Enacting Expertise: Ritual and Risk in Cybersecurity

Open Access Journal | ISSN: 2183-2463

Article | Open Access

Enacting Expertise: Ritual and Risk in Cybersecurity


  • James Shires Department of Politics and International Relations, University of Oxford, UK


Full Text   PDF (free download)
Views: 3605 | Downloads: 2918


Abstract:  This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges. It proposes that cybersecurity expertise is best understood as a skilled performance which satisfies decision-makers’ demands for risk management. This alternative understanding of cybersecurity expertise enables investigation of the types of performance involved in key events which congregate experts together: cybersecurity conferences. The article makes two key claims, which are empirically based on participant observation of cybersecurity conferences in the Middle East. First, that cybersecurity conferences are ritualized activities which create an expert community across international boundaries despite significant political and social differences. Second, that the ritualized physical separation between disinterested knowledge-sharing and commercial advertisement at these conferences enacts an ideal of “pure” cybersecurity expertise rarely encountered elsewhere, without which the claims to knowledge made by cybersecurity experts would be greatly undermined. The approach taken in this article is thus a new direction for cybersecurity research, with significant implications for other areas of international politics.

Keywords:  conference; cybersecurity; expertise; Middle East; performance; skills gap

Published:  


DOI: https://doi.org/10.17645/pag.v6i2.1329


© James Shires. This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 license (http://creativecommons.org/licenses/by/4.0), which permits any use, distribution, and reproduction of the work without further permission provided the original author(s) and source are credited.