Security-as-Service in the Management of European Border Data Infrastructures

被引:1
|
作者
Maguire, Eileen Murphy [1 ]
机构
[1] Copenhagen Business Sch, Copenhagen, Denmark
关键词
(de)politicisation; data infrastructures; eu-LISA; expertise; service; CO-CREATION; DOMINANT LOGIC; GOVERNANCE; UNION; KNOWLEDGE; POLITICS; EU; AGENCIFICATION; LEGITIMATION; DESTRUCTION;
D O I
10.1111/jcms.13543
中图分类号
F [经济];
学科分类号
02 ;
摘要
Today, large-scale IT systems play a central role in the management of European borders. These systems not only support and enable the management of mobility but also require expert management as complex data infrastructures. Drawing on fieldwork carried out at the headquarters of the European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice (eu-LISA), this article engages with growing calls to explore the politics of data infrastructure management. Focusing on the expert discourses and practices of eu-LISA, I show that, in line with a logic of service, it seeks to establish its legitimacy and authority as the manager of data infrastructures by sharing its expertise with its stakeholders. By attending to a logic of service, I show that the management of data infrastructures is neither exclusively depoliticising nor politicising; rather, it is often simultaneously both.
引用
收藏
页码:1379 / 1394
页数:16
相关论文
共 50 条
  • [21] Anticipating uncertainty: The security of European critical outer space infrastructures
    Slann, Phillip A.
    SPACE POLICY, 2016, 35 : 6 - 14
  • [22] Cloud Service Feature driven Security Policies for Virtualized Infrastructures
    Chandramouli, Ramaswamy
    WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 166 - 171
  • [24] Evolving infrastructures for a nationwide data broadcasting service
    Boroughs, D
    SMPTE JOURNAL, 2001, 110 (09): : 598 - 607
  • [25] Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures
    Massonet, Philippe
    Naqvi, Syed
    Tusa, Francesco
    Villari, Massimo
    Latanicki, Joseph
    CLOUD COMPUTING, 2010, 34 : 73 - 82
  • [26] Conceptual Framework for Security Hazard Management in Critical Infrastructures
    Hashimoto, Yoshihiro
    Toyoshima, Takeshi
    Yogo, Shuichi
    Koike, Masato
    Jing, Sun
    Koshijima, Ichiro
    11TH INTERNATIONAL SYMPOSIUM ON PROCESS SYSTEMS ENGINEERING, PTS A AND B, 2012, 31 : 1266 - 1270
  • [27] Governing Asset Management Data Infrastructures
    Brous, Paul
    Herder, Paulien
    Janssen, Marijn
    COMPLEX ADAPTIVE SYSTEMS, 2016, 95 : 303 - 310
  • [28] Smartening border security in the European Union: An associational inquiry
    Jeandesboz, Julien
    SECURITY DIALOGUE, 2016, 47 (04) : 292 - 309
  • [29] SPECIAL ISSUE: SERVICE, SECURITY AND DATA MANAGEMENT FOR UBIQUITOUS COMPUTING Foreword
    Li, Kuan-Ching
    Zou, Deqing
    Park, Jong Hyuk
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2009, 4 (06) : 321 - 322
  • [30] BYOS: Bring Your Own Security in Clouds and Service Oriented Infrastructures
    Kyriazis, Dimosthenis
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 374 - 379