Author: Imke Köhler
Publisher: Walter de Gruyter GmbH & Co KG
ISBN: 3110626055
Category : Political Science
Languages : en
Pages : 294
Book Description
There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat, an investigation of the relationship between language and security and of how discourse creates the scope of possibility for political action. In particular, the book scrutinizes and compares the security narratives of the former US presidents George W. Bush and Barack Obama. It shows how their framings of identity, i.e., of the American ‘self’ and the enemy ‘other’ facilitated a certain construction of threat that shaped the presidents’ detention and interrogation policies. By defining what was necessary in the name of national security, Bush’s narrative justified the operation of the detention center at Guantanamo Bay and rendered the mistreatment of detainees possible – a situation that would have otherwise been illegal. Bush’s framings therefore enabled legal limits to be pushed and made the violation of rules appear legitimate. Obama, in contrast, constructed a threat scenario that required an end to rule violations, and the closure of Guantanamo for security reasons. According to this narrative, a return to the rule of law was imperative if the American people were to be kept safe. However, Obama’s framing was continually challenged, and it was never able to dominate public discourse. Consequently, Framing the Threat argues Obama was unable to implement the policy changes he had announced.
Framing the Threat
Author: Imke Köhler
Publisher: Walter de Gruyter GmbH & Co KG
ISBN: 3110622351
Category : Political Science
Languages : en
Pages : 622
Book Description
There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat, an investigation of the relationship between language and security and of how discourse creates the scope of possibility for political action. In particular, the book scrutinizes and compares the security narratives of the former US presidents George W. Bush and Barack Obama. It shows how their framings of identity, i.e., of the American ‘self’ and the enemy ‘other’ facilitated a certain construction of threat that shaped the presidents’ detention and interrogation policies. By defining what was necessary in the name of national security, Bush’s narrative justified the operation of the detention center at Guantanamo Bay and rendered the mistreatment of detainees possible – a situation that would have otherwise been illegal. Bush’s framings therefore enabled legal limits to be pushed and made the violation of rules appear legitimate. Obama, in contrast, constructed a threat scenario that required an end to rule violations, and the closure of Guantanamo for security reasons. According to this narrative, a return to the rule of law was imperative if the American people were to be kept safe. However, Obama’s framing was continually challenged, and it was never able to dominate public discourse. Consequently, Framing the Threat argues Obama was unable to implement the policy changes he had announced.
Publisher: Walter de Gruyter GmbH & Co KG
ISBN: 3110622351
Category : Political Science
Languages : en
Pages : 622
Book Description
There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat, an investigation of the relationship between language and security and of how discourse creates the scope of possibility for political action. In particular, the book scrutinizes and compares the security narratives of the former US presidents George W. Bush and Barack Obama. It shows how their framings of identity, i.e., of the American ‘self’ and the enemy ‘other’ facilitated a certain construction of threat that shaped the presidents’ detention and interrogation policies. By defining what was necessary in the name of national security, Bush’s narrative justified the operation of the detention center at Guantanamo Bay and rendered the mistreatment of detainees possible – a situation that would have otherwise been illegal. Bush’s framings therefore enabled legal limits to be pushed and made the violation of rules appear legitimate. Obama, in contrast, constructed a threat scenario that required an end to rule violations, and the closure of Guantanamo for security reasons. According to this narrative, a return to the rule of law was imperative if the American people were to be kept safe. However, Obama’s framing was continually challenged, and it was never able to dominate public discourse. Consequently, Framing the Threat argues Obama was unable to implement the policy changes he had announced.
Framing the Threat
Author: Imke Köhler
Publisher: Walter de Gruyter GmbH & Co KG
ISBN: 3110626055
Category : Political Science
Languages : en
Pages : 294
Book Description
There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat, an investigation of the relationship between language and security and of how discourse creates the scope of possibility for political action. In particular, the book scrutinizes and compares the security narratives of the former US presidents George W. Bush and Barack Obama. It shows how their framings of identity, i.e., of the American ‘self’ and the enemy ‘other’ facilitated a certain construction of threat that shaped the presidents’ detention and interrogation policies. By defining what was necessary in the name of national security, Bush’s narrative justified the operation of the detention center at Guantanamo Bay and rendered the mistreatment of detainees possible – a situation that would have otherwise been illegal. Bush’s framings therefore enabled legal limits to be pushed and made the violation of rules appear legitimate. Obama, in contrast, constructed a threat scenario that required an end to rule violations, and the closure of Guantanamo for security reasons. According to this narrative, a return to the rule of law was imperative if the American people were to be kept safe. However, Obama’s framing was continually challenged, and it was never able to dominate public discourse. Consequently, Framing the Threat argues Obama was unable to implement the policy changes he had announced.
Publisher: Walter de Gruyter GmbH & Co KG
ISBN: 3110626055
Category : Political Science
Languages : en
Pages : 294
Book Description
There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat, an investigation of the relationship between language and security and of how discourse creates the scope of possibility for political action. In particular, the book scrutinizes and compares the security narratives of the former US presidents George W. Bush and Barack Obama. It shows how their framings of identity, i.e., of the American ‘self’ and the enemy ‘other’ facilitated a certain construction of threat that shaped the presidents’ detention and interrogation policies. By defining what was necessary in the name of national security, Bush’s narrative justified the operation of the detention center at Guantanamo Bay and rendered the mistreatment of detainees possible – a situation that would have otherwise been illegal. Bush’s framings therefore enabled legal limits to be pushed and made the violation of rules appear legitimate. Obama, in contrast, constructed a threat scenario that required an end to rule violations, and the closure of Guantanamo for security reasons. According to this narrative, a return to the rule of law was imperative if the American people were to be kept safe. However, Obama’s framing was continually challenged, and it was never able to dominate public discourse. Consequently, Framing the Threat argues Obama was unable to implement the policy changes he had announced.
Threat Modeling
Author: Adam Shostack
Publisher: John Wiley & Sons
ISBN: 1118810058
Category : Computers
Languages : en
Pages : 624
Book Description
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Publisher: John Wiley & Sons
ISBN: 1118810058
Category : Computers
Languages : en
Pages : 624
Book Description
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
News Framing Effects
Author: Sophie Lecheler
Publisher: Routledge
ISBN: 1351802550
Category : Social Science
Languages : en
Pages : 144
Book Description
News Framing Effects is a guide to framing effects theory, one of the most prominent theories in media and communication science. Rooted in both psychology and sociology, framing effects theory describes the ability of news media to influence people’s attitudes and behaviors by subtle changes to how they report on an issue. The book gives expert commentary on this complex theoretical notion alongside practical instruction on how to apply it to research. The book’s structure mirrors the steps a scholar might take to design a framing study. The first chapter establishes a working definition of news framing effects theory. The following chapters focus on how to identify the independent variable (i.e., the "news frame") and the dependent variable (i.e., the "framing effect"). The book then considers the potential limits or enhancements of the proposed effects (i.e., the "moderators") and how framing effects might emerge (i.e., the "mediators"). Finally, it asks how strong these effects are likely to be. The final chapter considers news framing research in the light of a rapidly and fundamentally changing news and information market, in which technologies, platforms, and changing consumption patterns are forcing assumptions at the core of framing effects theory to be re-evaluated.
Publisher: Routledge
ISBN: 1351802550
Category : Social Science
Languages : en
Pages : 144
Book Description
News Framing Effects is a guide to framing effects theory, one of the most prominent theories in media and communication science. Rooted in both psychology and sociology, framing effects theory describes the ability of news media to influence people’s attitudes and behaviors by subtle changes to how they report on an issue. The book gives expert commentary on this complex theoretical notion alongside practical instruction on how to apply it to research. The book’s structure mirrors the steps a scholar might take to design a framing study. The first chapter establishes a working definition of news framing effects theory. The following chapters focus on how to identify the independent variable (i.e., the "news frame") and the dependent variable (i.e., the "framing effect"). The book then considers the potential limits or enhancements of the proposed effects (i.e., the "moderators") and how framing effects might emerge (i.e., the "mediators"). Finally, it asks how strong these effects are likely to be. The final chapter considers news framing research in the light of a rapidly and fundamentally changing news and information market, in which technologies, platforms, and changing consumption patterns are forcing assumptions at the core of framing effects theory to be re-evaluated.
Threat Politics
Author: Johan Eriksson
Publisher: Routledge
ISBN: 1351735527
Category : Political Science
Languages : en
Pages : 213
Book Description
This title was first published in 2001. Aiming to open up a new perspective on the study of threats and risks, this text combines insights from the thematically linked but academically disassociated fields of security studies, risk studies and crisis management studies. It provides case studies of key agents, arenas and issues involved in the politics of threats. In addition to the traditional unit of analysis - national governments - this book takes into account non-governmental agents, including public opinion, the media and business.
Publisher: Routledge
ISBN: 1351735527
Category : Political Science
Languages : en
Pages : 213
Book Description
This title was first published in 2001. Aiming to open up a new perspective on the study of threats and risks, this text combines insights from the thematically linked but academically disassociated fields of security studies, risk studies and crisis management studies. It provides case studies of key agents, arenas and issues involved in the politics of threats. In addition to the traditional unit of analysis - national governments - this book takes into account non-governmental agents, including public opinion, the media and business.
Understanding Securitisation Theory
Author: Thierry Balzacq
Publisher: Routledge
ISBN: 1135246149
Category : History
Languages : en
Pages : 273
Book Description
This volume aims to provide a new framework for the analysis of securitization processes, increasing our understanding of how security issues emerge, evolve and dissolve. Securitisation theory has become one of the key components of security studies and IR courses in recent years, and this book represents the first attempt to provide an integrated and rigorous overview of securitization practices within a coherent framework. To do so, it organizes securitization around three core assumptions which make the theory applicable to empirical studies: the centrality of audience, the co-dependency of agency and context and the structuring force of the dispositif. These assumptions are then investigated through discourse analysis, process-tracing, ethnographic research, and content analysis and discussed in relation to extensive case studies. This innovative new book will be of much interest to students of securitisation and critical security studies, as well as IR theory and sociology. Thierry Balzacq is holder of the Tocqueville Chair on Security Policies and Professor at the University of Namur. He is Research Director at the University of Louvain and Associate Researcher at the Centre for European Studies at Sciences Po Paris.
Publisher: Routledge
ISBN: 1135246149
Category : History
Languages : en
Pages : 273
Book Description
This volume aims to provide a new framework for the analysis of securitization processes, increasing our understanding of how security issues emerge, evolve and dissolve. Securitisation theory has become one of the key components of security studies and IR courses in recent years, and this book represents the first attempt to provide an integrated and rigorous overview of securitization practices within a coherent framework. To do so, it organizes securitization around three core assumptions which make the theory applicable to empirical studies: the centrality of audience, the co-dependency of agency and context and the structuring force of the dispositif. These assumptions are then investigated through discourse analysis, process-tracing, ethnographic research, and content analysis and discussed in relation to extensive case studies. This innovative new book will be of much interest to students of securitisation and critical security studies, as well as IR theory and sociology. Thierry Balzacq is holder of the Tocqueville Chair on Security Policies and Professor at the University of Namur. He is Research Director at the University of Louvain and Associate Researcher at the Centre for European Studies at Sciences Po Paris.
Constructions of Terrorism
Author: Michael Stohl
Publisher: Univ of California Press
ISBN: 0520294165
Category : Business & Economics
Languages : en
Pages : 252
Book Description
This publication is part of the Constructions of Terrorism Research Project being carried out through a partnership between TRENDS Research & Advisory, Abu Dhabi, UAE, and the Orfalea Center for Global and International Studies, University of California, Santa Barbara.
Publisher: Univ of California Press
ISBN: 0520294165
Category : Business & Economics
Languages : en
Pages : 252
Book Description
This publication is part of the Constructions of Terrorism Research Project being carried out through a partnership between TRENDS Research & Advisory, Abu Dhabi, UAE, and the Orfalea Center for Global and International Studies, University of California, Santa Barbara.
Cyber-Security and Threat Politics
Author: Myriam Dunn Cavelty
Publisher: Routledge
ISBN: 1134086695
Category : History
Languages : en
Pages : 336
Book Description
This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.
Publisher: Routledge
ISBN: 1134086695
Category : History
Languages : en
Pages : 336
Book Description
This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.
Risk Discourse and Responsibility
Author: Annelie Ädel
Publisher: John Benjamins Publishing Company
ISBN: 9027249733
Category : Language Arts & Disciplines
Languages : en
Pages : 270
Book Description
The widespread view that risk is highly relevant in late modern societies has also meant that the very study of risk has become central in many areas of social studies. The key aim of this book is to establish Risk Discourse as a field of research of its own in language studies. Risk Discourse is introduced as a field that not only targets elements of risk, safety and security, but crucially requires aspects of responsibility for in-depth analysis. Providing a rich illustration of ways in which risk and responsibility can serve as analytical tools, the volume brings together scholars from different disciplines within the study of language. An Introduction and an Epilogue highlight the intricate relationship between risk and responsibility. Part 1 deals with expert and lay perspectives on risk; Part 2 with emerging genres for risk discourse; Part 3 with risk and technology and Part 4 with ways of managing risk. The topics covered – such as COVID-19, nuclear energy, machine translation, terrorism – are socially pertinent and timely.
Publisher: John Benjamins Publishing Company
ISBN: 9027249733
Category : Language Arts & Disciplines
Languages : en
Pages : 270
Book Description
The widespread view that risk is highly relevant in late modern societies has also meant that the very study of risk has become central in many areas of social studies. The key aim of this book is to establish Risk Discourse as a field of research of its own in language studies. Risk Discourse is introduced as a field that not only targets elements of risk, safety and security, but crucially requires aspects of responsibility for in-depth analysis. Providing a rich illustration of ways in which risk and responsibility can serve as analytical tools, the volume brings together scholars from different disciplines within the study of language. An Introduction and an Epilogue highlight the intricate relationship between risk and responsibility. Part 1 deals with expert and lay perspectives on risk; Part 2 with emerging genres for risk discourse; Part 3 with risk and technology and Part 4 with ways of managing risk. The topics covered – such as COVID-19, nuclear energy, machine translation, terrorism – are socially pertinent and timely.
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
Author: Laing, Christopher
Publisher: IGI Global
ISBN: 1466626909
Category : Computers
Languages : en
Pages : 450
Book Description
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.
Publisher: IGI Global
ISBN: 1466626909
Category : Computers
Languages : en
Pages : 450
Book Description
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.