Securitizing cyberspace: Protecting political judgment
The contemporary debate in democracies routinely refers to online misinformation, disinformation, and deception, as security-issues in need of urgent attention. Despite this pervasive discourse, however, policymakers often appear incapable of articulating what security means in this context. This pa...
Saved in:
Published in | Journal of international political theory Vol. 18; no. 3; pp. 375 - 392 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
London, England
SAGE Publications
01.10.2022
Sage Publications Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The contemporary debate in democracies routinely refers to online misinformation, disinformation, and deception, as security-issues in need of urgent attention. Despite this pervasive discourse, however, policymakers often appear incapable of articulating what security means in this context. This paper argues that we must understand the unique practical and normative challenges to security actualized by such online information threats, when they arise in a democratic context. Investigating security-making in the nexus between technology and national security through the concept of “cybersovereignty,” the paper highlights a shared blind spot in the envisaged protection of national security and democracy in cyberspace. Failing to consider the implications of non-territoriality in cyberspace, the “cybersovereign” approach runs into a cul de sac. Security-making, when understood as the continuous constitution of “cybersovereign” boundaries presumes the existence of a legitimate securitizing actor; however, this actor can only be legitimate as a product of pre-existing boundaries. In response to the problems outlined, the article proposes an alternative object of protection in the form of human judgment and, specifically, “political judgment” in the Arendtian sense. The turn to political judgment offers a conceptualization of security that can account for contemporary policy practises in relation to security and the online information threat, as well as for the human communicating subject in the interactive and essentially incomplete information and communication environment. |
---|---|
AbstractList | The contemporary debate in democracies routinely refers to online misinformation, disinformation, and deception, as security-issues in need of urgent attention. Despite this pervasive discourse, however, policymakers often appear incapable of articulating what security means in this context. This paper argues that we must understand the unique practical and normative challenges to security actualized by such online information threats, when they arise in a democratic context. Investigating security-making in the nexus between technology and national security through the concept of “cybersovereignty,” the paper highlights a shared blind spot in the envisaged protection of national security and democracy in cyberspace. Failing to consider the implications of non-territoriality in cyberspace, the “cybersovereign” approach runs into a cul de sac. Security-making, when understood as the continuous constitution of “cybersovereign” boundaries presumes the existence of a legitimate securitizing actor; however, this actor can only be legitimate as a product of pre-existing boundaries. In response to the problems outlined, the article proposes an alternative object of protection in the form of human judgment and, specifically, “political judgment” in the Arendtian sense. The turn to political judgment offers a conceptualization of security that can account for contemporary policy practises in relation to security and the online information threat, as well as for the human communicating subject in the interactive and essentially incomplete information and communication environment. |
Author | Ördén, Hedvig |
Author_xml | – sequence: 1 givenname: Hedvig orcidid: 0000-0002-5778-0824 surname: Ördén fullname: Ördén, Hedvig organization: University of Copenhagen, Denmark |
BookMark | eNp9kE1Lw0AQhhepYFv9Ad4KnlNnN_sVb1L8goKCeg6b_Shb0iTubg7115vQgqDoaYbheWaGd4YmTdtYhC4xLDEW4hoLxkBKQjAGyinhJ2g6zjIsCJkc-xE4Q7MYtwCcSianiL9a3Qef_KdvNgu9r2yIndL2ZvES2mR1GsddWw-EVvVi25vNzjbpHJ06VUd7caxz9H5_97Z6zNbPD0-r23Wmc0xSZilnkosKW4NNoYkDMDnjFFsGjDtwhSmkEkCwNo4bKrVWlXNKVgVAXlT5HF0d9nah_ehtTOW27UMznCyJAGCECpADhQ-UDm2MwbqyC36nwr7EUI7xlL_iGRzxw9E-qeTbJgXl63_N5cGMamO___lb-AK4vHcm |
CitedBy_id | crossref_primary_10_1177_09670106241253527 |
Cites_doi | 10.2307/1962880 10.1515/9780748645978-007 10.1177/0090591707304951 10.1017/CBO9781139680486 10.1080/09662839.2017.1294162 10.1007/s11948-014-9551-y 10.1111/j.1468-2478.2009.00572.x 10.1080/07393148608429608 10.1080/02684527.2019.1553706 10.1017/9781108859561 10.7249/CT468 10.1111/insp.12032 10.1080/13523260312331271849 10.1111/ips.12048 10.7208/chicago/9780226231785.001.0001 10.1093/isr/viz022 10.1080/23738871.2018.1448097 10.25300/MISQ/2013/37.2.02 10.1016/j.intell.2017.10.005 10.1080/21624887.2017.1377593 10.1080/08850607.2020.1789425 10.30966/2018.riga.2.1 10.1007/978-3-642-55007-2_5 10.7208/chicago/9780226398037.001.0001 |
ContentType | Journal Article |
Copyright | The Author(s) 2021 |
Copyright_xml | – notice: The Author(s) 2021 |
DBID | AAYXX CITATION 7UB |
DOI | 10.1177/17550882211046426 |
DatabaseName | CrossRef Worldwide Political Science Abstracts |
DatabaseTitle | CrossRef Worldwide Political Science Abstracts |
DatabaseTitleList | Worldwide Political Science Abstracts CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Political Science |
EISSN | 1755-1722 |
EndPage | 392 |
ExternalDocumentID | 10_1177_17550882211046426 10.1177_17550882211046426 |
GroupedDBID | -D5 -D~ -TM -~X 0R~ 1XV 4.4 54M 5GY 7B~ 7C. 7D- AADIR AADUE AAGLT AAJPV AAOYI AAQXI AARIX AATAA ABAWP ABCCA ABCJG ABEIX ABFXH ABGQJ ABIDT ABJNI ABKRH ABPNF ABQPY ABQXT ABRHV ABUJY ACDXX ACFUR ACFZE ACGFS ACJER ACLZU ACOFE ACOXC ACROE ACSIQ ACUIR ADDLC ADEBD ADINF ADNON ADRRZ ADTOS AEDXQ AESZF AEUHG AEVPJ AEWDL AEWHI AEXNY AFEET AFKRG AFMOU AFQAA AFUIA AGDVU AGKLV AGNHF AGNWV AHDME AHDMH AHJOV AHWHD AJUZI ALMA_UNASSIGNED_HOLDINGS ALNCK ANDLU ARTOV AUTPY AUVAJ AYPQM AZFZN BDZRT BMVBW BPACV CS3 DG~ DOPDO DV7 DV8 EBS EJD FHBDP GROUPED_SAGE_PREMIER_JOURNAL_COLLECTION H13 HVGLF HZ~ IL9 J8X O9- P.9 P.B P2P ROL S01 SASJQ SAUOL SCNPE SFC SFI SSDHQ VQ3 ZPLXX ZPPRI AAYXX ACCVC AJGYC AMNSR CITATION 7UB AAPII AJVBE |
ID | FETCH-LOGICAL-c312t-e465867b1ed1d9c2f00d35641e5056f0f9d98a7021cdf6d48ccabffa8b90039b3 |
ISSN | 1755-0882 |
IngestDate | Fri Jul 25 07:01:18 EDT 2025 Thu Apr 24 23:03:34 EDT 2025 Tue Jul 01 05:27:21 EDT 2025 Tue Jun 17 22:28:42 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Cyber sovereignty democratic theory disinformation political judgment cyberspace Hannah Arendt |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c312t-e465867b1ed1d9c2f00d35641e5056f0f9d98a7021cdf6d48ccabffa8b90039b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-5778-0824 |
PQID | 2700524708 |
PQPubID | 2039792 |
PageCount | 18 |
ParticipantIDs | proquest_journals_2700524708 crossref_primary_10_1177_17550882211046426 crossref_citationtrail_10_1177_17550882211046426 sage_journals_10_1177_17550882211046426 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20221000 2022-10-00 20221001 |
PublicationDateYYYYMMDD | 2022-10-01 |
PublicationDate_xml | – month: 10 year: 2022 text: 20221000 |
PublicationDecade | 2020 |
PublicationPlace | London, England |
PublicationPlace_xml | – name: London, England – name: London |
PublicationTitle | Journal of international political theory |
PublicationYear | 2022 |
Publisher | SAGE Publications Sage Publications Ltd |
Publisher_xml | – name: SAGE Publications – name: Sage Publications Ltd |
References | Demchak, Dombrowski 2013; 14 Habermas, McCarthy 1977; 44 Honig 1991; 85 Lambach 2020; 22 Ördén 2020 Hansen, Nissenbaum 2009; 53 Derrida 1986; 7 Kallinikos, Aaltonen, Marton 2013; 37 Dunn Cavelty 2014; 20 Frost, Michelsen 2017; 2 De Keersmaecker, Roets 2017; 65 Hellman, Wagnsson 2017; 26 Bauman, Bigo, Esteves 2014; 8 Nincic 2003; 24 Ördén 2018; 6 Omand 2018; 3 Ördén 2019; 34 Kiggins 2015; 16 Pherson, Mort Ranta, Cannon 2021; 34 Näsström 2007; 35 Nemura 2014; 7 Buzan B (bibr13-17550882211046426) 1998 bibr43-17550882211046426 bibr36-17550882211046426 bibr5-17550882211046426 bibr50-17550882211046426 Arendt H (bibr3-17550882211046426) 1973 Arendt H (bibr7-17550882211046426) 2003 bibr16-17550882211046426 Missiroli A (bibr39-17550882211046426) 2016 bibr23-17550882211046426 Christie EH (bibr15-17550882211046426) 2019 bibr30-17550882211046426 bibr10-17550882211046426 bibr51-17550882211046426 bibr57-17550882211046426 bibr4-17550882211046426 bibr24-17550882211046426 Habermas J (bibr26-17550882211046426) 1977; 44 bibr44-17550882211046426 Pamment J (bibr49-17550882211046426) 2018 bibr52-17550882211046426 Lewandowsky S (bibr37-17550882211046426) 2020 bibr42-17550882211046426 Ördén H (bibr48-17550882211046426) 2020 bibr9-17550882211046426 Arendt H (bibr1-17550882211046426) 1958 bibr58-17550882211046426 bibr12-17550882211046426 bibr19-17550882211046426 Demchak CC (bibr17-17550882211046426) 2013; 14 bibr29-17550882211046426 bibr22-17550882211046426 bibr32-17550882211046426 bibr20-17550882211046426 bibr53-17550882211046426 bibr46-17550882211046426 bibr18-17550882211046426 Walker RBJ (bibr56-17550882211046426) 1997 bibr40-17550882211046426 Nemura N (bibr41-17550882211046426) 2014; 7 Kavanagh J (bibr33-17550882211046426) 2018 Bertolin G (bibr11-17550882211046426) 2019 Hare F (bibr28-17550882211046426) 2009 bibr34-17550882211046426 bibr47-17550882211046426 bibr54-17550882211046426 bibr27-17550882211046426 bibr14-17550882211046426 Arendt H (bibr2-17550882211046426) 1972 Ivan C (bibr31-17550882211046426) 2019 bibr55-17550882211046426 May L (bibr38-17550882211046426) 1996 bibr35-17550882211046426 bibr6-17550882211046426 bibr45-17550882211046426 bibr25-17550882211046426 Dunn Cavelty M (bibr21-17550882211046426) 2015 Arendt H (bibr8-17550882211046426) 2006 |
References_xml | – volume: 44 start-page: 3 issue: 1 year: 1977 end-page: 24 article-title: Hannah Arendt’s communications concept of power publication-title: Social Research – volume: 24 start-page: 140 issue: 1 year: 2003 end-page: 160 article-title: Information warfare and democratic accountability publication-title: Contemporary Security Policy – volume: 37 start-page: 357 year: 2013 end-page: 370 article-title: The ambivalent ontology of digital artifacts publication-title: MIS Quarterly – volume: 8 start-page: 121 issue: 2 year: 2014 end-page: 144 article-title: After Snowden: Rethinking the impact of surveillance publication-title: International Political Sociology – volume: 53 start-page: 1155 issue: 4 year: 2009 end-page: 1175 article-title: Digital disaster, cyber security, and the Copenhagen school publication-title: International Studies Quarterly – volume: 35 start-page: 624 issue: 5 year: 2007 end-page: 658 article-title: The legitimacy of the people publication-title: Political Theory – volume: 34 start-page: 316 year: 2021 end-page: 341 article-title: Strategies for combating the scourge of digital disinformation publication-title: Journal of Intelligence and Counterintelligence – volume: 22 start-page: 482 issue: 3 year: 2020 end-page: 506 article-title: The territorialization of cyberspace publication-title: International Studies Review – volume: 6 start-page: 15 issue: 1 year: 2018 end-page: 32 article-title: Instilling judgement: Counter-narratives of humour, fact and logic publication-title: Critical Studies on Security – volume: 7 start-page: 7 issue: 1 year: 1986 end-page: 15 article-title: Declarations of independence publication-title: New Political Science – volume: 3 start-page: 5 issue: 1 year: 2018 end-page: 23 article-title: The threats from modern digital subversion and sedition publication-title: Journal of Cyber Policy – year: 2020 publication-title: Securing Judgement: Rethinking security and online information threats – volume: 14 year: 2013 article-title: Cyber Westphalia: Asserting state prerogatives in cyberspace publication-title: Georgetown Journal of International Affairs – volume: 16 start-page: 86 issue: 1 year: 2015 end-page: 105 article-title: Open for expansion: US policy and the purpose for the internet in the post-cold war era publication-title: International Studies Perspectives – volume: 2 start-page: 9 year: 2017 end-page: 33 article-title: Strategic communications in international relations: Practical traps and ethical puzzles publication-title: Defence Strategic Communications – volume: 7 start-page: 37 issue: 1 year: 2014 end-page: 46 article-title: A study of change of the body view in cyberculture publication-title: Journal of Socio-Informatics – volume: 65 start-page: 107 year: 2017 end-page: 110 article-title: ‘Fake news’: Incorrect, but hard to correct. The role of cognitive ability on the impact of false information on social impressions’ publication-title: Intelligence – volume: 26 start-page: 153 issue: 2 year: 2017 end-page: 170 article-title: How can European states respond to Russian information warfare? An analytical framework publication-title: European Security – volume: 34 start-page: 421 issue: 3 year: 2019 end-page: 437 article-title: Deferring substance: EU policy and the information threat publication-title: Intelligence & National Security – volume: 85 start-page: 97 issue: 1 year: 1991 end-page: 113 article-title: Declarations of Independence: Arendt and Derrida on the problem of founding a Republic publication-title: American Political Science Review – volume: 20 start-page: 701 issue: 3 year: 2014 end-page: 715 article-title: Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities publication-title: Science and Engineering Ethics – ident: bibr30-17550882211046426 doi: 10.2307/1962880 – volume-title: Responsibility and Judgement year: 2003 ident: bibr7-17550882211046426 – ident: bibr12-17550882211046426 doi: 10.1515/9780748645978-007 – ident: bibr24-17550882211046426 – ident: bibr43-17550882211046426 – ident: bibr40-17550882211046426 doi: 10.1177/0090591707304951 – volume-title: The Origins of Totalitarianism year: 1973 ident: bibr3-17550882211046426 – ident: bibr51-17550882211046426 doi: 10.1017/CBO9781139680486 – ident: bibr52-17550882211046426 – ident: bibr57-17550882211046426 – volume: 7 start-page: 37 issue: 1 year: 2014 ident: bibr41-17550882211046426 publication-title: Journal of Socio-Informatics – start-page: 81 volume-title: Responding to Cognitive Security Challenges year: 2019 ident: bibr15-17550882211046426 – ident: bibr29-17550882211046426 doi: 10.1080/09662839.2017.1294162 – ident: bibr53-17550882211046426 – volume: 44 start-page: 3 issue: 1 year: 1977 ident: bibr26-17550882211046426 publication-title: Social Research – volume-title: man Condition year: 1958 ident: bibr1-17550882211046426 – ident: bibr20-17550882211046426 doi: 10.1007/s11948-014-9551-y – ident: bibr27-17550882211046426 doi: 10.1111/j.1468-2478.2009.00572.x – volume-title: The Role of Communicators in Countering the Malicious Use of Social Media year: 2018 ident: bibr49-17550882211046426 – volume-title: Strategic Communications: East and South year: 2016 ident: bibr39-17550882211046426 – start-page: 103 volume-title: Crises of the Republic year: 1972 ident: bibr2-17550882211046426 – ident: bibr19-17550882211046426 doi: 10.1080/07393148608429608 – volume-title: Security: A New Framework for Analysis year: 1998 ident: bibr13-17550882211046426 – ident: bibr47-17550882211046426 doi: 10.1080/02684527.2019.1553706 – ident: bibr44-17550882211046426 doi: 10.1017/9781108859561 – start-page: 61 volume-title: Critical Security Studies: Concepts and Cases year: 1997 ident: bibr56-17550882211046426 – volume: 14 year: 2013 ident: bibr17-17550882211046426 publication-title: Georgetown Journal of International Affairs – start-page: 5 volume-title: ognitive Security Challenges year: 2019 ident: bibr11-17550882211046426 – ident: bibr14-17550882211046426 doi: 10.7249/CT468 – ident: bibr36-17550882211046426 – ident: bibr9-17550882211046426 – ident: bibr34-17550882211046426 doi: 10.1111/insp.12032 – volume-title: Technology and Democracy: Understanding the Influence of Online Technologies on Political Behaviour and Decision-Making year: 2020 ident: bibr37-17550882211046426 – ident: bibr42-17550882211046426 doi: 10.1080/13523260312331271849 – ident: bibr10-17550882211046426 doi: 10.1111/ips.12048 – ident: bibr4-17550882211046426 doi: 10.7208/chicago/9780226231785.001.0001 – ident: bibr5-17550882211046426 doi: 10.7208/chicago/9780226231785.001.0001 – ident: bibr35-17550882211046426 doi: 10.1093/isr/viz022 – volume-title: Truth Decay: An Initial Exploration of the Diminishing Role of Facts and Analysis in American Public Life year: 2018 ident: bibr33-17550882211046426 – volume-title: Between Past and Future year: 2006 ident: bibr8-17550882211046426 – start-page: 81 volume-title: Strategic Trends 2015 year: 2015 ident: bibr21-17550882211046426 – ident: bibr22-17550882211046426 – volume-title: Panel presented at the international studies association year: 2019 ident: bibr31-17550882211046426 – ident: bibr55-17550882211046426 – ident: bibr45-17550882211046426 doi: 10.1080/23738871.2018.1448097 – ident: bibr32-17550882211046426 doi: 10.25300/MISQ/2013/37.2.02 – ident: bibr16-17550882211046426 doi: 10.1016/j.intell.2017.10.005 – ident: bibr46-17550882211046426 doi: 10.1080/21624887.2017.1377593 – start-page: 88 volume-title: ectives on Cyber Warfare year: 2009 ident: bibr28-17550882211046426 – ident: bibr50-17550882211046426 doi: 10.1080/08850607.2020.1789425 – ident: bibr6-17550882211046426 doi: 10.7208/chicago/9780226231785.001.0001 – ident: bibr25-17550882211046426 doi: 10.30966/2018.riga.2.1 – volume-title: Hannah Arendt: Twenty Years Later year: 1996 ident: bibr38-17550882211046426 – ident: bibr18-17550882211046426 doi: 10.1007/978-3-642-55007-2_5 – year: 2020 ident: bibr48-17550882211046426 publication-title: Securing Judgement: Rethinking security and online information threats – ident: bibr23-17550882211046426 – ident: bibr54-17550882211046426 – ident: bibr58-17550882211046426 doi: 10.7208/chicago/9780226398037.001.0001 |
SSID | ssj0064858 |
Score | 2.2188535 |
SecondaryResourceType | review_article |
Snippet | The contemporary debate in democracies routinely refers to online misinformation, disinformation, and deception, as security-issues in need of urgent... |
SourceID | proquest crossref sage |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 375 |
SubjectTerms | Boundaries Concept formation Debates Information technology Internet National security Policy making Political communication Sovereignty Territoriality Threats |
Title | Securitizing cyberspace: Protecting political judgment |
URI | https://journals.sagepub.com/doi/full/10.1177/17550882211046426 https://www.proquest.com/docview/2700524708 |
Volume | 18 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFA46X3wRrzhv9EEQhErbpGnim4gigjJBQZ9G0yRjIFNmJ7hf70mTtNM5cb6UkrUpy3dybjkXhA655rmgWoYJ5jIkQBMhZ0KFVOQKJ1nGRGISnG9u6dUDuX5MH32vdpddUoqTYvxjXsl_UIUxwNVkyc6BbD0pDMA94AtXQBiuf8LYOsvL_rjKnP0QJnHSeMXByu_Y-gtVrrkNcTNlIkayV0e6TGuk_S_ewea10ufvV9CYo3VOh9IesQ-s7JLv_d6kAwFsTx-K5nlelqah0bStSGjGQLeZwSgbO7rietg2P3ECFNvmdtO8uTodNjObjxnDk4Dx80Md7G_yqY4ajF1p8qkpFtESkFWStNDS2VPn7saLYkpY1aC1_ofuWNtU3Jqa5Kti0lgbEwF-lc5xv4pWHDTBmUV-DS2owTpa7XhgAseYNxCdpISgoYTToKGDoAY08HSwiR4uL-7Pr0LXESMscJyUoSKgMNJMxErGkheJjiKJU0piZRRZHWkuOcsz0NsKqakkDPan0DpnwjisucBbqDV4GahtFAiegaaGc8pwRkjOmY5UVBBMRUQLwkgbRX45uoUrF2-6ljx3Z8LQRsf1K6-2VspvD-_5Ne66LfXWNVEQaUKyiLXRkVn35qeZE-3M89VdtNxsgT3UKocjtQ9aZSkOHO18An-sa3Y |
linkProvider | SAGE Publications |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60PehF6wurVXsQBGFlH2k28VZEqdoWhRYUD8tmk4gPatHtwf56M7vZ1jfidZMJ2Zk8vkzmmwDscs1jQbV0_IBLh5gx4XAmlENFrAI_DJnwkeDc6dJWn5xdNa5sVCVyYawGXw4wrMr0KFusJ7MbeeJhAzGFjwcXYsAznYUyQzZCCcrN64vLTrEOU8Ky1zlRwEEJe6f5bSMfd6Up1HwX3ZVtOCeLcFN0NY8zeTgYpaaX409ZHP_3LxVYsDi03swHzhLMqMEyVGw0nCmwc34FaO6RT-_GZpOrJ68C2Zlxog7rF3mKB_w8nMjdj-QtOhxXoX9y3DtqOfaxBScJPD91FDFYhIbCU9KTPPG168qgQYmnECNpV3PJWRwaSJBITSVhxvRC65gJ9IVyEaxBafA0UOtQF-ZkalBkTM3hl5CYM-0qNyEBFS5NCCNVcAtlR4nNRI4PYjxGnk0-_kUxVdifiAzzNBy_Va4VFowKG0R4wd7wSeiyKuyhQaZFPza08eeaOzDX6nXaUfu0e74J8z5yJLKIvxqU0ueR2jLIJRXbdoi-Adsg3bA |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60BfHiW6xW7UEQhNXdbJpNvIla6qtUsFBPy2aTiA9q0e3B_noz3Wx9i3jdZMJsMsl8mcwDYEsYkUhmlEdCoTxqZcITXGqPyUSHJIq4JBjgfNFizQ497da7zuCGsTBuBp930a3KcjQ6rHF395XZc2-Me1blIa4geHmhFkCzSShbRUVICcoH1-3Li-IsZpSPKnQigYcU7l3z20E-aqY3uPnOw2ukdBqzEBfs5r4m97uDzHI6_JTJ8f__MwczDo_WDnIBmocJ3VuAOecVZxvc3l8Ellvms9uhVXa19EVilGaS6v1aO0_1gJ_7Y7q7gbpBw-MSdBrHV4dNzxVd8NIwIJmnqcUkLJKBVoESKTG-r8I6o4FGrGR8I5TgSWShQaoMU5RbEZDGJFyiTVTIcBlKvceeXoGatDdUiyYTZi_BlCaCG1_7KQ2Z9FlKOa2AX0x4nLqM5FgY4yEOXBLyLxNTgZ0xST9Px_Fb52qxinGxDjE-tNcJjXxegW1clLemHwda_XPPTZhqHzXi85PW2RpMEwyVGDn-VaGUPQ30ugUwmdxwUvoKXgjgJQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securitizing+cyberspace%3A+Protecting+political+judgment&rft.jtitle=Journal+of+international+political+theory&rft.au=%C3%96rd%C3%A9n%2C+Hedvig&rft.date=2022-10-01&rft.issn=1755-0882&rft.eissn=1755-1722&rft.volume=18&rft.issue=3&rft.spage=375&rft.epage=392&rft_id=info:doi/10.1177%2F17550882211046426&rft.externalDBID=n%2Fa&rft.externalDocID=10_1177_17550882211046426 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1755-0882&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1755-0882&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1755-0882&client=summon |