Security-as-Service in the Management of European Border Data Infrastructures

被引:1
|
作者
Maguire, Eileen Murphy [1 ]
机构
[1] Copenhagen Business Sch, Copenhagen, Denmark
关键词
(de)politicisation; data infrastructures; eu-LISA; expertise; service; CO-CREATION; DOMINANT LOGIC; GOVERNANCE; UNION; KNOWLEDGE; POLITICS; EU; AGENCIFICATION; LEGITIMATION; DESTRUCTION;
D O I
10.1111/jcms.13543
中图分类号
F [经济];
学科分类号
02 ;
摘要
Today, large-scale IT systems play a central role in the management of European borders. These systems not only support and enable the management of mobility but also require expert management as complex data infrastructures. Drawing on fieldwork carried out at the headquarters of the European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice (eu-LISA), this article engages with growing calls to explore the politics of data infrastructure management. Focusing on the expert discourses and practices of eu-LISA, I show that, in line with a logic of service, it seeks to establish its legitimacy and authority as the manager of data infrastructures by sharing its expertise with its stakeholders. By attending to a logic of service, I show that the management of data infrastructures is neither exclusively depoliticising nor politicising; rather, it is often simultaneously both.
引用
收藏
页码:1379 / 1394
页数:16
相关论文
共 50 条
  • [41] Software security management in critical infrastructures: a systematic literature review
    Eksi, Gulsum Ece
    Tekinerdogan, Bedir
    Catal, Cagatay
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2022, 30 (04) : 1142 - 1161
  • [42] Dynamic security management of smart WoT infrastructures using SDN
    El Jaouhari, Saad
    Bouabdallah, Ahmed
    2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2018,
  • [43] Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures
    Flammini, Francesco
    Gaglione, Andrea
    Mazzocca, Nicola
    Pragliola, Concetta
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2009, 5508 : 180 - +
  • [44] Using public-key infrastructures for security and risk management
    Wing, P
    O'Higgins, B
    IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (09) : 71 - 73
  • [45] A Bayesian network methodology for optimal security management of critical infrastructures
    Misuri, Alessio
    Khakzad, Nima
    Reniers, Genserik
    Cozzani, Valerio
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2019, 191
  • [46] European built core data management system for the Russian service module
    Brandt, G
    Schneider, W
    Urban, G
    Branets, V
    Reimers, C
    ACTA ASTRONAUTICA, 1996, 38 (4-8) : 385 - 394
  • [47] Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 89 - 95
  • [48] A data management platform for efficient monitoring of infrastructures
    Aihara, K.
    Takasu, A.
    Kawakatsu, T.
    Kinoshita, A.
    Adachi, J.
    BRIDGE MAINTENANCE, SAFETY, MANAGEMENT, LIFE-CYCLE SUSTAINABILITY AND INNOVATIONS, 2021, : 2970 - 2977
  • [49] Fortifying big data infrastructures to face security and privacy issues
    Department of Electrical Engineering, Universitas Ahmad Dahlan, Yogyakarta, Indonesia
    不详
    不详
    Telkomnika Telecomun. Compt. Electr. Control, 4 (751-752):
  • [50] Impact of Information Security measures on the Velocity of Big Data Infrastructures
    Dupre, Lionel
    Demchenko, Yuri
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 484 - 491