ECPR

Install the app

Install this application on your home screen for quick and easy access when you’re on the go.

Just tap Share then “Add to Home Screen”

ECPR

Install the app

Install this application on your home screen for quick and easy access when you’re on the go.

Just tap Share then “Add to Home Screen”

Technological Standards of 5G Communication in Light of the Theory of Security Protocolarization

China
Regulation
Security
Internet
Communication
Technology
Empirical

Abstract

The aim of the presentation will be to demonstrate how the theory of security protocolarization can be utilized as a theoretical framework applied to describe 5G technology as a tool for interstate competition. The concept of the protocol will be employed to describe two dimensions. Firstly, as an element of heuristics activated in the process of diagnosing and securitizing the threat posed by Chinese technological entities (including ZTE and Huawei). The second dimension will constitute the aspect of technological standards, which not only provide a neutral solution to technical issues but also serve as a crucial element in supporting state security and international competition. The protocol acting as heuristics will be described as a tool simplifying the process of interpreting "enemies," "friends," and "threats" in the context of actions taken by various actors, especially the American administration, technological corporations, and standard-setting bodies. The result of these entities’ actions may be the division of the world into "technological spheres of influence," where technological standards serve as the cohesive element of individual parts. Both of these dimensions appear to operate with a logic consistent with the concept of security protocoliarization. The point of intersection – the security protocol manifesting as heuristics and the security protocol as a technical standard, and their mutual interactions, will constitute the central focus of the considerations made in the presentation.