{"guid":"68f73f80-4470-5ed7-81d1-994e187ae1ee","title":"Panel: Die De-Militarisierung von Cybersicherheit?","subtitle":null,"slug":"fiffkon23-55-panel-die-de-militarisierung-von-cybersicherheit-","link":"https://fahrplan.2023.fiffkon.de/fiffkon23/talk/WRJWP8/","description":"Die De-Militarisierung von Cybersicherheit? Perspektiven und Fragen aus der Soziologie und den feministischen science and technology studies\n\nAttacken, Verteidigung, Schwachstellen oder der Faktor Mensch - Cybersicherheit ist durchzogen von militärischen Metaphern. Diese werden in alarmistische und moralisierende Kommunikationsstrategien übersetzt. In diesem Panel diskutieren Soziolog:innen und science and technology studies-Forscher:innen, wie Cybersicherheit über militärische Narrationen hinaus konzeptionalisiert werden kann. Wir versammeln empirische Einblicke in diverse Felder: Expertendiskurse (Hacker und Internetgovernance), klein- und mittelständische Unternehmen, Softwareentwicklung, Wissensvermittlung und Kommunikationsinfrastrukturen. Hier werden gänzlich konfligierende Register der Cybersicherheit sichtbar: verteilte Verantwortung, unlösbare Dilemma, kollaborative Arbeit und sogar Fürsorge für Geräte und soziotechnische Gefüge.","original_language":"deu","persons":["Daniel Guagnin","Laura Anna Kocksch","Basil Wiesse"],"view_count":215,"promoted":false,"date":"2023-11-05T10:30:00.000+01:00","release_date":"2023-11-05T00:00:00.000+01:00","updated_at":"2026-02-26T17:00:10.270+01:00","tags":["fiffkon23","55","2023","Programm","fiffkon23","fiff","frieden","informatik","gesellschaft","ethik","verantwortung","it","computer","netzwerke","konferenz","fiff-konferenz","2023"],"length":3354,"duration":3354,"thumb_url":"https://static.media.ccc.de/media/conferences/fiffkon/2023/55-68f73f80-4470-5ed7-81d1-994e187ae1ee.jpg","poster_url":"https://static.media.ccc.de/media/conferences/fiffkon/2023/55-68f73f80-4470-5ed7-81d1-994e187ae1ee_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/fiffkon/2023/55-68f73f80-4470-5ed7-81d1-994e187ae1ee.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/fiffkon/2023/55-68f73f80-4470-5ed7-81d1-994e187ae1ee.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/fiffkon23-55-panel-die-de-militarisierung-von-cybersicherheit-","url":"https://api.media.ccc.de/public/events/68f73f80-4470-5ed7-81d1-994e187ae1ee","conference_title":"FIfFKon 2023","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon23","related":[],"recordings":[{"size":469,"length":3354,"mime_type":"video/webm","language":"deu","filename":"fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2023-11-05T15:03:18.668+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2023/webm-hd/fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/71482","event_url":"https://api.media.ccc.de/public/events/68f73f80-4470-5ed7-81d1-994e187ae1ee","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon23"},{"size":144,"length":3354,"mime_type":"video/webm","language":"deu","filename":"fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2023-11-05T13:14:46.981+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2023/webm-sd/fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/71475","event_url":"https://api.media.ccc.de/public/events/68f73f80-4470-5ed7-81d1-994e187ae1ee","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon23"},{"size":118,"length":3354,"mime_type":"video/mp4","language":"deu","filename":"fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2023-11-05T12:39:06.552+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2023/h264-sd/fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_sd.mp4","url":"https://api.media.ccc.de/public/recordings/71467","event_url":"https://api.media.ccc.de/public/events/68f73f80-4470-5ed7-81d1-994e187ae1ee","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon23"},{"size":34,"length":3354,"mime_type":"audio/opus","language":"deu","filename":"fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2023-11-05T12:31:35.159+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2023/opus/fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_opus.opus","url":"https://api.media.ccc.de/public/recordings/71466","event_url":"https://api.media.ccc.de/public/events/68f73f80-4470-5ed7-81d1-994e187ae1ee","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon23"},{"size":51,"length":3354,"mime_type":"audio/mpeg","language":"deu","filename":"fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2023-11-05T12:30:59.244+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2023/mp3/fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/71465","event_url":"https://api.media.ccc.de/public/events/68f73f80-4470-5ed7-81d1-994e187ae1ee","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon23"},{"size":557,"length":3354,"mime_type":"video/mp4","language":"deu","filename":"fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2023-11-05T12:28:38.266+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2023/h264-hd/fiffkon23-55-deu-Panel_Die_De-Militarisierung_von_Cybersicherheit_hd.mp4","url":"https://api.media.ccc.de/public/recordings/71464","event_url":"https://api.media.ccc.de/public/events/68f73f80-4470-5ed7-81d1-994e187ae1ee","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon23"}]}