Araştırma Makalesi
BibTex RIS Kaynak Göster

Siber Güvenlik Söylemleri ve Toplumsal Güç İlişkileri: Dijital Güvenliğin Politik ve Stratejik Boyutları

Yıl 2025, Sayı: “MASS COMMUNICATION" SPECIAL ISSUE, 111 - 121

Öz

Dijital çağda siber güvenlik, yalnızca bilgi sistemlerini koruma pratiği olmaktan çıkarak, siyasal otorite, yönetişim ve toplumsal düzenin temel belirleyicilerinden biri haline gelmiştir. Başlangıçta teknik bir gereklilik olarak ele alınan bilgi güvenliği, günümüzde davranışların düzenlenmesi, dijital yurttaşların gözetimi ve ulusal–küresel bilgi akışlarının kontrolüyle doğrudan ilişkilidir. Bu çalışma, siber güvenlik söylemlerinin nasıl inşa edildiğini, dolaşıma sokulduğunu ve güç ilişkilerini meşrulaştırmak amacıyla nasıl kullanıldığını eleştirel bir perspektifle incelemektedir. Eleştirel güvenlik çalışmaları literatürü ve Foucault’nun iktidar–söylem kuramı çerçevesinde, “siber tehdit” kavramının nasıl bir varoluşsal tehlike olarak çerçevelendiği ve bu yolla devletlerin olağanüstü güvenlik önlemlerini nasıl meşrulaştırdığı analiz edilmiştir. Devlet strateji belgeleri, ulusal siber güvenlik politikaları ve medya söylemleri üzerinde gerçekleştirilen nitel söylem analizi, siber güvenlik söylemlerinin çoğu zaman “güvenliklendirme” işlevi gördüğünü ortaya koymaktadır. Bu süreçte teknik riskler, toplumsal korkulara dönüştürülerek, dijital alanlarda artan gözetim, denetim ve düzenleyici müdahaleler rasyonelleştirilmektedir. Böylece siber güvenlik, yalnızca koruma sağlayan bir araç değil, aynı zamanda kimlerin tehdit, kimlerin korunmaya değer olduğu üzerine toplumsal kararları şekillendiren bir iktidar diline dönüşmektedir. Elde edilen bulgular, siber güvenliğin dijital altyapıları koruma amacının ötesine geçerek, çağdaş toplumlarda yeni kontrol biçimlerini ve asimetrik güç yapılarını yeniden ürettiğini göstermektedir. Güvenlik, bilgi ve yönetişim arasındaki bu ilişki, dijital çağın yeni bir “teknopolitik düzen” inşasının temel dinamiğini oluşturmaktadır.

Kaynakça

  • Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers.
  • Carr, M. (2016). US power and the internet in international relations: The irony of the information age. Palgrave Macmillan.
  • Castells, M. (2010). The rise of the network society (2nd ed.). Wiley-Blackwell. https://doi.org/10.30935/cedtech/6177
  • DeNardis, L. (2020). The Internet in everything: Freedom and security in a world with no off switch. Yale University Press.
  • Foucault, M. (1977). Discipline and punish: The birth of the prison. Vintage Books.
  • Foucault, M. (1980). Power/Knowledge: Selected interviews and other writings 1972–1977. Pantheon Books.
  • Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155–1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x
  • Lyon, D. (2018). The culture of surveillance: Watching as a way of life. Polity Press. https://doi.org/10.4000/communication.11962
  • Nye, J. S. (2017). Cyber power. Harvard Kennedy School.
  • Solms, B. von, & Niekerk, J. van (2013). From information security to cyber security. Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004
  • Nye, J. S. (2017). Soft Power and Public Diplomacy Revisited. The Hague Journal of Diplomacy, 12(1-2), 1–6. https://doi.org/10.1163/1871191X-14101013
  • Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York: PublicAffairs. https://doi.org/10.1007/s00146-020-01100-0
  • Lacy, M., & Prince, D. (2018). Media framing of cyber threats: The social construction of security. Journal of Information Warfare, 17(2), 1–14.
  • Bauman, Z., & Lyon, D. (2013). Liquid surveillance: A conversation. Polity Press. https://doi.org/10.22230/CJC.2014V39N3A2843
  • Deibert, R. (2013). Black code: Inside the battle for cyberspace. McClelland & Stewart.
  • Floridi, L. (2022). The ethics of information (2nd ed.). Oxford University Press. https://doi.org/10.1093/acprof:oso/9780199641321.001.0001
  • Rid, T. (2020). Active measures: The secret history of disinformation and political warfare. Farrar, Straus and Giroux.
  • Deleuze, G. (1992). Postscript on the societies of control. October, 59(1), 3–7.
  • Foucault, M. (1980). Power/knowledge: Selected interviews and other writings, 1972–1977 (C. Gordon, Ed.). Harvester Press.
  • Bigo, D. (2002). Security and immigration: Toward a critique of the governmentality of unease. Alternatives: Global, Local, Political, 27(1_suppl), 63–92. https://doi.org/10.1177/03043754020270S105
  • Eriksson, J., & Giacomello, G. (2006). The information revolution, security, and international relations: (IR)relevant theory? International Political Science Review, 27(3), 221–244. https://doi.org/10.1177/0192512106064462
  • Duffield, M. (2019). Post-humanitarianism: Governing precarity in the digital world. Polity Press.
  • Beck, U. (1992). Risk society: Towards a new modernity. Sage Publications. https://doi.org/10.2307/3341155

Cybersecurity Discourses and Social Power Relations: The Political and Strategic Dimensions of Digital Security

Yıl 2025, Sayı: “MASS COMMUNICATION" SPECIAL ISSUE, 111 - 121

Öz

In the digital age, cybersecurity has evolved from merely a practice of protecting information systems into one of the fundamental determinants of political authority, governance, and social order. Initially approached as a technical necessity, information security today is directly linked to the regulation of behaviors, the surveillance of digital citizens, and the control of national and global information flows. This study critically examines how cybersecurity discourses are constructed, circulated, and employed to legitimize power relations. Within the framework of critical security studies and Foucault’s theory of power–discourse, it analyzes how the concept of “cyber threat” is framed as an existential danger and how this framing legitimizes extraordinary security measures by states.A qualitative discourse analysis of state strategy documents, national cybersecurity policies, and media narratives reveals that cybersecurity discourses often serve a “securitizing” function. In this process, technical risks are transformed into social fears, thereby rationalizing increased surveillance, control, and regulatory interventions in digital domains. Thus, cybersecurity becomes not merely a tool of protection but also a language of power that shapes social decisions about who constitutes a threat and who is deemed worthy of protection.The findings indicate that cybersecurity goes beyond the goal of safeguarding digital infrastructures, reproducing new forms of control and asymmetric power structures in contemporary societies. The relationship between security, information, and governance constitutes the fundamental dynamic of constructing a new “technopolitical order” in the digital age.

Kaynakça

  • Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers.
  • Carr, M. (2016). US power and the internet in international relations: The irony of the information age. Palgrave Macmillan.
  • Castells, M. (2010). The rise of the network society (2nd ed.). Wiley-Blackwell. https://doi.org/10.30935/cedtech/6177
  • DeNardis, L. (2020). The Internet in everything: Freedom and security in a world with no off switch. Yale University Press.
  • Foucault, M. (1977). Discipline and punish: The birth of the prison. Vintage Books.
  • Foucault, M. (1980). Power/Knowledge: Selected interviews and other writings 1972–1977. Pantheon Books.
  • Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155–1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x
  • Lyon, D. (2018). The culture of surveillance: Watching as a way of life. Polity Press. https://doi.org/10.4000/communication.11962
  • Nye, J. S. (2017). Cyber power. Harvard Kennedy School.
  • Solms, B. von, & Niekerk, J. van (2013). From information security to cyber security. Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004
  • Nye, J. S. (2017). Soft Power and Public Diplomacy Revisited. The Hague Journal of Diplomacy, 12(1-2), 1–6. https://doi.org/10.1163/1871191X-14101013
  • Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York: PublicAffairs. https://doi.org/10.1007/s00146-020-01100-0
  • Lacy, M., & Prince, D. (2018). Media framing of cyber threats: The social construction of security. Journal of Information Warfare, 17(2), 1–14.
  • Bauman, Z., & Lyon, D. (2013). Liquid surveillance: A conversation. Polity Press. https://doi.org/10.22230/CJC.2014V39N3A2843
  • Deibert, R. (2013). Black code: Inside the battle for cyberspace. McClelland & Stewart.
  • Floridi, L. (2022). The ethics of information (2nd ed.). Oxford University Press. https://doi.org/10.1093/acprof:oso/9780199641321.001.0001
  • Rid, T. (2020). Active measures: The secret history of disinformation and political warfare. Farrar, Straus and Giroux.
  • Deleuze, G. (1992). Postscript on the societies of control. October, 59(1), 3–7.
  • Foucault, M. (1980). Power/knowledge: Selected interviews and other writings, 1972–1977 (C. Gordon, Ed.). Harvester Press.
  • Bigo, D. (2002). Security and immigration: Toward a critique of the governmentality of unease. Alternatives: Global, Local, Political, 27(1_suppl), 63–92. https://doi.org/10.1177/03043754020270S105
  • Eriksson, J., & Giacomello, G. (2006). The information revolution, security, and international relations: (IR)relevant theory? International Political Science Review, 27(3), 221–244. https://doi.org/10.1177/0192512106064462
  • Duffield, M. (2019). Post-humanitarianism: Governing precarity in the digital world. Polity Press.
  • Beck, U. (1992). Risk society: Towards a new modernity. Sage Publications. https://doi.org/10.2307/3341155

Yıl 2025, Sayı: “MASS COMMUNICATION" SPECIAL ISSUE, 111 - 121

Öz

Kaynakça

  • Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers.
  • Carr, M. (2016). US power and the internet in international relations: The irony of the information age. Palgrave Macmillan.
  • Castells, M. (2010). The rise of the network society (2nd ed.). Wiley-Blackwell. https://doi.org/10.30935/cedtech/6177
  • DeNardis, L. (2020). The Internet in everything: Freedom and security in a world with no off switch. Yale University Press.
  • Foucault, M. (1977). Discipline and punish: The birth of the prison. Vintage Books.
  • Foucault, M. (1980). Power/Knowledge: Selected interviews and other writings 1972–1977. Pantheon Books.
  • Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155–1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x
  • Lyon, D. (2018). The culture of surveillance: Watching as a way of life. Polity Press. https://doi.org/10.4000/communication.11962
  • Nye, J. S. (2017). Cyber power. Harvard Kennedy School.
  • Solms, B. von, & Niekerk, J. van (2013). From information security to cyber security. Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004
  • Nye, J. S. (2017). Soft Power and Public Diplomacy Revisited. The Hague Journal of Diplomacy, 12(1-2), 1–6. https://doi.org/10.1163/1871191X-14101013
  • Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York: PublicAffairs. https://doi.org/10.1007/s00146-020-01100-0
  • Lacy, M., & Prince, D. (2018). Media framing of cyber threats: The social construction of security. Journal of Information Warfare, 17(2), 1–14.
  • Bauman, Z., & Lyon, D. (2013). Liquid surveillance: A conversation. Polity Press. https://doi.org/10.22230/CJC.2014V39N3A2843
  • Deibert, R. (2013). Black code: Inside the battle for cyberspace. McClelland & Stewart.
  • Floridi, L. (2022). The ethics of information (2nd ed.). Oxford University Press. https://doi.org/10.1093/acprof:oso/9780199641321.001.0001
  • Rid, T. (2020). Active measures: The secret history of disinformation and political warfare. Farrar, Straus and Giroux.
  • Deleuze, G. (1992). Postscript on the societies of control. October, 59(1), 3–7.
  • Foucault, M. (1980). Power/knowledge: Selected interviews and other writings, 1972–1977 (C. Gordon, Ed.). Harvester Press.
  • Bigo, D. (2002). Security and immigration: Toward a critique of the governmentality of unease. Alternatives: Global, Local, Political, 27(1_suppl), 63–92. https://doi.org/10.1177/03043754020270S105
  • Eriksson, J., & Giacomello, G. (2006). The information revolution, security, and international relations: (IR)relevant theory? International Political Science Review, 27(3), 221–244. https://doi.org/10.1177/0192512106064462
  • Duffield, M. (2019). Post-humanitarianism: Governing precarity in the digital world. Polity Press.
  • Beck, U. (1992). Risk society: Towards a new modernity. Sage Publications. https://doi.org/10.2307/3341155
Toplam 23 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Siyasal İletişim
Bölüm Araştırma Makalesi
Yazarlar

Rashad Mammadov 0009-0001-1213-938X

Gönderilme Tarihi 6 Kasım 2025
Kabul Tarihi 12 Aralık 2025
Yayımlandığı Sayı Yıl 2025 Sayı: “MASS COMMUNICATION" SPECIAL ISSUE

Kaynak Göster

APA Mammadov, R. (t.y.). Cybersecurity Discourses and Social Power Relations: The Political and Strategic Dimensions of Digital Security. ASSAM Uluslararası Hakemli Dergi(“MASS COMMUNICATION" SPECIAL ISSUE), 111-121. https://doi.org/10.58724/assam.1818761

 ASSAM-UHAD Nisan ve Kasım aylarında yayınlanan süreli ve elektronik basımı yapılan, uluslararası indeksli hakemli bir dergidir.