How Does Critical Security Compare with Traditional Security Studies?

1904 Words4 Pages

What is critical security, what does it focus on comparing with the traditional security studies? While various protests arise with the outbreak of the 2013 NSA scandal, the enthusiasm about political participation has once again raised the public’s attention (Deutsche Welle, 2013). This leads to criticism of social controversies, such as privacy protections that the global political system is facing today. The society is divided in its opinion of whether the government has reached too far to restraining individual’s cyber privacy in practice, for not asking permission and enters searching information for his or her own interest. Others argue that the current circumstance is a reflection of government’s hopeless attempts to conceive an alternative solution for the aftermath of a lax regulation and inefficient policymaking. Overall, various research has shown an occurrence that the task before us is not easy while they are up against all odds.
But before we start to take a look into the recent issues of cyber privacy, we must answer the questions in regards of how should we analysis the cyber securitization via critical security aspects? Traditional Security studies argues that the national security is essential to all citizens, because that in a anarchy and competitive arm force battle, only when the country is secured, the people will therefore be secured in the same manner. In other words, if the country is not secure, the government does not guarantee the individual’s security. The traditional security studies reflect the crucial reality of the current status and the balance of power between the states; then again, as critical security studies scholars will point out: not everyone will be impact directly from military force but...

... middle of paper ...

..., hackers have found that the use of pure media renderer can be much successful than simply planning attacks through weapons of mass destruction.
Of course, there are many amazing achievements that have been achieved through the use of cyber resource, and many of them might or might not come from a not so clean background where the attack on privacy was used (Huffington Post, 2013). State leaders frequently be confront actions of turning a blind eye on privacy protections in cyberspace for political interests, howbeit, because the national security critical infrastructure - including power are now tightly attached with cyber network, such as the American federal judiciary filling systems or major broadcast news publisher. (Washington Times, 2013) The leaders are often stuck in making the tough decisions of what kind of actions should they use and to what degrees.

More about How Does Critical Security Compare with Traditional Security Studies?

Open Document