Securitizing cyberspace: Protecting political judgment

The contemporary debate in democracies routinely refers to online misinformation, disinformation, and deception, as security-issues in need of urgent attention. Despite this pervasive discourse, however, policymakers often appear incapable of articulating what security means in this context. This pa...

Full description

Saved in:
Bibliographic Details
Published inJournal of international political theory Vol. 18; no. 3; pp. 375 - 392
Main Author Ördén, Hedvig
Format Journal Article
LanguageEnglish
Published London, England SAGE Publications 01.10.2022
Sage Publications Ltd
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The contemporary debate in democracies routinely refers to online misinformation, disinformation, and deception, as security-issues in need of urgent attention. Despite this pervasive discourse, however, policymakers often appear incapable of articulating what security means in this context. This paper argues that we must understand the unique practical and normative challenges to security actualized by such online information threats, when they arise in a democratic context. Investigating security-making in the nexus between technology and national security through the concept of “cybersovereignty,” the paper highlights a shared blind spot in the envisaged protection of national security and democracy in cyberspace. Failing to consider the implications of non-territoriality in cyberspace, the “cybersovereign” approach runs into a cul de sac. Security-making, when understood as the continuous constitution of “cybersovereign” boundaries presumes the existence of a legitimate securitizing actor; however, this actor can only be legitimate as a product of pre-existing boundaries. In response to the problems outlined, the article proposes an alternative object of protection in the form of human judgment and, specifically, “political judgment” in the Arendtian sense. The turn to political judgment offers a conceptualization of security that can account for contemporary policy practises in relation to security and the online information threat, as well as for the human communicating subject in the interactive and essentially incomplete information and communication environment.
AbstractList The contemporary debate in democracies routinely refers to online misinformation, disinformation, and deception, as security-issues in need of urgent attention. Despite this pervasive discourse, however, policymakers often appear incapable of articulating what security means in this context. This paper argues that we must understand the unique practical and normative challenges to security actualized by such online information threats, when they arise in a democratic context. Investigating security-making in the nexus between technology and national security through the concept of “cybersovereignty,” the paper highlights a shared blind spot in the envisaged protection of national security and democracy in cyberspace. Failing to consider the implications of non-territoriality in cyberspace, the “cybersovereign” approach runs into a cul de sac. Security-making, when understood as the continuous constitution of “cybersovereign” boundaries presumes the existence of a legitimate securitizing actor; however, this actor can only be legitimate as a product of pre-existing boundaries. In response to the problems outlined, the article proposes an alternative object of protection in the form of human judgment and, specifically, “political judgment” in the Arendtian sense. The turn to political judgment offers a conceptualization of security that can account for contemporary policy practises in relation to security and the online information threat, as well as for the human communicating subject in the interactive and essentially incomplete information and communication environment.
Author Ördén, Hedvig
Author_xml – sequence: 1
  givenname: Hedvig
  orcidid: 0000-0002-5778-0824
  surname: Ördén
  fullname: Ördén, Hedvig
  organization: University of Copenhagen, Denmark
BookMark eNp9kE1Lw0AQhhepYFv9Ad4KnlNnN_sVb1L8goKCeg6b_Shb0iTubg7115vQgqDoaYbheWaGd4YmTdtYhC4xLDEW4hoLxkBKQjAGyinhJ2g6zjIsCJkc-xE4Q7MYtwCcSianiL9a3Qef_KdvNgu9r2yIndL2ZvES2mR1GsddWw-EVvVi25vNzjbpHJ06VUd7caxz9H5_97Z6zNbPD0-r23Wmc0xSZilnkosKW4NNoYkDMDnjFFsGjDtwhSmkEkCwNo4bKrVWlXNKVgVAXlT5HF0d9nah_ehtTOW27UMznCyJAGCECpADhQ-UDm2MwbqyC36nwr7EUI7xlL_iGRzxw9E-qeTbJgXl63_N5cGMamO___lb-AK4vHcm
CitedBy_id crossref_primary_10_1177_09670106241253527
Cites_doi 10.2307/1962880
10.1515/9780748645978-007
10.1177/0090591707304951
10.1017/CBO9781139680486
10.1080/09662839.2017.1294162
10.1007/s11948-014-9551-y
10.1111/j.1468-2478.2009.00572.x
10.1080/07393148608429608
10.1080/02684527.2019.1553706
10.1017/9781108859561
10.7249/CT468
10.1111/insp.12032
10.1080/13523260312331271849
10.1111/ips.12048
10.7208/chicago/9780226231785.001.0001
10.1093/isr/viz022
10.1080/23738871.2018.1448097
10.25300/MISQ/2013/37.2.02
10.1016/j.intell.2017.10.005
10.1080/21624887.2017.1377593
10.1080/08850607.2020.1789425
10.30966/2018.riga.2.1
10.1007/978-3-642-55007-2_5
10.7208/chicago/9780226398037.001.0001
ContentType Journal Article
Copyright The Author(s) 2021
Copyright_xml – notice: The Author(s) 2021
DBID AAYXX
CITATION
7UB
DOI 10.1177/17550882211046426
DatabaseName CrossRef
Worldwide Political Science Abstracts
DatabaseTitle CrossRef
Worldwide Political Science Abstracts
DatabaseTitleList Worldwide Political Science Abstracts

CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Political Science
EISSN 1755-1722
EndPage 392
ExternalDocumentID 10_1177_17550882211046426
10.1177_17550882211046426
GroupedDBID -D5
-D~
-TM
-~X
0R~
1XV
4.4
54M
5GY
7B~
7C.
7D-
AADIR
AADUE
AAGLT
AAJPV
AAOYI
AAQXI
AARIX
AATAA
ABAWP
ABCCA
ABCJG
ABEIX
ABFXH
ABGQJ
ABIDT
ABJNI
ABKRH
ABPNF
ABQPY
ABQXT
ABRHV
ABUJY
ACDXX
ACFUR
ACFZE
ACGFS
ACJER
ACLZU
ACOFE
ACOXC
ACROE
ACSIQ
ACUIR
ADDLC
ADEBD
ADINF
ADNON
ADRRZ
ADTOS
AEDXQ
AESZF
AEUHG
AEVPJ
AEWDL
AEWHI
AEXNY
AFEET
AFKRG
AFMOU
AFQAA
AFUIA
AGDVU
AGKLV
AGNHF
AGNWV
AHDME
AHDMH
AHJOV
AHWHD
AJUZI
ALMA_UNASSIGNED_HOLDINGS
ALNCK
ANDLU
ARTOV
AUTPY
AUVAJ
AYPQM
AZFZN
BDZRT
BMVBW
BPACV
CS3
DG~
DOPDO
DV7
DV8
EBS
EJD
FHBDP
GROUPED_SAGE_PREMIER_JOURNAL_COLLECTION
H13
HVGLF
HZ~
IL9
J8X
O9-
P.9
P.B
P2P
ROL
S01
SASJQ
SAUOL
SCNPE
SFC
SFI
SSDHQ
VQ3
ZPLXX
ZPPRI
AAYXX
ACCVC
AJGYC
AMNSR
CITATION
7UB
AAPII
AJVBE
ID FETCH-LOGICAL-c312t-e465867b1ed1d9c2f00d35641e5056f0f9d98a7021cdf6d48ccabffa8b90039b3
ISSN 1755-0882
IngestDate Fri Jul 25 07:01:18 EDT 2025
Thu Apr 24 23:03:34 EDT 2025
Tue Jul 01 05:27:21 EDT 2025
Tue Jun 17 22:28:42 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Cyber sovereignty
democratic theory
disinformation
political judgment
cyberspace
Hannah Arendt
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c312t-e465867b1ed1d9c2f00d35641e5056f0f9d98a7021cdf6d48ccabffa8b90039b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5778-0824
PQID 2700524708
PQPubID 2039792
PageCount 18
ParticipantIDs proquest_journals_2700524708
crossref_primary_10_1177_17550882211046426
crossref_citationtrail_10_1177_17550882211046426
sage_journals_10_1177_17550882211046426
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20221000
2022-10-00
20221001
PublicationDateYYYYMMDD 2022-10-01
PublicationDate_xml – month: 10
  year: 2022
  text: 20221000
PublicationDecade 2020
PublicationPlace London, England
PublicationPlace_xml – name: London, England
– name: London
PublicationTitle Journal of international political theory
PublicationYear 2022
Publisher SAGE Publications
Sage Publications Ltd
Publisher_xml – name: SAGE Publications
– name: Sage Publications Ltd
References Demchak, Dombrowski 2013; 14
Habermas, McCarthy 1977; 44
Honig 1991; 85
Lambach 2020; 22
Ördén 2020
Hansen, Nissenbaum 2009; 53
Derrida 1986; 7
Kallinikos, Aaltonen, Marton 2013; 37
Dunn Cavelty 2014; 20
Frost, Michelsen 2017; 2
De Keersmaecker, Roets 2017; 65
Hellman, Wagnsson 2017; 26
Bauman, Bigo, Esteves 2014; 8
Nincic 2003; 24
Ördén 2018; 6
Omand 2018; 3
Ördén 2019; 34
Kiggins 2015; 16
Pherson, Mort Ranta, Cannon 2021; 34
Näsström 2007; 35
Nemura 2014; 7
Buzan B (bibr13-17550882211046426) 1998
bibr43-17550882211046426
bibr36-17550882211046426
bibr5-17550882211046426
bibr50-17550882211046426
Arendt H (bibr3-17550882211046426) 1973
Arendt H (bibr7-17550882211046426) 2003
bibr16-17550882211046426
Missiroli A (bibr39-17550882211046426) 2016
bibr23-17550882211046426
Christie EH (bibr15-17550882211046426) 2019
bibr30-17550882211046426
bibr10-17550882211046426
bibr51-17550882211046426
bibr57-17550882211046426
bibr4-17550882211046426
bibr24-17550882211046426
Habermas J (bibr26-17550882211046426) 1977; 44
bibr44-17550882211046426
Pamment J (bibr49-17550882211046426) 2018
bibr52-17550882211046426
Lewandowsky S (bibr37-17550882211046426) 2020
bibr42-17550882211046426
Ördén H (bibr48-17550882211046426) 2020
bibr9-17550882211046426
Arendt H (bibr1-17550882211046426) 1958
bibr58-17550882211046426
bibr12-17550882211046426
bibr19-17550882211046426
Demchak CC (bibr17-17550882211046426) 2013; 14
bibr29-17550882211046426
bibr22-17550882211046426
bibr32-17550882211046426
bibr20-17550882211046426
bibr53-17550882211046426
bibr46-17550882211046426
bibr18-17550882211046426
Walker RBJ (bibr56-17550882211046426) 1997
bibr40-17550882211046426
Nemura N (bibr41-17550882211046426) 2014; 7
Kavanagh J (bibr33-17550882211046426) 2018
Bertolin G (bibr11-17550882211046426) 2019
Hare F (bibr28-17550882211046426) 2009
bibr34-17550882211046426
bibr47-17550882211046426
bibr54-17550882211046426
bibr27-17550882211046426
bibr14-17550882211046426
Arendt H (bibr2-17550882211046426) 1972
Ivan C (bibr31-17550882211046426) 2019
bibr55-17550882211046426
May L (bibr38-17550882211046426) 1996
bibr35-17550882211046426
bibr6-17550882211046426
bibr45-17550882211046426
bibr25-17550882211046426
Dunn Cavelty M (bibr21-17550882211046426) 2015
Arendt H (bibr8-17550882211046426) 2006
References_xml – volume: 44
  start-page: 3
  issue: 1
  year: 1977
  end-page: 24
  article-title: Hannah Arendt’s communications concept of power
  publication-title: Social Research
– volume: 24
  start-page: 140
  issue: 1
  year: 2003
  end-page: 160
  article-title: Information warfare and democratic accountability
  publication-title: Contemporary Security Policy
– volume: 37
  start-page: 357
  year: 2013
  end-page: 370
  article-title: The ambivalent ontology of digital artifacts
  publication-title: MIS Quarterly
– volume: 8
  start-page: 121
  issue: 2
  year: 2014
  end-page: 144
  article-title: After Snowden: Rethinking the impact of surveillance
  publication-title: International Political Sociology
– volume: 53
  start-page: 1155
  issue: 4
  year: 2009
  end-page: 1175
  article-title: Digital disaster, cyber security, and the Copenhagen school
  publication-title: International Studies Quarterly
– volume: 35
  start-page: 624
  issue: 5
  year: 2007
  end-page: 658
  article-title: The legitimacy of the people
  publication-title: Political Theory
– volume: 34
  start-page: 316
  year: 2021
  end-page: 341
  article-title: Strategies for combating the scourge of digital disinformation
  publication-title: Journal of Intelligence and Counterintelligence
– volume: 22
  start-page: 482
  issue: 3
  year: 2020
  end-page: 506
  article-title: The territorialization of cyberspace
  publication-title: International Studies Review
– volume: 6
  start-page: 15
  issue: 1
  year: 2018
  end-page: 32
  article-title: Instilling judgement: Counter-narratives of humour, fact and logic
  publication-title: Critical Studies on Security
– volume: 7
  start-page: 7
  issue: 1
  year: 1986
  end-page: 15
  article-title: Declarations of independence
  publication-title: New Political Science
– volume: 3
  start-page: 5
  issue: 1
  year: 2018
  end-page: 23
  article-title: The threats from modern digital subversion and sedition
  publication-title: Journal of Cyber Policy
– year: 2020
  publication-title: Securing Judgement: Rethinking security and online information threats
– volume: 14
  year: 2013
  article-title: Cyber Westphalia: Asserting state prerogatives in cyberspace
  publication-title: Georgetown Journal of International Affairs
– volume: 16
  start-page: 86
  issue: 1
  year: 2015
  end-page: 105
  article-title: Open for expansion: US policy and the purpose for the internet in the post-cold war era
  publication-title: International Studies Perspectives
– volume: 2
  start-page: 9
  year: 2017
  end-page: 33
  article-title: Strategic communications in international relations: Practical traps and ethical puzzles
  publication-title: Defence Strategic Communications
– volume: 7
  start-page: 37
  issue: 1
  year: 2014
  end-page: 46
  article-title: A study of change of the body view in cyberculture
  publication-title: Journal of Socio-Informatics
– volume: 65
  start-page: 107
  year: 2017
  end-page: 110
  article-title: ‘Fake news’: Incorrect, but hard to correct. The role of cognitive ability on the impact of false information on social impressions’
  publication-title: Intelligence
– volume: 26
  start-page: 153
  issue: 2
  year: 2017
  end-page: 170
  article-title: How can European states respond to Russian information warfare? An analytical framework
  publication-title: European Security
– volume: 34
  start-page: 421
  issue: 3
  year: 2019
  end-page: 437
  article-title: Deferring substance: EU policy and the information threat
  publication-title: Intelligence & National Security
– volume: 85
  start-page: 97
  issue: 1
  year: 1991
  end-page: 113
  article-title: Declarations of Independence: Arendt and Derrida on the problem of founding a Republic
  publication-title: American Political Science Review
– volume: 20
  start-page: 701
  issue: 3
  year: 2014
  end-page: 715
  article-title: Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities
  publication-title: Science and Engineering Ethics
– ident: bibr30-17550882211046426
  doi: 10.2307/1962880
– volume-title: Responsibility and Judgement
  year: 2003
  ident: bibr7-17550882211046426
– ident: bibr12-17550882211046426
  doi: 10.1515/9780748645978-007
– ident: bibr24-17550882211046426
– ident: bibr43-17550882211046426
– ident: bibr40-17550882211046426
  doi: 10.1177/0090591707304951
– volume-title: The Origins of Totalitarianism
  year: 1973
  ident: bibr3-17550882211046426
– ident: bibr51-17550882211046426
  doi: 10.1017/CBO9781139680486
– ident: bibr52-17550882211046426
– ident: bibr57-17550882211046426
– volume: 7
  start-page: 37
  issue: 1
  year: 2014
  ident: bibr41-17550882211046426
  publication-title: Journal of Socio-Informatics
– start-page: 81
  volume-title: Responding to Cognitive Security Challenges
  year: 2019
  ident: bibr15-17550882211046426
– ident: bibr29-17550882211046426
  doi: 10.1080/09662839.2017.1294162
– ident: bibr53-17550882211046426
– volume: 44
  start-page: 3
  issue: 1
  year: 1977
  ident: bibr26-17550882211046426
  publication-title: Social Research
– volume-title: man Condition
  year: 1958
  ident: bibr1-17550882211046426
– ident: bibr20-17550882211046426
  doi: 10.1007/s11948-014-9551-y
– ident: bibr27-17550882211046426
  doi: 10.1111/j.1468-2478.2009.00572.x
– volume-title: The Role of Communicators in Countering the Malicious Use of Social Media
  year: 2018
  ident: bibr49-17550882211046426
– volume-title: Strategic Communications: East and South
  year: 2016
  ident: bibr39-17550882211046426
– start-page: 103
  volume-title: Crises of the Republic
  year: 1972
  ident: bibr2-17550882211046426
– ident: bibr19-17550882211046426
  doi: 10.1080/07393148608429608
– volume-title: Security: A New Framework for Analysis
  year: 1998
  ident: bibr13-17550882211046426
– ident: bibr47-17550882211046426
  doi: 10.1080/02684527.2019.1553706
– ident: bibr44-17550882211046426
  doi: 10.1017/9781108859561
– start-page: 61
  volume-title: Critical Security Studies: Concepts and Cases
  year: 1997
  ident: bibr56-17550882211046426
– volume: 14
  year: 2013
  ident: bibr17-17550882211046426
  publication-title: Georgetown Journal of International Affairs
– start-page: 5
  volume-title: ognitive Security Challenges
  year: 2019
  ident: bibr11-17550882211046426
– ident: bibr14-17550882211046426
  doi: 10.7249/CT468
– ident: bibr36-17550882211046426
– ident: bibr9-17550882211046426
– ident: bibr34-17550882211046426
  doi: 10.1111/insp.12032
– volume-title: Technology and Democracy: Understanding the Influence of Online Technologies on Political Behaviour and Decision-Making
  year: 2020
  ident: bibr37-17550882211046426
– ident: bibr42-17550882211046426
  doi: 10.1080/13523260312331271849
– ident: bibr10-17550882211046426
  doi: 10.1111/ips.12048
– ident: bibr4-17550882211046426
  doi: 10.7208/chicago/9780226231785.001.0001
– ident: bibr5-17550882211046426
  doi: 10.7208/chicago/9780226231785.001.0001
– ident: bibr35-17550882211046426
  doi: 10.1093/isr/viz022
– volume-title: Truth Decay: An Initial Exploration of the Diminishing Role of Facts and Analysis in American Public Life
  year: 2018
  ident: bibr33-17550882211046426
– volume-title: Between Past and Future
  year: 2006
  ident: bibr8-17550882211046426
– start-page: 81
  volume-title: Strategic Trends 2015
  year: 2015
  ident: bibr21-17550882211046426
– ident: bibr22-17550882211046426
– volume-title: Panel presented at the international studies association
  year: 2019
  ident: bibr31-17550882211046426
– ident: bibr55-17550882211046426
– ident: bibr45-17550882211046426
  doi: 10.1080/23738871.2018.1448097
– ident: bibr32-17550882211046426
  doi: 10.25300/MISQ/2013/37.2.02
– ident: bibr16-17550882211046426
  doi: 10.1016/j.intell.2017.10.005
– ident: bibr46-17550882211046426
  doi: 10.1080/21624887.2017.1377593
– start-page: 88
  volume-title: ectives on Cyber Warfare
  year: 2009
  ident: bibr28-17550882211046426
– ident: bibr50-17550882211046426
  doi: 10.1080/08850607.2020.1789425
– ident: bibr6-17550882211046426
  doi: 10.7208/chicago/9780226231785.001.0001
– ident: bibr25-17550882211046426
  doi: 10.30966/2018.riga.2.1
– volume-title: Hannah Arendt: Twenty Years Later
  year: 1996
  ident: bibr38-17550882211046426
– ident: bibr18-17550882211046426
  doi: 10.1007/978-3-642-55007-2_5
– year: 2020
  ident: bibr48-17550882211046426
  publication-title: Securing Judgement: Rethinking security and online information threats
– ident: bibr23-17550882211046426
– ident: bibr54-17550882211046426
– ident: bibr58-17550882211046426
  doi: 10.7208/chicago/9780226398037.001.0001
SSID ssj0064858
Score 2.2188535
SecondaryResourceType review_article
Snippet The contemporary debate in democracies routinely refers to online misinformation, disinformation, and deception, as security-issues in need of urgent...
SourceID proquest
crossref
sage
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 375
SubjectTerms Boundaries
Concept formation
Debates
Information technology
Internet
National security
Policy making
Political communication
Sovereignty
Territoriality
Threats
Title Securitizing cyberspace: Protecting political judgment
URI https://journals.sagepub.com/doi/full/10.1177/17550882211046426
https://www.proquest.com/docview/2700524708
Volume 18
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFA46X3wRrzhv9EEQhErbpGnim4gigjJBQZ9G0yRjIFNmJ7hf70mTtNM5cb6UkrUpy3dybjkXhA655rmgWoYJ5jIkQBMhZ0KFVOQKJ1nGRGISnG9u6dUDuX5MH32vdpddUoqTYvxjXsl_UIUxwNVkyc6BbD0pDMA94AtXQBiuf8LYOsvL_rjKnP0QJnHSeMXByu_Y-gtVrrkNcTNlIkayV0e6TGuk_S_ewea10ufvV9CYo3VOh9IesQ-s7JLv_d6kAwFsTx-K5nlelqah0bStSGjGQLeZwSgbO7rietg2P3ECFNvmdtO8uTodNjObjxnDk4Dx80Md7G_yqY4ajF1p8qkpFtESkFWStNDS2VPn7saLYkpY1aC1_ofuWNtU3Jqa5Kti0lgbEwF-lc5xv4pWHDTBmUV-DS2owTpa7XhgAseYNxCdpISgoYTToKGDoAY08HSwiR4uL-7Pr0LXESMscJyUoSKgMNJMxErGkheJjiKJU0piZRRZHWkuOcsz0NsKqakkDPan0DpnwjisucBbqDV4GahtFAiegaaGc8pwRkjOmY5UVBBMRUQLwkgbRX45uoUrF2-6ljx3Z8LQRsf1K6-2VspvD-_5Ne66LfXWNVEQaUKyiLXRkVn35qeZE-3M89VdtNxsgT3UKocjtQ9aZSkOHO18An-sa3Y
linkProvider SAGE Publications
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60PehF6wurVXsQBGFlH2k28VZEqdoWhRYUD8tmk4gPatHtwf56M7vZ1jfidZMJ2Zk8vkzmmwDscs1jQbV0_IBLh5gx4XAmlENFrAI_DJnwkeDc6dJWn5xdNa5sVCVyYawGXw4wrMr0KFusJ7MbeeJhAzGFjwcXYsAznYUyQzZCCcrN64vLTrEOU8Ky1zlRwEEJe6f5bSMfd6Up1HwX3ZVtOCeLcFN0NY8zeTgYpaaX409ZHP_3LxVYsDi03swHzhLMqMEyVGw0nCmwc34FaO6RT-_GZpOrJ68C2Zlxog7rF3mKB_w8nMjdj-QtOhxXoX9y3DtqOfaxBScJPD91FDFYhIbCU9KTPPG168qgQYmnECNpV3PJWRwaSJBITSVhxvRC65gJ9IVyEaxBafA0UOtQF-ZkalBkTM3hl5CYM-0qNyEBFS5NCCNVcAtlR4nNRI4PYjxGnk0-_kUxVdifiAzzNBy_Va4VFowKG0R4wd7wSeiyKuyhQaZFPza08eeaOzDX6nXaUfu0e74J8z5yJLKIvxqU0ueR2jLIJRXbdoi-Adsg3bA
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60BfHiW6xW7UEQhNXdbJpNvIla6qtUsFBPy2aTiA9q0e3B_noz3Wx9i3jdZMJsMsl8mcwDYEsYkUhmlEdCoTxqZcITXGqPyUSHJIq4JBjgfNFizQ497da7zuCGsTBuBp930a3KcjQ6rHF395XZc2-Me1blIa4geHmhFkCzSShbRUVICcoH1-3Li-IsZpSPKnQigYcU7l3z20E-aqY3uPnOw2ukdBqzEBfs5r4m97uDzHI6_JTJ8f__MwczDo_WDnIBmocJ3VuAOecVZxvc3l8Ellvms9uhVXa19EVilGaS6v1aO0_1gJ_7Y7q7gbpBw-MSdBrHV4dNzxVd8NIwIJmnqcUkLJKBVoESKTG-r8I6o4FGrGR8I5TgSWShQaoMU5RbEZDGJFyiTVTIcBlKvceeXoGatDdUiyYTZi_BlCaCG1_7KQ2Z9FlKOa2AX0x4nLqM5FgY4yEOXBLyLxNTgZ0xST9Px_Fb52qxinGxDjE-tNcJjXxegW1clLemHwda_XPPTZhqHzXi85PW2RpMEwyVGDn-VaGUPQ30ugUwmdxwUvoKXgjgJQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securitizing+cyberspace%3A+Protecting+political+judgment&rft.jtitle=Journal+of+international+political+theory&rft.au=%C3%96rd%C3%A9n%2C+Hedvig&rft.date=2022-10-01&rft.issn=1755-0882&rft.eissn=1755-1722&rft.volume=18&rft.issue=3&rft.spage=375&rft.epage=392&rft_id=info:doi/10.1177%2F17550882211046426&rft.externalDBID=n%2Fa&rft.externalDocID=10_1177_17550882211046426
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1755-0882&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1755-0882&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1755-0882&client=summon