal of Democracy, 21(4), 43–47.

    Article  Google Scholar 

  • Deibert, R. J., & Stein, J. G. (2003). Social and electronic networks in the war on terror. In R. Latham (Hrsg.), Bombs and bandwidth: The emerging relationship between information technology and security (Kap. 7). New York: The New Press.

    Google Scholar 

  • Deibert, R. J., Palfrey, J., Rohozinski, R., & Zittrain, J. (2010). Access controlled. The shaping of power, rights and rule in cyberspace. Cambridge: MIT Press.

    Google Scholar 

  • Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105–122.

    Article  Google Scholar 

  • Emmers, R. (2010). Securitization. In A. Collins (Hrsg.), Contemporary security studies (S. 109–125). Oxford: Oxford University Press.

    Google Scholar 

  • Eriksson, J. (2001). Cyberplagues, IT, and security: Threat politics in the information age. Journal of Contingencies and Crisis Management, 9(4), 211–222.

    Article  Google Scholar 

  • Eriksson, J., & Giacomello, G. (2006). The information revolution, security, and international relations: (IR)relevant theory? International Political Science Review, 27(3), 221–244.

    Article  Google Scholar 

  • Foucault, M. (1979). Discipline and punish: The birth of the prison. London: Penguin Books.

    Google Scholar 

  • Galloway, A. R. (2006). Protocol: How control exists after decentralization. Cambridge: MIT Press.

    Google Scholar 

  • Goldsmith, J., & Wu, T. (2006). Who controls the internet? Illusions of a borderless world. New York: Oxford University Press.

    Google Scholar 

  • Hansel, M. (2013). Internationale Beziehungen im Cyberspace: Macht, Institutionen und Wahrnehmung. Wiesbaden: Springer.

    Book  Google Scholar 

  • Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly, 53, 1155–1175.

    Article  Google Scholar 

  • Huysmans, J. (2011). What’s in an act? On security speech acts and little security nothings. Security Dialogue, 42(4–5), 371–383.

    Article  Google Scholar 

  • Kahler, M. (2009). Collective action and Clandestine networks: The case of Al Qaeda. In M. Kahler (Hrsg.), Networked politics: Agency, power, and governance (Kap. 6). Ithaca: Cornell University Press.

    Google Scholar 

  • Latham, A. (2002). Warfare transformed: A Braudelian perspective on the ‚Revolution in Military Affairs‘. European Journal of International Relations, 8(2), 231–266.

    Article  Google Scholar 

  • Latham, R. (2003). Bombs and bandwidth: The emerging relationship between information technology and security. New York: The New Press.

    Google Scholar 

  • Luhmann, N. (1984). Soziale Systeme. Grundriß einer allgemeinen Theorie. Frankfurt a. M.: Suhrkamp.

    Google Scholar 

  • Morozov, E. (2011). The net delusion: The dark side of internet freedom. New York: Public Affairs.

    Google Scholar 

  • Mueller, M. L. (2010). Networks and states. The global politics of internet governance. Cambridge: MIT Press.

    Book  Google Scholar 

  • Nordstrom, C. (2003). ICT and the world of smuggling. In R. Latham (Hrsg.), Bombs and bandwidth: The emerging relationship between information technology and security (Kap. 11). New York: The New Press.

    Google Scholar 

  • Raab, J., & Milward, H. B. (2003). Dark networks as problems. Journal of Public Administration Research and Theory, 13(4), 413–439.

    Article  Google Scholar 

  • Rohozinski, R. (2003). Bullets to bytes: Reflections on ICT’s and „Local“ conflict. In R. Latham (Hrsg.), Bombs and bandwidth: The emerging relationship between information technology and security (Kap. 10). New York: The New Press.

    Google Scholar 

  • Schulze, M. (2012). Die Sprache der (Un-)Sicherheit. Die Konstruktion von Bedrohung im Sicherheitspolitischen Diskurs der Bundesrepublik Deutschland. Marburg: Tectum.

    Google Scholar 

  • Schulze, M. (2015). Patterns of surveillance legitimization. The German discourse on the NSA-Scandal. Surveillance and Society, 13(2), o. S.

    Google Scholar 

  • Seltzer, W. (2010). Free speech unmoored in Copyright’s Safe Harbor: Chilling effects of the DMCA on the first amendment. Harvard Journal of Law and Technology, 24(1), 171–226.

    Google Scholar 

  • Villeneuve, N. (2010). Barriers to cooperation: An analysis of the origins of international efforts to protect children online. In R. Deibert, J. Palfrey, R. Rohozinski, & J. Zittrain (Hrsg.), Access controlled. The shaping of power, rights and rule in cyberspace (S. 55–70). Cambridge: MIT Press.

    Google Scholar 

  • Zuckerman, E. (2010). Intermediary censorship. In R. Deibert, J. Palfrey, R. Rohozinski, & J. Zittrain (Hrsg.), Access controlled. The shaping of power, rights and rule in cyberspace (S. 71–85). Cambridge: MIT Press.

    Google Scholar 

Online-Quellen

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthias Schulze M.A. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Fachmedien Wiesbaden GmbH

About this chapter

Cite this chapter

Schulze, M. (2016). (Un)Sicherheit hinter dem Bildschirm: Die Versicherheitlichung des Internets. In: Fischer, S., Masala, C. (eds) Innere Sicherheit nach 9/11. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-02638-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-02638-7_9

  • Published:

  • Publisher Name: Springer VS, Wiesbaden

  • Print ISBN: 978-3-658-02637-0

  • Online ISBN: 978-3-658-02638-7

  • eBook Packages: Social Science and Law (German Language)

Publish with us

Policies and ethics