Introduction

  • Chapter
  • First Online:
Fragile Computing
  • 17 Accesses

Abstract

Digital infrastructures, like many other infrastructures, are beginning to cause “drama”. Their perennial breakdown and disruption have been noted as a matter of risk assessment, regulation, and compliance. In science and technology studies (STS) and anthropology, the book argues, digital security can be approached as a form of technological maintenance. Rather than overcoming breakdowns and disruptions, this book brings strategies of living with broken technologies to the fore, captured by the notion fragile computing. The chapter introduces the methodological approach in this book, as well as challenges connected to ethnographic studies of digital security. It concludes with a discussion of the term “fragile computing” that is further developed throughout the book.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 87.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
GBP 109.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/. For a material semiotic analysis of Stuxnet, see Balzacq and Cavelty (2016).

  2. 2.

    https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password

  3. 3.

    Computer scientist Paul Dourish insists that computer science should take ethnography’s conceptual contribution more seriously, for example, that there is not one “truth” to uncover about technological practices, that they are enacted in multiple ways (Dourish, 2004). Ethnographers are not “tape recorders” to bring the “reality” of technological use into engineering labs. Part of the debate is whether engineers can “simply” acquire the competencies of conducting the material work of ethnography without becoming familiar with the origins of ethnography in critical anthropological research (Forsythe, 1999). Reducing ethnography to a set of techniques may “underestimate, misstate, or misconstrue the goals and mechanisms of ethnographic investigation” (Dourish, 2006, 542). To Dourish, assessing ethnography by how well it develops “implications for design” falls into a fallacy as it underestimates ethnographer’s abilities to uncover underlying assumptions and commitment that things could be different. As anthropologist Marilyn Strathern writes: We must understand ethnography’s role “not as adding more of the same […] but as the intermeshing of different orders of phenomena, having to take certainties and uncertainties together” (Strathern, 2002, 312).

  4. 4.

    Ethnographic writing, anthropologist Anand Pandian notes in reference to Kathleen Stewart, “tries to let the otherwise break through, to keep it alive, to tend it” (Pandian, 2019, 7). Ethnographies are exactly that: they tell different stories than other methods; they focus on what is not easily focused on. Or as Pandian puts it, they “rob the proud of their surety and amplifies voices otherwise inaudible” (ibid.). “Writing with care”, he continues, is a form of “letting things be vulnerable and uncertain” (Pandian, 2019, 14).

  5. 5.

    Brit Ross Winthereik suggests “concepts as companions” that travel with us through the field and become—like the ethnographer—changed through the encounter. “Concepts companions can help open worlds, but they can also be too loud and talkative to the already quite heavily populated places we visit during ethnographies” (Winthereik, 2020, 30). Concepts are not only companions to ethnographers but interlocutors as well. Ethnographers are sensitive to such concepts in the field, as well as their contradictions or hierarchies. This sensitivity allows for juxtaposition of concepts that are prevalent in the field (e.g., definitions of security) with concepts that we “bring”.

References

  • Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40–46. https://doi.org/10.1145/322796.322806

    Article  Google Scholar 

  • Balzacq, T., & Cavelty, M. D. (2016). A theory of actor-network for cybersecurity. European Journal of International Security, 1(2), 176–198. https://doi.org/10.1017/eis.2016.8

    Article  Google Scholar 

  • Boas, F. (1919). Scientists as spies. The Nation, 27. https://doi.org/10.1111/j.0268-540X.2005.00359.x

  • Cohn, M. L. (2016). Convivial decay: Entangled lifetimes in a geriatric infrastructure. In CSCW’16 Proceedings and companion of the ACM conference on computer-supported cooperative work and social computing, San Francisco, CA, pp. 1511–1523.

    Google Scholar 

  • Danyi, E. (2022). Melancholy democracy: Politics beyond hope and despair. Habilitation submitted, Institut für Soziologie, Goethe-Universität.

    Google Scholar 

  • De Laet, M., & Mol, A. (2000). The Zimbabwe bush pump. Social Studies of Science, 30(2), 225–263. https://doi.org/10.1177/030631200030002002

    Article  Google Scholar 

  • Denis, J., & Pontille, D. (2015). Material ordering and the care of things. Science, Technology, and Human Values, 40(3), 338–367. https://doi.org/10.1177/0162243914553129

    Article  Google Scholar 

  • Denis, J., & Pontille, D. (2023). Cultivating attention to fragility: The sensible encounters of maintenance. In Ecological reparation (pp. 344–361). Bristol University Press.

    Chapter  Google Scholar 

  • Dourish, P. (2004). What we talk about when we talk about context. Personal and Ubiquitous Computing, 8(1), 19–30. https://doi.org/10.1007/s00779-003-0253-8

    Article  Google Scholar 

  • Dourish, P. (2006). Implications for design. In R. Grinter (Ed.), Proceedings of the SIGCHI conference on human factors in computing systems (pp. 541–550). ACM.

    Chapter  Google Scholar 

  • Dourish, P., Grinter, R. E., La Delgado Flor, J., & Joseph, M. (2004). Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6), 391–401. https://doi.org/10.1007/s00779-004-0308-5

    Article  Google Scholar 

  • Emerson, R. M., Fretz, R. I., & Shaw, L. L. (2011). Writing ethnographic fieldnotes (2nd ed.). The University of Chicago Press.

    Book  Google Scholar 

  • Forsythe, D. E. (1999). “It’s just a matter of common sense”: Ethnography as invisible work. Computer Supported Cooperative Work, 8(1–2), 127–145. https://doi.org/10.1023/A:1008692231284

    Article  Google Scholar 

  • Hammersley, M. (1990). What’s wrong with ethnography? The myth of theoretical description. Sociology, 24(4), 597–615. https://doi.org/10.1177/0038038590024004003

    Article  Google Scholar 

  • Heuts, F., & Mol, A. (2013). What is a good tomato? A case of valuing in practice. Valuation Studies, 1(2), 125–146. https://doi.org/10.3384/vs.2001-5992.1312125

    Article  Google Scholar 

  • Hirschauer, S. (2001). Ethnografisches Schreiben und die Schweigsamkeit des Sozialen/Ethnographic Writing and the Silence of the Social. Zeitschrift für Soziologie, 30(6), 429–451. https://doi.org/10.1515/zfsoz-2001-0602

    Article  Google Scholar 

  • Jackson, S. J. (2014). 11 Rethinking repair. In Gillespie, T., Boczkowksi, P. & Foot, K. A. (Eds.) Media technologies: Essays on communication, materiality, and society (pp. 221–239). https://doi.org/10.7551/mitpress/9042.003.0015.

  • Kocksch, L., Korn, M., Poller, A., & Wagenknecht, S. (2018). Caring for IT Security: Accountabilities, moralities, and oscillations in IT security practices. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), Article 92. https://doi.org/10.1145/3274361.

  • Latour, B. (1992). Where are the missing masses? The sociology of a few mundane artifacts. In W. Bijker & J. Law (Eds.), Sha** technology-building society: Studies in sociotechnical change (pp. 225–259). MIT Press.

    Google Scholar 

  • Law, J. (2000). Ladbroke Grove, or how to think about failing systems. http://www.comp.lancs.ac.uk/sociology/papers/Law-Ladbroke-Grove-Failing-Systems.pdf.

    Google Scholar 

  • Law, J., & Mol, A. (2002a). Local entanglements or utopian moves: An inquiry into train accidents. The Sociological Review, 50(1_suppl), 82–105. https://doi.org/10.1111/j.1467-954x.2002.tb03580.x

    Article  Google Scholar 

  • Law, J., & Mol, A. (Eds.). (2002b). Complexities. Duke University Press.

    Google Scholar 

  • Liburkina, R. (2021). Extraordinary ethnographic encounters in extraordinary times: A plea for experimental interventions in more-than-business relations. Kulturanthropologie Notizen, 83, 14–26.

    Article  Google Scholar 

  • Liebetrau, T., & Christensen, K. K. (2021). The ontological politics of cyber security: Emerging agencies, actors, sites and spaces. European Journal of International Security, 6(1), 25–43. https://doi.org/10.1017/eis.2020.10

    Article  Google Scholar 

  • Mol, A. (2003). The body multiple. Duke University Press.

    Book  Google Scholar 

  • Mol, A. (2008). The logic of care. Routledge.

    Book  Google Scholar 

  • Mol, A., & Law, J. (1994). Regions, Networks and Fluids: Anaemia and Social Topology. Social Studies of Science, 24(4), 641–671. https://doi.org/10.1177/030631279402400402

    Article  Google Scholar 

  • Niewöhner, J. (2016). Co-laborative anthropology: Crafting reflexivities experimentally. Etnologinen tulkinta ja analyysi, 81–124. (in Finnish).

    Google Scholar 

  • Palombo, H., Ziaie Tabari, A., Lende, D., Ligatti, J., & Ou, X. (2020). An ethnographic understanding of software (in) security and a co-creation model to improve secure software development. In Proceedings of the sixteenth USENIX conference on usable privacy and security (SOUPS’ 20) (pp. 205–220). USENIX Association.

    Google Scholar 

  • Pandian, A. (2019). A possible anthropology: Methods for uneasy times. Duke University Press.

    Book  Google Scholar 

  • Perrow, C. (1999). Normal accidents. Princeton University Press.

    Google Scholar 

  • Poller, A., Kocksch, L., Türpe, S., Epp, F. A., & Kinder-Kurlanda, K. (2017). Can security become a routine? A study of organizational change in an agile software development group. In Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing (CSCW ’17), 2489–2503. Association for Computing Machinery. https://doi.org/10.1145/2998181.2998191

  • Ramakrishnan, K., O’Reilly, K., & Budds, J. (2021). The temporal fragility of infrastructure: Theorizing decay, maintenance, and repair. Environment and Planning E: Nature and Space, 4(3), 674–695. https://doi.org/10.1177/2514848620979712

  • Sørensen, E. (2009). The materiality of learning: Technology and knowledge in educational practice (Learning in doing: Social, cognitive and computational perspectives). Cambridge University Press. https://doi.org/10.1017/CBO9780511576362

    Book  Google Scholar 

  • Spencer, M., & Pizio, D. (2023). The de-perimeterisation of information security: The Jericho Forum, zero trust, and narrativity. Social Studies of Science, 3063127231221107. Advance online publication. https://doi.org/10.1177/03063127231221107

  • Squires, S., & Shade, M. (2015). People, the weak link in cyber-security: Can ethnography bridge the gap? Ethnographic Praxis in Industry Conference Proceedings, 1, 47–57. https://doi.org/10.1111/1559-8918.2015.01039

    Article  Google Scholar 

  • Star, S. L. (1990). Power, technology and the phenomenology of conventions: On being allergic to onions. The Sociological Review, 38(1_suppl), 26–56. https://doi.org/10.1111/j.1467-954X.1990.tb03347.x

    Article  Google Scholar 

  • Star, S. L. (1999). The ethnography of infrastructure. American Behavioral Scientist, 43(3), 377–391. https://doi.org/10.1177/00027649921955326

    Article  Google Scholar 

  • Star, S. L., & Strauss, A. (1999). Layers of silence, arenas of voice: The ecology of visible and invisible work. Computer Supported Cooperative Work (CSCW), 8, 9–30. https://doi.org/10.1023/A:1008651105359

    Article  Google Scholar 

  • Strathern, M. (2002). Abstraction and decontextualization. An anthropological comment. In S. Woolgar (Ed.), Virtual society?: Technology, cyberbole, reality (pp. 302–314).

    Chapter  Google Scholar 

  • Suchman, L. (2006). Human-machine reconfigurations: Plans and situated actions. In Learning in doing: Social, cognitive and computational perspectives (2nd ed.). Cambridge University Press. https://doi.org/10.1017/CBO9780511808418

    Chapter  Google Scholar 

  • Sundaramurthy, S. C., Case, J., Truong, T., Zomlot, L., & Hoffmann, M. (2014). A tale of three security operation centers. In Proceedings of the 2014 ACM workshop on security information workers (SIW’ 14) (pp. 43–50). Association for Computing Machinery. https://doi.org/10.1145/2663887.2663904

  • Tsing, A. L. (2004). Friction. Princeton University Press.

    Google Scholar 

  • Tsing, A. L. (2015). The mushroom at the end of the world: On the possibility of life in capitalist ruins. Princeton University Press.

    Book  Google Scholar 

  • Winthereik, B. R. (2020). Is ANT’s radical empiricism ethnographic? In A. Blok, I. Farias, & C. Roberts (Eds.), The Routledge companion to actor-network theory (pp. 24–33). Routledge.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laura Kocksch .

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kocksch, L. (2024). Introduction. In: Fragile Computing. Palgrave Macmillan, Singapore. https://doi.org/10.1007/978-981-99-9807-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9807-4_1

  • Published:

  • Publisher Name: Palgrave Macmillan, Singapore

  • Print ISBN: 978-981-99-9806-7

  • Online ISBN: 978-981-99-9807-4

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics

Navigation