000 02498nab a2200241 4500
999 _c11698
_d11698
003 OSt
005 20210610122700.0
007 cr aa aaaaa
008 210610b ||||| |||| 00| 0 eng d
100 _aKeenan, Kevin Patrick
_946178
245 _aCreating spaces of public insecurity in times of terror: The implications of code/space for urban vulnerability analyses
260 _bSage,
_c2019.
300 _aVol 37, Issue 1, 2019 (81-101 p.)
520 _aFrom data leaks of sensitive information to the degrading or halting of complete systems upon which integral societal process rely, there are daily reminders of the precariousness of networked institutions. This form of vulnerability extends beyond services to also threaten foundational values, such as privacy, movement, and free speech. Yet, given the awareness of vulnerability to cyber disruption, little is known about how massive cyber failures might disrupt the lives of ordinary people at a micro-scale. Because technology is imbued in everyday life, and people use internet systems in bundled, complex ways to accomplish a myriad of unknown activities, a complicated web of cyber-vulnerability likely exists. Thus, the goal of this paper is to explore one dimension of this vulnerability as it pertains to public security. Terrorism is predicted to remain an urban phenomenon, and terrorists are increasingly exploiting cyber-systems. The aims of terrorism to disrupt democratic systems are perfectly achieved by cyber disruption, and this paper explores how those goals were facilitated during the Boston Marathon Bombing in 2013. By drawing on interviews with public safety officials and ordinary people who relied on the internet and linked technology during that emergency, I demonstrate the complex ways that cyber-systems limited the effectiveness of public security in times of terror. The results suggest a rethinking of the social amplification of risk paradigm that dominates in risk hazards research as well as several policy interventions in security communication and information dissemination, population management during crisis, and resilience.
650 _aTerrorism,
_939548
650 _acyber-vulnerability,
_946179
650 _a vulnerability analysis,
_942300
650 _asocial media,
_946180
650 _a internet
_946181
773 0 _08872
_915873
_dLondon Pion Ltd. 2010
_tEnvironment and planning C:
_x1472-3425
856 _uhttps://doi.org/10.1177/2399654418776660
942 _2ddc
_cART