Publications & Projects

On this page you can follow my recent academic activity, both upcoming conferences and publications.

Conferences, Presentations, Workshops

  • Association of Internet Researchers, Internet Rules!, Berlin 5-8 October 2016.
  • Workshop @ Karl-Arnold Stiftung, Sicherheitspolitisches Seminar “Kampfdrohnen, Roboter und der Krieg der Zukunft. Die Auswirkungen neuer Waffen und Aufklärungssysteme auf zukünftige Kriege”, Vortrag zum Thema “Der Cyber Space als Kriegsschauplatz – Gefährdungseinschätzung und Sicherheitsstrategien der westlichen Staaten”, 15.07.2016. [Workshop held at Karl-Arnold Foundation, Topic “Cyberspace as a Battlefield – Risk assessemnt and security strategies of Western States]
  • CyCon 2016 – Cyber Power,  organised by the NATO Cooperative Cyber Defence Centre of Excellence, 1-3 June 2016. Participating as guest.
  • 15th Annual STS Conference Graz 2016 – Critical Issues in Science, Technology and Society Studies, 9-10 May 2016, Paper presentation on “From End-to-End to Total Control. Technological Dramas and NSA Counter-Artifacts to the Internet”
  • 7th Biannual Surveillance and Society Conference in Barcelona (20-23 April 2016), Paper presentation “IR turning to the dark side. A Bourdieu-inspired analysis of the dark norm of espionage.”Slides
  • 18 November: The Cyberwar-Surveillance Nexus, part of the “Human rights in the digital Age” Lecture Series organized by Amnesty International Jena.
  • Vortrag “Crash Course Krieg im/mit dem Internet” Reservistenkameradschaft Jena, 5.12.2015. [Presentation, Crash Course on War in/with Cyberspace, held at Reserve Officer Meeting in Jena]
  • 17-18 October, 2nd Graduate Conference. Why Discourse Matters? in Frankfurt a.M.
  • 9-10 October, DVPW Workshop Constructivist Theories of Practice. I will present a paper on “Technology, Norms and the Surveillance Practice”
  • 25-27 September DVPW Annual Conference (International Relations Section) in Magdeburg, Germany.
  • 1-4 September 2014,”Text Mining in Political Science”, Workshop from the ePol-Project in Hamburg, Germany.
  • 24 -26 April 2014 “6th Biannual Surveillance and Society Conference in Barcelona. Paper on the surveillance legitimization discourse in Germany
  • 20. November 2013 Workshop for authors, SIRA Security Project Munich
  • 17. November 2012 DGFP Annual Conference


  • Schulze, M. (2017). Clipper Meets Apple vs. FBI—A Comparison of the Cryptography Discourses from 1993 and 2016. Media and Communication, 5(1). (PDF)
  • Schulze, Matthias (2017), Rezension “Hayden, M. V. (2016). Playing to the Edge: American Intelligence in the Age of Terror. New York: Penguin Press, Zeitschrift für Außen- und Sicherheitspolitik.
  • Schulze, Matthias, From End-to-End to Total Control. Technological Dramas and NSA Counter-Artifacts to the Internet, Paper presented at 15 Annual STS Conference in Graz 2016 (in preparation)
  • Ries, Florian & Schulze, Matthias (2016), Social Network Analysis in Inter-Organizational Relations, in: Biermann, R./ Koops J., Handbook of Inter-Organizational Relations. Palgrave.
  • Schulze, Matthias (2016), Unsicherheit hinter dem Bildschirm. Die Versicherheitlichung des Internets, in: Masala, C./ Fischer, S. (eds.) Innere Sicherheit nach 9/11. Sicherheitsbedrohungen und immer neue Sicherheitsmaßnahmen? VS Verlag. Wiesbaden. [engl. Insecurity behind the screen. The securitization of the Internet]
  • Schulze, Matthias (2015). Patterns of Surveillance Legitimization: The German Discourse on the NSA Scandal. Surveillance & Society 13(2): 197-217
  • Schulze, Matthias (2013). Die Sprache der Un-Sicherheit. Die Konstruktion von Bedrohung im sicherheitspolitischen Diskurs der BRD, Tectum.[engl. The language of Insecurity. The construction of threat in the German security discourse]

Dissertation (2012-2017)

The aim of this dissertation is to understand the normative change of the US government regarding cyberspace. The current NSA scandal and other recent developments in electronic warfare and total information awareness programs now shape the predominant approach of the US government towards cyberspace. These developments are symptoms of a concrete phenomenon, a paradigm that is based on a military logic. Internet control, electronic warfare and surveillance are phenomena that resemble a new norm, the norm of internet control, which is based on a cyber-realist policy paradigm that became hegemonic in the US discourse on cyberspace (Manjikian 2012). This is a remarkable shift in perspective because during the early days of the Internet, the US government adopted a “hands-off” or “laissez-faire” approach and the discourse was one of liberalization and democratization (Deibert & Rohozinski 2010, 49). The task is to analyze ideational and normative change regarding the Internet from a more utopian and libertarian perspective towards a militarized paradigm. The aim is to trace the causal mechanism that led to this ideational and normative change. The primary research questions is: Which process leads to the development of Internet control as the dominant paradigm for states in dealing with Cyberspace? The centerpiece is the focus on causal configurations or the process that made the outcome possible (Blatter & Blume 2008). Process tracing is going to be combined with Critical Discourse Analysis. The underlying assumption is that a plurality of factors work together in creating this outcome. This dissertation draws on the theoretical and methodological input from a variety of disciplines: sociology, science and technology studies, international relations and policy analysis, combining different elements into one framework for analyzing normative change.Drawing from the theoretical chapter, three factors are especially relevant: A) the origin of (technological) norms at the very beginning of the process, B) the role of competing advocacy coalitions in establishing their paradigms as dominant and C) external events like shocks or the process of technological diffusion.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s