Abstract
Digital infrastructures, like many other infrastructures, are beginning to cause “drama”. Their perennial breakdown and disruption have been noted as a matter of risk assessment, regulation, and compliance. In science and technology studies (STS) and anthropology, the book argues, digital security can be approached as a form of technological maintenance. Rather than overcoming breakdowns and disruptions, this book brings strategies of living with broken technologies to the fore, captured by the notion fragile computing. The chapter introduces the methodological approach in this book, as well as challenges connected to ethnographic studies of digital security. It concludes with a discussion of the term “fragile computing” that is further developed throughout the book.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/. For a material semiotic analysis of Stuxnet, see Balzacq and Cavelty (2016).
- 2.
- 3.
Computer scientist Paul Dourish insists that computer science should take ethnography’s conceptual contribution more seriously, for example, that there is not one “truth” to uncover about technological practices, that they are enacted in multiple ways (Dourish, 2004). Ethnographers are not “tape recorders” to bring the “reality” of technological use into engineering labs. Part of the debate is whether engineers can “simply” acquire the competencies of conducting the material work of ethnography without becoming familiar with the origins of ethnography in critical anthropological research (Forsythe, 1999). Reducing ethnography to a set of techniques may “underestimate, misstate, or misconstrue the goals and mechanisms of ethnographic investigation” (Dourish, 2006, 542). To Dourish, assessing ethnography by how well it develops “implications for design” falls into a fallacy as it underestimates ethnographer’s abilities to uncover underlying assumptions and commitment that things could be different. As anthropologist Marilyn Strathern writes: We must understand ethnography’s role “not as adding more of the same […] but as the intermeshing of different orders of phenomena, having to take certainties and uncertainties together” (Strathern, 2002, 312).
- 4.
Ethnographic writing, anthropologist Anand Pandian notes in reference to Kathleen Stewart, “tries to let the otherwise break through, to keep it alive, to tend it” (Pandian, 2019, 7). Ethnographies are exactly that: they tell different stories than other methods; they focus on what is not easily focused on. Or as Pandian puts it, they “rob the proud of their surety and amplifies voices otherwise inaudible” (ibid.). “Writing with care”, he continues, is a form of “letting things be vulnerable and uncertain” (Pandian, 2019, 14).
- 5.
Brit Ross Winthereik suggests “concepts as companions” that travel with us through the field and become—like the ethnographer—changed through the encounter. “Concepts companions can help open worlds, but they can also be too loud and talkative to the already quite heavily populated places we visit during ethnographies” (Winthereik, 2020, 30). Concepts are not only companions to ethnographers but interlocutors as well. Ethnographers are sensitive to such concepts in the field, as well as their contradictions or hierarchies. This sensitivity allows for juxtaposition of concepts that are prevalent in the field (e.g., definitions of security) with concepts that we “bring”.
References
Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40–46. https://doi.org/10.1145/322796.322806
Balzacq, T., & Cavelty, M. D. (2016). A theory of actor-network for cybersecurity. European Journal of International Security, 1(2), 176–198. https://doi.org/10.1017/eis.2016.8
Boas, F. (1919). Scientists as spies. The Nation, 27. https://doi.org/10.1111/j.0268-540X.2005.00359.x
Cohn, M. L. (2016). Convivial decay: Entangled lifetimes in a geriatric infrastructure. In CSCW’16 Proceedings and companion of the ACM conference on computer-supported cooperative work and social computing, San Francisco, CA, pp. 1511–1523.
Danyi, E. (2022). Melancholy democracy: Politics beyond hope and despair. Habilitation submitted, Institut für Soziologie, Goethe-Universität.
De Laet, M., & Mol, A. (2000). The Zimbabwe bush pump. Social Studies of Science, 30(2), 225–263. https://doi.org/10.1177/030631200030002002
Denis, J., & Pontille, D. (2015). Material ordering and the care of things. Science, Technology, and Human Values, 40(3), 338–367. https://doi.org/10.1177/0162243914553129
Denis, J., & Pontille, D. (2023). Cultivating attention to fragility: The sensible encounters of maintenance. In Ecological reparation (pp. 344–361). Bristol University Press.
Dourish, P. (2004). What we talk about when we talk about context. Personal and Ubiquitous Computing, 8(1), 19–30. https://doi.org/10.1007/s00779-003-0253-8
Dourish, P. (2006). Implications for design. In R. Grinter (Ed.), Proceedings of the SIGCHI conference on human factors in computing systems (pp. 541–550). ACM.
Dourish, P., Grinter, R. E., La Delgado Flor, J., & Joseph, M. (2004). Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6), 391–401. https://doi.org/10.1007/s00779-004-0308-5
Emerson, R. M., Fretz, R. I., & Shaw, L. L. (2011). Writing ethnographic fieldnotes (2nd ed.). The University of Chicago Press.
Forsythe, D. E. (1999). “It’s just a matter of common sense”: Ethnography as invisible work. Computer Supported Cooperative Work, 8(1–2), 127–145. https://doi.org/10.1023/A:1008692231284
Hammersley, M. (1990). What’s wrong with ethnography? The myth of theoretical description. Sociology, 24(4), 597–615. https://doi.org/10.1177/0038038590024004003
Heuts, F., & Mol, A. (2013). What is a good tomato? A case of valuing in practice. Valuation Studies, 1(2), 125–146. https://doi.org/10.3384/vs.2001-5992.1312125
Hirschauer, S. (2001). Ethnografisches Schreiben und die Schweigsamkeit des Sozialen/Ethnographic Writing and the Silence of the Social. Zeitschrift für Soziologie, 30(6), 429–451. https://doi.org/10.1515/zfsoz-2001-0602
Jackson, S. J. (2014). 11 Rethinking repair. In Gillespie, T., Boczkowksi, P. & Foot, K. A. (Eds.) Media technologies: Essays on communication, materiality, and society (pp. 221–239). https://doi.org/10.7551/mitpress/9042.003.0015.
Kocksch, L., Korn, M., Poller, A., & Wagenknecht, S. (2018). Caring for IT Security: Accountabilities, moralities, and oscillations in IT security practices. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), Article 92. https://doi.org/10.1145/3274361.
Latour, B. (1992). Where are the missing masses? The sociology of a few mundane artifacts. In W. Bijker & J. Law (Eds.), Sha** technology-building society: Studies in sociotechnical change (pp. 225–259). MIT Press.
Law, J. (2000). Ladbroke Grove, or how to think about failing systems. http://www.comp.lancs.ac.uk/sociology/papers/Law-Ladbroke-Grove-Failing-Systems.pdf.
Law, J., & Mol, A. (2002a). Local entanglements or utopian moves: An inquiry into train accidents. The Sociological Review, 50(1_suppl), 82–105. https://doi.org/10.1111/j.1467-954x.2002.tb03580.x
Law, J., & Mol, A. (Eds.). (2002b). Complexities. Duke University Press.
Liburkina, R. (2021). Extraordinary ethnographic encounters in extraordinary times: A plea for experimental interventions in more-than-business relations. Kulturanthropologie Notizen, 83, 14–26.
Liebetrau, T., & Christensen, K. K. (2021). The ontological politics of cyber security: Emerging agencies, actors, sites and spaces. European Journal of International Security, 6(1), 25–43. https://doi.org/10.1017/eis.2020.10
Mol, A. (2003). The body multiple. Duke University Press.
Mol, A. (2008). The logic of care. Routledge.
Mol, A., & Law, J. (1994). Regions, Networks and Fluids: Anaemia and Social Topology. Social Studies of Science, 24(4), 641–671. https://doi.org/10.1177/030631279402400402
Niewöhner, J. (2016). Co-laborative anthropology: Crafting reflexivities experimentally. Etnologinen tulkinta ja analyysi, 81–124. (in Finnish).
Palombo, H., Ziaie Tabari, A., Lende, D., Ligatti, J., & Ou, X. (2020). An ethnographic understanding of software (in) security and a co-creation model to improve secure software development. In Proceedings of the sixteenth USENIX conference on usable privacy and security (SOUPS’ 20) (pp. 205–220). USENIX Association.
Pandian, A. (2019). A possible anthropology: Methods for uneasy times. Duke University Press.
Perrow, C. (1999). Normal accidents. Princeton University Press.
Poller, A., Kocksch, L., Türpe, S., Epp, F. A., & Kinder-Kurlanda, K. (2017). Can security become a routine? A study of organizational change in an agile software development group. In Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing (CSCW ’17), 2489–2503. Association for Computing Machinery. https://doi.org/10.1145/2998181.2998191
Ramakrishnan, K., O’Reilly, K., & Budds, J. (2021). The temporal fragility of infrastructure: Theorizing decay, maintenance, and repair. Environment and Planning E: Nature and Space, 4(3), 674–695. https://doi.org/10.1177/2514848620979712
Sørensen, E. (2009). The materiality of learning: Technology and knowledge in educational practice (Learning in doing: Social, cognitive and computational perspectives). Cambridge University Press. https://doi.org/10.1017/CBO9780511576362
Spencer, M., & Pizio, D. (2023). The de-perimeterisation of information security: The Jericho Forum, zero trust, and narrativity. Social Studies of Science, 3063127231221107. Advance online publication. https://doi.org/10.1177/03063127231221107
Squires, S., & Shade, M. (2015). People, the weak link in cyber-security: Can ethnography bridge the gap? Ethnographic Praxis in Industry Conference Proceedings, 1, 47–57. https://doi.org/10.1111/1559-8918.2015.01039
Star, S. L. (1990). Power, technology and the phenomenology of conventions: On being allergic to onions. The Sociological Review, 38(1_suppl), 26–56. https://doi.org/10.1111/j.1467-954X.1990.tb03347.x
Star, S. L. (1999). The ethnography of infrastructure. American Behavioral Scientist, 43(3), 377–391. https://doi.org/10.1177/00027649921955326
Star, S. L., & Strauss, A. (1999). Layers of silence, arenas of voice: The ecology of visible and invisible work. Computer Supported Cooperative Work (CSCW), 8, 9–30. https://doi.org/10.1023/A:1008651105359
Strathern, M. (2002). Abstraction and decontextualization. An anthropological comment. In S. Woolgar (Ed.), Virtual society?: Technology, cyberbole, reality (pp. 302–314).
Suchman, L. (2006). Human-machine reconfigurations: Plans and situated actions. In Learning in doing: Social, cognitive and computational perspectives (2nd ed.). Cambridge University Press. https://doi.org/10.1017/CBO9780511808418
Sundaramurthy, S. C., Case, J., Truong, T., Zomlot, L., & Hoffmann, M. (2014). A tale of three security operation centers. In Proceedings of the 2014 ACM workshop on security information workers (SIW’ 14) (pp. 43–50). Association for Computing Machinery. https://doi.org/10.1145/2663887.2663904
Tsing, A. L. (2004). Friction. Princeton University Press.
Tsing, A. L. (2015). The mushroom at the end of the world: On the possibility of life in capitalist ruins. Princeton University Press.
Winthereik, B. R. (2020). Is ANT’s radical empiricism ethnographic? In A. Blok, I. Farias, & C. Roberts (Eds.), The Routledge companion to actor-network theory (pp. 24–33). Routledge.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Kocksch, L. (2024). Introduction. In: Fragile Computing. Palgrave Macmillan, Singapore. https://doi.org/10.1007/978-981-99-9807-4_1
Download citation
DOI: https://doi.org/10.1007/978-981-99-9807-4_1
Published:
Publisher Name: Palgrave Macmillan, Singapore
Print ISBN: 978-981-99-9806-7
Online ISBN: 978-981-99-9807-4
eBook Packages: Social SciencesSocial Sciences (R0)