Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties

Science, Technology, and Human Values 46 (1):81-111 (2021)
  Copy   BIBTEX

Abstract

Information security governance has become an elusive goal and a murky concept. This paper problematizes both information security governance and the broader concept of governance. What does it mean to govern information security, or for that matter, anything? Why have information technologies proven difficult to govern? And what assurances can governance provide for the billions of people who rely on information technologies every day? Drawing together several distinct bodies of literature—including multiple strands of governance theory, actor–network theory, and scholarship on sociotechnical regimes—this paper conceptualizes networked action on a spectrum from uncertain governance to governing uncertainty. I advance a twofold argument. First, I argue that networks can better govern uncertainty as they become more able not only to enroll actors in a collective agenda, but also to cut ties with those who seek to undermine that agenda. And second, I argue that the dominant conception of information security governance, which emphasizes governing uncertainty through risk management, in practice devolves to uncertain governance. This is largely because information technologies have evolved toward greater connectedness—and with it, greater vulnerability—creating a regime of insecurity. This evolution is illustrated using the history of the US government’s efforts to govern information security.

Other Versions

No versions found

Links

PhilArchive

    This entry is not archived by us. If you are the author and have permission from the publisher, we recommend that you archive it. Many publishers automatically grant permission to authors to archive pre-prints. By uploading a copy of your work, you will enable us to better index it, making it easier to find.

    Upload a copy of this work     Papers currently archived: 103,090

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

De droom van Beccaria: Over het strafrecht en de nodale veiligheidszorg.Klaas Rozemond - 2010 - Netherlands Journal of Legal Philosophy 39 (2):158-175.
Control mechanisms in information security: a principal agent perspective.Tejaswini Herath & H. Raghav Rao - 2010 - International Journal of Business Governance and Ethics 5 (1/2):2.

Analytics

Added to PP
2020-11-24

Downloads
20 (#1,081,413)

6 months
6 (#571,493)

Historical graph of downloads
How can I increase my downloads?