Gesellschaftswissenschaften
Refine
Year of publication
- 2017 (2)
Document Type
- Report (2)
Language
- English (2)
Has Fulltext
- yes (2)
Is part of the Bibliography
- no (2)
Keywords
- Africa (1)
- Global South (1)
- ICT (1)
- United States (1)
- development (1)
- facebook free basics (1)
- ir theory (1)
- ontological security (1)
- torture (1)
In the Global South, private corporations and development aid programs are widely implementing information and communication technology (ICT). Stakeholders export infrastructure (including satellites, drones, and white spaces technology) as well as mobile and internet services (mobile money services, zero-rating), following the proclaimed goal to close the global digital divide. They particularly target under-connected regions in Africa, as Africa shows the lowest levels of internet connectivity (cf. International Telecommunications Union 2017). According to companies and development aid programs, these digitalization efforts in the Global South are key to development and security. However, an ethical perspective points to concerns about the practice of digitalization in the Global South. One central concern is that certain values are inscribed in ICT, and that they may be indirectly implemented through technology in the importing countries. Thus, the export of ICT by Western companies and development aid programs to the Global South may have a "neo-colonial" character. This raises ethical questions about global justice...
In recent years, Ontological Security Theory (OST) has been established as a new theory in the field of International Relations. The theory seeks to explain state behavior, and offers a new perspective on the security dilemma and the persistence of conflicts. It has proven itself helpful in explaining seemingly irrational state behavior such as an aggressive foreign policy by weak states or the provision of humanitarian aid by powerful nations. OST further allows scholars to analyze norm-violating behavior of states, for instance the use of torture at the hands of Americans in the War on Terror. If you have not engaged with the theory before, you might want to learn about its core arguments as well as its potential and limitations in the following. For those who know the theory well, let me show you how the theory was key to gaining new insights in my research.