Skip to main content Link Menu Expand (external link) Left Arrow Right Arrow Document Search Copy Copied

Critical Discourse Analysis

We used critical discourse analysis to examine the primary sources, focusing on words and phrases with ideological associations and metaphorical content in framing security crises. This method helped us identify the values, beliefs, and assumptions conveyed within and across the cases. Our goal was to understand the “creation and composition” of data breaches as security crises1 and how this framing is connected to the social, political, and historical contexts in which these events occur.2

Using discourse analysis, the research team employed a two-fold approach to data collection and analysis. First, for each data breach case, we created summaries for each primary source and developed a higher-level narrative for each case, noting the descriptions and metaphors used to characterize perpetrators, breach framing, perceived risk, victims, and data. Second, we entered these observations into an Excel spreadsheet, tracking the language and expressions used to describe the victims, perpetrators, breach, data compromised, and crisis framing.2

The research team used a two-step approach to data collection and analysis with discourse analysis. First, for each data breach case, we summarized each primary source and developed a comprehensive narrative, noting the descriptions and metaphors used for perpetrators, breach framing, perceived risk, victims, and data. Second, we recorded these observations in an Excel spreadsheet, tracking the language and expressions used to describe the victims, perpetrators, breach, compromised data, and crisis framing.2 3

  1. Liebetrau, T., and Christensen, K.K. (2020). The ontological politics of cyber security: Emerging agencies, actors, sites, and spaces. European Journal of International Security, 6(1), 25-43. 

  2. Zeffiro, Andrea., Niessen, Gil, Oberst, Clementine, McEwan, Sam, Cochrane, Alexis, Carlota, Durand, Joshua. (2023). “Discourses on cybersecurity: The politics of the data breach as a security crisis.” Rivista di Digital Politics. pp. 369-398. https://www.rivisteweb.it/doi/10.53227/106451  2 3

  3. Helmreich, S. (2000). Flexible infections: Computer viruses, human bodies, nation-states, evolutionary capitalism. Science, Technology, & Human Values, 25(4), 474. https://doi.org/10.1177/016224390002500404