32
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Sociotechnical imaginaries of a secure future

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The article examines the increasingly important role played by technology in the domain of public security in Germany, illustrating its effects on social life. In order to illuminate developments that govern the adoption of security technologies and render them in their dependencies comprehensible, we present two plausible and consistent future scenarios for Germany 2035. Following Jasanoff and Kim, these scenarios are theoretically conceived as two competing “sociotechnical imaginaries” which implies different trajectories for shaping the future. In these imaginaries, security technologies condition social change, and vice versa, in a mutually interdependent process. On the basis of current literature in tandem with a structured scenario development process, we condensed the present sociotechnical imaginaries into two tangible future scenarios for the field of public security, illustrating its effects on how we live as a society. Our overarching goal is to identify key factors that will mediate future developments, and, by extension, to facilitate discussion on the type of future we find collectively desirable. The analysis of impact factors resulted in ten key factors that play a crucial role for the use of security technologies and serve as a leverage for shaping the future. Projections of these factors lead to two narrative scenarios “To Be Ahead” and “Turn Back The Clock”.

          Related collections

          Most cited references53

          • Record: found
          • Abstract: not found
          • Article: not found

          The Social Amplification of Risk: A Conceptual Framework

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Containing the Atom: Sociotechnical Imaginaries and Nuclear Power in the United States and South Korea

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              The ethics of algorithms: Mapping the debate

                Bookmark

                Author and article information

                Contributors
                lars.gerhold@fu-berlin.de
                Journal
                Eur J Futures Res
                European Journal of Futures Research
                Springer Berlin Heidelberg (Berlin/Heidelberg )
                2195-4194
                2195-2248
                21 June 2021
                21 June 2021
                2021
                : 9
                : 1
                : 7
                Affiliations
                GRID grid.14095.39, ISNI 0000 0000 9116 4836, Working Group Interdisciplinary Security Research, Institute of Computer Science, , Freie Universität Berlin, ; Carl-Heinrich-Becker-Weg 6-10, 12165 Berlin, Germany
                Author information
                http://orcid.org/0000-0001-8461-1201
                Article
                176
                10.1186/s40309-021-00176-1
                8215639
                fe6654ee-8911-4919-94af-c7c3ce722c47
                © The Author(s) 2021

                Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

                History
                : 22 January 2021
                : 24 May 2021
                Funding
                Funded by: FundRef http://dx.doi.org/10.13039/501100001659, Deutsche Forschungsgemeinschaft;
                Funded by: Freie Universität Berlin (1008)
                Categories
                Research Article
                Custom metadata
                © The Author(s) 2021

                security studies,futures studies,security foresight,security technology,scenario method,public security,sociotechnical development,sociotechnical imaginaries,technization of security

                Comments

                Comment on this article