Emily Bienvenue | Flinders University of South Australia (original) (raw)
Uploads
Papers by Emily Bienvenue
International Affairs
Infrastructural power in the United States, which is the capacity to extract and deploy social re... more Infrastructural power in the United States, which is the capacity to extract and deploy social resources and initiate and harness technological innovation, is increasingly generated by private internet capital and exercised by digital platforms. In this article we argue that while these private actors do not possess legitimacy, this is a form of ‘virtual sovereignty’ which complicates the capacity of the US state to exercise infrastructural power. Though internet software was designed largely by US corporations, commercial users operate increasingly in deterritorialized global spaces, where citizen consent and the interests of the US state are not business priorities. Moreover, much of the internet's hardware is financed by private internet capital within global wealth chains and digital spaces populated by US and non-US corporations. We argue that digital platforms acquire infrastructural power through the accumulation and commercialization of big data, from which they curate i...
Australian Society of Operations Research and Defence Operations Research Symposium, National Conference, 2018
INNOVATIVE TEACHING PRACTICES FOR 4G STUDENTS, 2019
The Cyber Defense Review, Mar 1, 2021
Piracy has been steadily increasing in the waters off the coast of Somalia since 2005. The reacti... more Piracy has been steadily increasing in the waters off the coast of Somalia since 2005. The reactions to the rising instances of piracy, particularly in the Gulf of Aden, have resulted in the largest internationally coordinated naval deployments in modern history. However, the military approach taken in response to piracy has seen limited effects with only marginal decreases in numbers of attacks in 2009. The limited efficacy of the current approach to piracy can be attributed to the failure to recognise and seek to address the root causes of the phenomena of piracy. The international naval deployment, the primary response to Somali piracy, has been guided by the claim that a previous approach taken to piracy in the Malacca Straits can successfully be applied to the Gulf of Aden. This article seeks to analyse the typology of Somali piracy and its causal factors. Its aim is to identify the issues which need to be addressed as part of a comprehensive solution to the problem. In doing s...
Australian Journal of International Affairs
Australasian Review of African Studies, 2010
International Affairs
Greater uncertainty characterizes Australia's strategic environment. Power transitions in the... more Greater uncertainty characterizes Australia's strategic environment. Power transitions in the Indo-Pacific test US primacy at a time when Australia as a major US alliance partner is encountering new asymmetric, society-centric threats from state and non-state actors in what is called the ‘cognitive battlespace’. This is a different kind of warfare, utilizing information as military force. Threats take the form of direct manipulation of interconnected, information-rich environments. Securing the national interest from society-centric threats involving the ‘weaponization of information’, especially of social media and the global corporate platforms upon which they operate, poses considerable strategic, conceptual and technological challenges for Australia's civilian and military cyber-defence agencies. We begin by briefly reviewing the evolution of the strategic culture underpinning Australia's understanding and use of military force, arguing that it is shaped largely by h...
International Affairs
Infrastructural power in the United States, which is the capacity to extract and deploy social re... more Infrastructural power in the United States, which is the capacity to extract and deploy social resources and initiate and harness technological innovation, is increasingly generated by private internet capital and exercised by digital platforms. In this article we argue that while these private actors do not possess legitimacy, this is a form of ‘virtual sovereignty’ which complicates the capacity of the US state to exercise infrastructural power. Though internet software was designed largely by US corporations, commercial users operate increasingly in deterritorialized global spaces, where citizen consent and the interests of the US state are not business priorities. Moreover, much of the internet's hardware is financed by private internet capital within global wealth chains and digital spaces populated by US and non-US corporations. We argue that digital platforms acquire infrastructural power through the accumulation and commercialization of big data, from which they curate i...
Australian Society of Operations Research and Defence Operations Research Symposium, National Conference, 2018
INNOVATIVE TEACHING PRACTICES FOR 4G STUDENTS, 2019
The Cyber Defense Review, Mar 1, 2021
Piracy has been steadily increasing in the waters off the coast of Somalia since 2005. The reacti... more Piracy has been steadily increasing in the waters off the coast of Somalia since 2005. The reactions to the rising instances of piracy, particularly in the Gulf of Aden, have resulted in the largest internationally coordinated naval deployments in modern history. However, the military approach taken in response to piracy has seen limited effects with only marginal decreases in numbers of attacks in 2009. The limited efficacy of the current approach to piracy can be attributed to the failure to recognise and seek to address the root causes of the phenomena of piracy. The international naval deployment, the primary response to Somali piracy, has been guided by the claim that a previous approach taken to piracy in the Malacca Straits can successfully be applied to the Gulf of Aden. This article seeks to analyse the typology of Somali piracy and its causal factors. Its aim is to identify the issues which need to be addressed as part of a comprehensive solution to the problem. In doing s...
Australian Journal of International Affairs
Australasian Review of African Studies, 2010
International Affairs
Greater uncertainty characterizes Australia's strategic environment. Power transitions in the... more Greater uncertainty characterizes Australia's strategic environment. Power transitions in the Indo-Pacific test US primacy at a time when Australia as a major US alliance partner is encountering new asymmetric, society-centric threats from state and non-state actors in what is called the ‘cognitive battlespace’. This is a different kind of warfare, utilizing information as military force. Threats take the form of direct manipulation of interconnected, information-rich environments. Securing the national interest from society-centric threats involving the ‘weaponization of information’, especially of social media and the global corporate platforms upon which they operate, poses considerable strategic, conceptual and technological challenges for Australia's civilian and military cyber-defence agencies. We begin by briefly reviewing the evolution of the strategic culture underpinning Australia's understanding and use of military force, arguing that it is shaped largely by h...