{"title":"双重安全困境与不安全的社会建构","authors":"Amir Lupovici","doi":"10.1080/13523260.2020.1866845","DOIUrl":null,"url":null,"abstract":"ABSTRACT In this article I introduce the concept of the “dual-use security dilemma,” specifically through elaborating on two main aspects that shape this dilemma. First, inspired by traditional security scholarship, I focus on the spiral dynamics of actors responding to the insecurities raised by dual-use technologies that affect this type of dilemma. Second, I further develop a securitization reading of the traditional security dilemma, tracing how social constructions of insecurities and the justification of extraordinary measures affect the dynamics of the security dilemma. Combining these two aspects, I suggest that enunciators shape the dynamics of the dual-use security dilemma by using specific rationales of insecurity to mobilize support for measures against opponents holding dual-use technologies, whose response further fuels insecurity that spirals over time. The innovative theoretical and policy implications of this research become especially important given the rise of dual-use cyber technologies.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":4.0000,"publicationDate":"2021-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2020.1866845","citationCount":"7","resultStr":"{\"title\":\"The dual-use security dilemma and the social construction of insecurity\",\"authors\":\"Amir Lupovici\",\"doi\":\"10.1080/13523260.2020.1866845\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT In this article I introduce the concept of the “dual-use security dilemma,” specifically through elaborating on two main aspects that shape this dilemma. First, inspired by traditional security scholarship, I focus on the spiral dynamics of actors responding to the insecurities raised by dual-use technologies that affect this type of dilemma. Second, I further develop a securitization reading of the traditional security dilemma, tracing how social constructions of insecurities and the justification of extraordinary measures affect the dynamics of the security dilemma. Combining these two aspects, I suggest that enunciators shape the dynamics of the dual-use security dilemma by using specific rationales of insecurity to mobilize support for measures against opponents holding dual-use technologies, whose response further fuels insecurity that spirals over time. The innovative theoretical and policy implications of this research become especially important given the rise of dual-use cyber technologies.\",\"PeriodicalId\":46729,\"journal\":{\"name\":\"Contemporary Security Policy\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2021-01-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1080/13523260.2020.1866845\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Contemporary Security Policy\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.1080/13523260.2020.1866845\",\"RegionNum\":1,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"INTERNATIONAL RELATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Contemporary Security Policy","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1080/13523260.2020.1866845","RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
The dual-use security dilemma and the social construction of insecurity
ABSTRACT In this article I introduce the concept of the “dual-use security dilemma,” specifically through elaborating on two main aspects that shape this dilemma. First, inspired by traditional security scholarship, I focus on the spiral dynamics of actors responding to the insecurities raised by dual-use technologies that affect this type of dilemma. Second, I further develop a securitization reading of the traditional security dilemma, tracing how social constructions of insecurities and the justification of extraordinary measures affect the dynamics of the security dilemma. Combining these two aspects, I suggest that enunciators shape the dynamics of the dual-use security dilemma by using specific rationales of insecurity to mobilize support for measures against opponents holding dual-use technologies, whose response further fuels insecurity that spirals over time. The innovative theoretical and policy implications of this research become especially important given the rise of dual-use cyber technologies.
期刊介绍:
One of the oldest peer-reviewed journals in international conflict and security, Contemporary Security Policy promotes theoretically-based research on policy problems of armed conflict, intervention and conflict resolution. Since it first appeared in 1980, CSP has established its unique place as a meeting ground for research at the nexus of theory and policy.
Spanning the gap between academic and policy approaches, CSP offers policy analysts a place to pursue fundamental issues, and academic writers a venue for addressing policy. Major fields of concern include:
War and armed conflict
Peacekeeping
Conflict resolution
Arms control and disarmament
Defense policy
Strategic culture
International institutions.
CSP is committed to a broad range of intellectual perspectives. Articles promote new analytical approaches, iconoclastic interpretations and previously overlooked perspectives. Its pages encourage novel contributions and outlooks, not particular methodologies or policy goals. Its geographical scope is worldwide and includes security challenges in Europe, Africa, the Middle-East and Asia. Authors are encouraged to examine established priorities in innovative ways and to apply traditional methods to new problems.