{"id":256,"date":"2018-11-05T16:47:17","date_gmt":"2018-11-05T15:47:17","guid":{"rendered":"http:\/\/blog.unifr.ch\/cva\/?page_id=256"},"modified":"2018-11-05T22:26:16","modified_gmt":"2018-11-05T21:26:16","slug":"project","status":"publish","type":"page","link":"https:\/\/blog.unifr.ch\/cva\/project\/","title":{"rendered":"The Project"},"content":{"rendered":"\n<p>This exploratory project aims to pave the way toward an anthropology of computer (in)security. Computer security is compromised when a vulnerability is exploitable and allows unauthorized access to digital devices or networks. Currently, such computer vulnerabilities represent a considerable threat to the security of contemporary societies and bear tremendous consequences to political processes, the economy and impact social norms and practices. This \u201cdigital lives\u201d project aims to account for the socio-cultural dynamics, ethical dimensions and (in)securitziation processes embedded into three interconnected issues: the practices of vulnerability disclosure, operational security and advocacy related to digital rights and governance.<\/p>\n\n\n\n<p>Computer\nvulnerability disclosures can take various forms. They are\ncomplex social\nprocesses\ncomposed of several steps and\nare highly sensitive\nin\nnature.\nThey can lead\nto legal\nactions\nagainst\nthe\nsecurity researchers\nwho\ndiscovery\nthe vulnerability,\ncompromise\nthe reputation of the vendors\nwho\nare asked to \u201cpatch\u201d their\nproducts\nand\nof\ncourse, they can\ntemporarily\nincrease\nthe vulnerability of\ncomputer\nsystems and\neven\ncompromise\nthe\ndata\nof\nmillions\nof users. We\nare interested in\nresearching the socio-cultural\norganization and negotiation of these disclosures over the last\nseveral\nyears\nto highlight the socio-technical and\nethical\ndynamics in the\ncomputer security arena that\nincludes\nsecurity researchers, vendors\nand\nvarious intermediaries. \n<\/p>\n\n\n\n<p>These vulnerabilities create crises and controversies beyond the computer security arena and we aim to trace these developments by analyzing how vulnerabilities are \u201ctranslated\u201d into two different forums: when they are handled by computer experts involved in operational security and when they are embedded in advocacy initiatives by concerned groups or organizations. Researching operational forums will lead us to understand how a vulnerability is described, assigned as a risk factor and publicized by entities such as Computer Emergency Response Teams (CERTs) to professionals in IT departments where \u201cpatches\u201d and upgrades are implemented according to a strategy, organizational constraints and specific technical complexities. Enquiries related to advocacy initiatives will reveal another \u201cafterlife\u201d of vulnerabilities analyzing <strong>how computer (in)security is mobilized, translated and embedded into ethical and political claims and controversies related to digital rights and governance. <\/strong><\/p>\n\n\n\n<p>Altogether, these research sections will analyze the complex trajectories of computer security issues sprawling through experts, professionals and civic circles. Such a multi-focused research perspective will provide an exploration of socio-cultural and technical constructions of various forms of computer (in)securities in our societies to outline a future long-term research campaign. Considering the global configuration of the computer security arena and the ramifications under scrutiny in this project, empirical data collection will take place in various sites and the project will adopt a particular epistemological framework conceptualizing \u201csituations\u201d instead of groups, places or events. An ethnographic approach will characterize the empirical data collection including observations, semi-structured interviews, informal discussions and digital ethnography for all sections.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This exploratory project aims to pave the way toward an anthropology of computer (in)security. Computer security is compromised when a vulnerability is exploitable and allows &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/pages\/256"}],"collection":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/comments?post=256"}],"version-history":[{"count":1,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/pages\/256\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/pages\/256\/revisions\/257"}],"wp:attachment":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/media?parent=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}