Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating

Journal of Information, Communication and Ethics in Society 20 (1):91-109 (2022)
  Copy   BIBTEX

Abstract

Purpose This paper aims to outline how destructive communication exemplified by ransomware cyberattacks destroys the process of organization, causes a “state of exception,” and thus constitutes organization. The authors build on Agamben's state of exception and translate it into communicative constitution of organization theory. Design/methodology/approach A significant increase of cyberattacks have impacted organizations in recent times and laid organizations under siege. This conceptual research builds on illustrative cases chosen by positive deviance case selection of ransomware attacks. Findings CCO theory focuses mainly on ordering characteristics of communication. The authors aim to complement this view with a perspective on destructive communication that destroys the process of organization. Based on illustrative cases, the authors conceptualize a process model of destructive CCO. Practical implications The authors expand thoughts about a digital “corporate immune system” to question current offensive cybersecurity strategies of deterrence and promote resilience approaches instead. Originality/value Informed by destructive communication of cyberattacks, this theory advancement supports arguments to include notions of disorder into CCO theory. Furthermore, the paper explains where disruptions like cyberattacks may trigger sensemaking and change to preserve stability. Finally, a novel definition of ‘destructive CCO’ is provided: Destructive Communication Constitutes Organization by disrupting and destroying its site and surface while triggering sensemaking and becoming part of sensemaking itself.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,752

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Meaning and limits of the exception criminal.Dante Valitutti - 2015 - Governare la Paura. Journal of Interdisciplinary Studies 8 (1).
Agamben, Hegel, and the state of exception.Wendell Kisner - 2007 - Cosmos and History 3 (2-3):222-253.
Scoping the ethical principles of cybersecurity fear appeals.Marc Dupuis & Karen Renaud - 2020 - Ethics and Information Technology 23 (3):265-284.
Agamben, Hegel, and the State of Exception.Wendell Kisner - 2007 - Cosmos and History : The Journal of Natural and Social Philosophy 3 (2-3):222-253.

Analytics

Added to PP
2022-04-10

Downloads
12 (#1,081,406)

6 months
3 (#965,065)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Peter Seele
Heinrich Heine University Düsseldorf (PhD)

Citations of this work

No citations found.

Add more citations

References found in this work

Cybersecurity in health – disentangling value tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
Internet surveillance after Snowden.Christian Fuchs & Daniel Trottier - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):412-444.
Examination of cybercrime and its effects on corporate stock value.Katherine Taken Smith, Amie Jones, Leigh Johnson & Lawrence Murphy Smith - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):42-60.
The Syrian Electronic Army – a hacktivist group.Matthew Warren & Shona Leitch - 2016 - Journal of Information, Communication and Ethics in Society 14 (2):200-212.

View all 6 references / Add more references