Peter Seele
Heinrich Heine University Düsseldorf (PhD)
Purpose This paper aims to outline how destructive communication exemplified by ransomware cyberattacks destroys the process of organization, causes a “state of exception,” and thus constitutes organization. The authors build on Agamben's state of exception and translate it into communicative constitution of organization theory. Design/methodology/approach A significant increase of cyberattacks have impacted organizations in recent times and laid organizations under siege. This conceptual research builds on illustrative cases chosen by positive deviance case selection of ransomware attacks. Findings CCO theory focuses mainly on ordering characteristics of communication. The authors aim to complement this view with a perspective on destructive communication that destroys the process of organization. Based on illustrative cases, the authors conceptualize a process model of destructive CCO. Practical implications The authors expand thoughts about a digital “corporate immune system” to question current offensive cybersecurity strategies of deterrence and promote resilience approaches instead. Originality/value Informed by destructive communication of cyberattacks, this theory advancement supports arguments to include notions of disorder into CCO theory. Furthermore, the paper explains where disruptions like cyberattacks may trigger sensemaking and change to preserve stability. Finally, a novel definition of ‘destructive CCO’ is provided: Destructive Communication Constitutes Organization by disrupting and destroying its site and surface while triggering sensemaking and becoming part of sensemaking itself.
Keywords No keywords specified (fix it)
Categories No categories specified
(categorize this paper)
DOI 10.1108/jices-01-2021-0015
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy

Upload a copy of this paper     Check publisher's policy     Papers currently archived: 71,199
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

Examination of Cybercrime and its Effects on Corporate Stock Value.Katherine Taken Smith, Amie Jones, Leigh Johnson & Lawrence Murphy Smith - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):42-60.
Cybersecurity in Health – Disentangling Value Tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
Internet Surveillance After Snowden.Christian Fuchs & Daniel Trottier - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):412-444.
The Syrian Electronic Army – a Hacktivist Group.Matthew Warren & Shona Leitch - 2016 - Journal of Information, Communication and Ethics in Society 14 (2):200-212.

View all 6 references / Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

Meaning and Limits of the Exception Criminal.Dante Valitutti - 2015 - Governare la Paura. Journal of Interdisciplinary Studies 8 (1).
Agamben, Hegel, and the State of Exception.Wendell Kisner - 2007 - Cosmos and History 3 (2-3):222-253.
Scoping the Ethical Principles of Cybersecurity Fear Appeals.Marc Dupuis & Karen Renaud - 2020 - Ethics and Information Technology 23 (3):265-284.
Agamben, Hegel, and the State of Exception.Wendell Kisner - 2007 - Cosmos and History : The Journal of Natural and Social Philosophy 3 (2-3):222-253.


Added to PP index

Total views
1 ( #1,552,026 of 2,518,149 )

Recent downloads (6 months)
1 ( #408,577 of 2,518,149 )

How can I increase my downloads?


Sorry, there are not enough data points to plot this chart.

My notes