Skip to main content Link Menu Expand (external link) Left Arrow Right Arrow Document Search Copy Copied

Critical Discourse Analysis

We employed critical discourse analysis to examine the primary sources, focusing on words and phrases with ideological associations and metaphorical content in framing security crises (Gill 2000). This method allowed us to identify the values, beliefs, and assumptions communicated within and across the cases. Our aim with discourse analysis was to understand the “creation and composition” of data breaches as security crises (Liebetrau & Christensen 2021) and how the framing of data breaches in this way connects to the social, political and historical contexts in which these events circulate.1

Using discourse analysis, the research team employed a two-fold approach to data collection and analysis. First, for each data breach case, we created summaries for each primary source and developed a higher-level narrative for each case, noting the descriptions and metaphors used to characterize perpetrators, breach framing, perceived risk, victims, and data. Second, we entered these observations into an Excel spreadsheet, tracking the language and expressions used to describe the victims, perpetrators, breach, data compromised, and crisis framing.1

The analysis focused on how news media construe data breaches as crises. However, we did not aim to define data breaches solely through these representations or track discursive changes over time. Instead, we understand these security crisis discourses as examples of what Michel Foucault described as “normalizing discourses.”2 3 In short, we traced the factors that contributed to framing a data breach as a security crisis. Our research reveals how the production, negotiation, and management of data breaches as security crises emerge from a cultural matrix of meaning.1 4

  1. Zeffiro, Andrea., Niessen, Gil, Oberst, Clementine, McEwan, Sam, Cochrane, Alexis, Carlota, Durand, Joshua. (2023). “Discourses on cybersecurity: The politics of the data breach as a security crisis.” Rivista di Digital Politics. pp. 369-398. https://www.rivisteweb.it/doi/10.53227/106451  2 3

  2. Foucault, M. (1972). The archaeology of knowledge. Trans. A. Sheridan Smith. New York: Pantheon Books. 

  3. Foucault, M. (1978). The history of sexuality: Volume I. New York: Random House. 

  4. Helmreich, S. (2000). Flexible infections: Computer viruses, human bodies, nation-states, evolutionary capitalism. Science, Technology, & Human Values, 25(4), 474. https://doi.org/10.1177/016224390002500404