Sociotechnical imaginaries of a secure future

The article examines the increasingly important role played by technology in the domain of public security in Germany, illustrating its effects on social life. In order to illuminate developments that govern the adoption of security technologies and render them in their dependencies comprehensible, we present two plausible and consistent future scenarios for Germany 2035. Following Jasanoff and Kim, these scenarios are theoretically conceived as two competing “sociotechnical imaginaries” which implies different trajectories for shaping the future. In these imaginaries, security technologies condition social change, and vice versa, in a mutually interdependent process. On the basis of current literature in tandem with a structured scenario development process, we condensed the present sociotechnical imaginaries into two tangible future scenarios for the field of public security, illustrating its effects on how we live as a society. Our overarching goal is to identify key factors that will mediate future developments, and, by extension, to facilitate discussion on the type of future we find collectively desirable. The analysis of impact factors resulted in ten key factors that play a crucial role for the use of security technologies and serve as a leverage for shaping the future. Projections of these factors lead to two narrative scenarios “To Be Ahead” and “Turn Back The Clock”.


Background
Technologies condition social change, yet social change also conditions technological development. In this way, technologies are inseparable from the broader social contexts in which they arise. And while the increasing deployment of security technology can to some extent assure greater security in an objective sense, "security" itself is a normative concept. Accordingly, our understanding of security is inextricably linked to values and beliefs that are constantly in flux. In the broader social discussion concerning the dangers we face and how they should be addressed (viz. "security culture") [7], security technologies are one piece of the puzzle. For Jasanoff and Kim [25] and Stewart and Williams [53], security technologies and social developments mutually condition each other in a "co-evolutionary" process that precludes the identification of simple cause-and-effect relationships. Yet many security solutions-such as facial recognition technology and predictive policing-are not solely solutions to security-related problems. They are also an expression of innovation processes that are primarily driven by the private sector. This paper presents the results of a research project titled STAGe (Security Technologies and their Impact on Social Life), which seeks to examine the increasingly prominent role played by technology in the domain of public security. Ever-greater responsibility for public security is being delegated to technological systems [37,57]. From surveillance and identification systems to automated data analysis and storage, the influence of technological systems is now pervasive [5,28]. Technological innovation has been proceeding at a breathtaking pace in recent years [5,38], creating tensions with law governing police powers and individual privacy. Yet rapid technological advancements are not only changing how we live and communicate with each other as a society. They are also changing how we perceive the presence security technology in our everyday lives.
In addition to taking stock of current developments in the domain of security technology, the STAGe research project aims to illuminate how these developments impact public security and Germany society at large. In this paper, we sketch possible future developments in the area of security technology and consider in detail how they might reshape society.
Each hypothesized future is elaborated in a scenario development process that projects current developments into the future. In this connection, we strive to ensure that assumptions and their implications are internally consistent and plausible. One key benefit of these scenarios is that they can be used to illuminate how technological developments relate to ongoing political, social, and economic change. Whether or not a given hypothesized future will actually manifest is not the essential matter. Rather, the aim is to shed light on possible development paths in order to facilitate present-day decisions that will lay the groundwork for a desired future to occur.
The overarching research question that is addressed in this paper is as follows: "How will security technologies look in Germany in 10 to 15 years, and what might this entail for public security and social life?" In the next section of this paper, we couch this research question in a theoretical framework. We first introduce the premise that technology will place an increasingly prominent role in the domain of public security in coming years. Specifically, we describe our understanding of "technization" and "technology" in accordance with the current state of the literature. In line with the sociotechnical imaginaries of Jasanoff and Kim [25,26], we view trends in security technology as the outcome of a co-evolutionary process. In this process, the most powerful competing vision of the future prevails. In order to represent the current future visions, we see the scenario methodology to be suitable to transform them into plausible and tangible depictions of the future. The third part then describes our empirical approach and the scenario development methodology, which are crucially informed by the domain of future research. In this section, the specific working steps of our study are presented in detail. In the fourth section, we present two hypothetical futures that emerge from our scenario process. These visions of future, which are based on the extrapolation of current developments, constitute two contrasting sociotechnical imaginaries.

Literature review and theoretical considerations
Technology and public security The increasingly prominent role played by technology in the domain of public security has various causes. To some extent, it is the consequence of new technical possibilities in specific fields of application, e.g., in the fight against terrorism or crime [5]. However, processes of innovation in academia, industry, and government have also been propelling the adoption and economic success of security technologies [29,45]. In this connection, the deployment of innovative security technologies have often allowed political actors to advertise that action is being taken to assure security-even when the tangible benefits of such action is questionable [58].
The terrorist attacks of September 11, 2001, can be seen as a watershed moment in the expanded use of technology to provide security. In addition to catalyzing the adoption of new security laws and guidelines, the attacks intensified the surveillance of monetary transactions, trade, and human movement. Following the September 11 attacks, a wide range of new security technologies were adopted [28,29]. However, the September 11 attacks should be understood as intensifying already existent trends, as various events in prior decades, such as the IRA bombings of the 1970s, previously triggered the expanded use of surveillance technologies [5].
However, the expanded use of security technologies is not an inevitable consequence of such events. Rather, the decision to adopt a new technology or eliminate restrictions to its deployment is inherently bound up with a changing sociopolitical understanding of security and risk. In other words, the aforementioned historical incidents are intimately connected to shifting discourses around the issue of security [29]. To be sure, modern societies are becoming increasingly aware of their vulnerability to risk. In this connection, anxiety is triggered in particular by risks that are difficult to control given their complex and interconnected nature [3,29]. As a result, ever more areas of social life are falling under the domain of security discourse [4]. During the twentieth century, security was elevated to the status of an important societal value [29]. Against this backdrop, the growing role of technology in security can be understood as motivated by the desire to establish control over risks. Security technologies not only promise to avert risks, by facilitating preventive measures, but also to render them transparent and manageable, by enabling monitoring and control [29].
Security technologies themselves are subject to constant change, which can be seen in the transition from reactive to proactive justifications for their deployment [54]. With the scope of a proactive deployment logic, the permanent and comprehensive adoption of security measures is viewed as essential to avert disruptive events. At the same time, today's security technologies at not merely concrete objects, but also fluid expressions of power, as exemplified by the virtual nature of surveillance algorithms [2]. In this way, we find that surveillance technologies have evolved from salient to silent technologies [24], for they are invisible, inexpensive, and automated, while data gathering is ubiquitous and ongoing [34].
These developments are accompanied by numerous questions and challenges that have been widely discussed in the literature, but which can only be touched upon here [1,9,19,39,41,44,48]: Insofar as political decisions and the responsibility for establishing security are transferred to technical systems, questions are automatically raised as to their democratic legitimacy and amenability to control through the political process. Indeed, a lack of transparency in the provisioning of security is often associated with an "accountability deficit." Algorithm-based decision making (ADM) implies action based on probability calculations rather than human judgment. When used to predict crimes, ADM can have discriminatory consequences-such as when specific neighborhoods are increasingly targeted, or when given individuals are subjected to inspection multiple times. In some cases, lack of accountability is the direct product of shallow deliberative processes that place hope in a "technological fix" to resolve complex social problems [10].
Against this backdrop, we view it as increasingly important to discuss and consider where the growth of security technologies may lead, so that we can arrive at proportional and consensually determined approaches for dealing with dangers and risks. Prior to engaging in such a discussion, however, is important to clarify what is meant by "technology" and "technization."

Technology as a concept
This project draws on current research in the field of sociotechnology, which views technology and society as a dualism, as technology conditions society, and vice versa. Technologies are "tools for artificially generating causeeffect relationships that can be used to produce certain desired outcomes with sufficient reliability and repeatability" ( [50] p. 445 1 ). In this way, technology enables a process that ushers in effects otherwise not possible or only achievable with greater effort [49]. As is customary in the sociology of technology, we select a narrow definition of technology that encompasses physical/material artifacts within the domain of security technologies [22].
Technology is invariably embedded in a sociotechnical constellation, whereby man and technology condition each other in a process of "co-constitution" [51]. The human being knows how to use a given technology, and it has been modified to suit human actors. Technology only produces its effects within the scope of this relationship [35,51]. The adoption of a technology thus has societal implications. Technologies not only enable humans to perform actions beyond their natural capacities. They can shape human action to the point of coercion, and they are deeply integrated in everyday life, often to the degree of indispensability. In this way, they play a constitutive role in directing social and cultural change [22,44,46,50]. However, technological advancement should not be viewed as the dominant driver of social change, as technology is itself a product of society. Accordingly, new technologies do not emerge solely from considerations regarding how to optimize existing practices. Rather, they are shaped by the values and ideas prevalent at a given socio-historical moment [43,51]. The "technization of security" thus describes a process by which the security demands and expectations of society are increasingly fulfilled by technical systems. Prevailing norms and values are inherently inscribed into these systems [32], and their diffusion may depend on their social acceptance. Once implemented, security technologies develop a life of their own, and, in this way, may place constraints on the individual or on society [43].
Beyond explicitly desired effects, a technology may also generate unintended side effects [45]. Such side effects may be difficult to predict in today's highly connected society. Furthermore, they may only be identifiable once the diffusion of a technology is well advanced [44]. However, once a technology is firmly embedded into society, it may be difficult to modify or replace it [6]. The foregoing observations have been repeatedly confirmed in recent decades. Accordingly, there is an increasing need to assess in advance the potential effects that may emerge from new technologies [33].

Sociotechnical imaginaries
The societal and technical arrangements of the future that we hypothesize in relation to security technologies can be understood as "sociotechnical imaginaries," a codified term in the literature that refers to "collectively held, institutionally stabilized, and publicly performed visions of desirable futures, animated by shared understandings of forms of social life and social order attainable through, and supportive of, advances in science and technology" ( [26] p. 6). In this way, sociotechnical imaginaries are vehicles for the co-production and co-evolution of technology and society [26]. They are veritable images of the future, guiding activities toward a shared goal. In this connection, the actual capabilities and limitations of technical systems are less important than the vision of the future that is collectively held and desired. Aspects of the future imagined by individuals are taken up by a collective, invested with authority, and thereby manifested through collective action. Divergent imaginaries also stand in competition, each seeking to establish normative hegemony over an imaginable future. In the domain of public security, various normatively conditioned futures are possible. Indeed, there are a multitude of potential answers to the question of how the secure society of the future should look.
In the competition between imaginaries, some ultimately prevail, whether due to media-driven reinforcement [27,47] or securitization processes, e.g., by being addressed intensively by politicians, as highly relevant for ensuring security [4]. In this connection, the concept of "security culture" can have a descriptive and explanatory effect, for it encompasses negotiative processes concerning what is to be considered a threat and how it is to be addressed [7]. In this way, security culture shapes normative imaginaries.
Sociotechnical imaginaries explicate normative ideas and have an action-guiding or animating character, since they facilitate the rendering of judgments about possible futures. In this way, the systematic description of sociotechnical imaginaries have the benefit of allowing us to recognize, understand, and describe future developments. At the same time, sociotechnical imaginaries disclose differences between different collectives. These differences are particularly evident with a view to the putative benefits and effectiveness of security technologies, which are often linked to divergent socio-cultural contexts. In this way, this approach offers the supplementary advantage of allowing us to reflect on the sociocultural contexts that form collective visions of desirable and undesirable futures.

Methods
In this study, we rely on the scenario technique, which allows us to present sociotechnical imaginaries in form of plausible and consistent depictions of the future. The competing sociotechnical imaginaries can thus be condensed into descriptive and tangible scenarios. We aim to show which imaginaries are currently dominating the debate and competing with each other by developing futures based on these imaginaries. By pointing possible futures out and putting them up for discussion, we also put their origin, i.e., the current imaginaries, up for discussion. Technical innovations that are under development or envisioned for the future represent the primary building blocks of our scenarios. We understand scenarios as "logical, plausible and realistic situations based on today's knowledge, therefore giving an approximate idea of how the future may look. Whether, one day, the portrayed "possible future" does occur, is always uncertain" [ [18], p.71]. However, we do not take specific probability of their occurrence into account. Rather, after conducting a comprehensive review of the literature, we identify key factors relevant to the future of public security and place them in relation to each other. The characteristics of these factors are varied and then ascribed to possible future developments. Each resulting set of factors is assessed with a view to plausibility and consistency. These factor sets each yield a competing sociotechnical imaginary.
Our methodological approach is grounded in the notion that the future can be actively shaped. While we must acknowledge that the future is not fully predictable and controllable, it is also not wholly random or chaotic [15,31]. Indeed, the discipline of future studies holds that a number of divergent and alternative futures are possible [15,20]. Furthermore, our current actions and decisions help determine which of them will prevail [31]. The goal of our methodological approach is to present tangible, plausible, and consistent images of the future, which allows the reflection of current debates about security technologies and can inform which actions in the present are best-suited to bringing about desired future states [21,31,40].
In the following, we describe our methods for the development of each scenario in greater detail. Our work was composed of four working steps (see Fig. 1), which is a typical subdivision in the literature on the scenario method [15,23].

Analysis of the scenario environment
This first step aims to delimit and more closely define the subject of research by setting the focus, the time frame, and the geographical scope [42]. Our broader scenario environment is "public security in Germany" and our specific subject of research is "security technologies." We have selected 10 to 15 years as a chronological horizon for our analysis. This timeframe seems suitable, for it is long enough to consider the effects resulting from the broad adoption of technologies currently at a nascent stage, yet not so long so as necessitate speculation concerning technological advancements that are marked by significant uncertainty.
In this step, we also analyze the factors influencing our subject of research, and to what extent. We first performed an explorative horizon scanning process, which is an increasingly used technique in the scenario methodology. It has the advantage of less bias in comparison to conventional forecasting methods [56]. This work considered a range of sources, from academic papers and news reports to podcasts and policy papers, while considering the following questions: "Which security technologies are already in use or under development worldwide? What impacts will result from the implementation of these new technologies?" We identified sources relevant to these questions while considering two criteria: First, we only considered sources that addressed one or more technologies in connection with security as well as society, politics, or economics. Second, we only selected sources that discussed technologies in use or currently under development. This approach yielded collection of 77 media stories and 32 policy papers published between 2013 and 2019. The media stories originated from various national and international periodicals and news sites. We also gathered position papers released by German political parties as well as policy papers published by political institutions and research organizations in Germany, the US, and UK. Papers were taken into consideration insofar as they contained policy recommendations or assessments related to security technologies. Finally, a workshop with experts from diverse professional backgrounds was held to identify current developments in public security in Germany.
Based on these data, we identified various factors that would appear to exert an influence over the development of public security in coming years. They comprise parameters, developments, and trends [31]. To this end, we conducted a qualitative assessment of the source material while identifying relevant factors in various domains, including politics, economics, technology, law, and the environment. As part of a multi-stage collaborative process designed to augment the validity of our assessments, we distilled the factors thus identified into a smaller list of 15 impact factors. We then considered these impact factors in relation to each other with the aim to identify key drivers of change while also revealing interdependencies between factors. In the scope of an impact assessment, three researchers individually valuated for each impact factor the respective influence on another factor on an ordinal scale. For each factor, we sum up how much the researchers estimate the influence of one factor to another (active sum). We also sum up how much one factor was influenced by another (passive sum). Subsequently, the three evaluations were compared. Although the researchers had different views on how high the influence of a certain factor is, no strongly deviating evaluations were found. In the next step, we calculated mean values from the individual evaluations, which are presented in Fig. 2. The active and passive sums have been divided into four quadrants according to the mean values on each respective axis. Our interpretation of the quadrants is based on Kosow and Gaßner [31] and von Reibnitz [55]. Quadrant I contains dynamic key factors. They are characterized by a high degree of ambivalence and have strong reciprocal relationships with other factors. They are also particularly relevant for the design of strategies for the future. Quadrant II contains driving factors. These active or impulsive factors operate as a "lever" for future developments. Quadrant III contains inert factors that are not amenable to influence and also have little impact. The final Quadrant IV contains reactive factors. These factors are strongly driven by other factors and can therefore serve as a bellwether for other developments. We consider the factors in Quadrants I, II, and IV to be key factors. Figure 2 presents our results. The figure contains ten key factors that will drive technology's increasing influence over security in Germany up to 2035. It also contains five inert factors that we deem less relevant.

Scenario projections
Based on our data from the literature review, we developed projections for each key factor along two different lines of growth. We identified the dimensions collaboratively in a dedicated review of our qualitative literature analysis by considering on which dimensions all coding would fit. These dimensions seek to anticipate the development of each factor, as explained below. This is a necessary step for our subsequent consistency analysis, in order to ensure each key factor remains internally coherent.
In the following, we demonstrate this step with reference to one key factor, "Policing 2.0": A significant portion of the codings relate to a number of security technologies that could potentially be used in the domain of policing 2 . Derived from this, security technologies will significantly influence the future of policing, so the extent to which such technologies are actually employed by the police was selected as the first dimension (see Fig. 3, Y-Scale). Our analysis additionally revealed that the scope of the powers and duties accorded to the police will represent an important aspect of policing in the coming years. Specifically, security technologies are already transforming how police do their work, thus creating frictions with existing rules governing police powers 3 . Accordingly, in our graph, the X-axis maps the scope of police authority, which can be restricted or expanded in the future. From these two dimensions, three plausible projections emerge (see Fig. 3) for we rejected as implausible a future in which new technology is not used while police powers are simultaneously increased.
A list of the projections for each key factor can be found in Table 1.

Scenario building
The software application Scenario Manager (SCMI) was used to create the scenarios. First, the projections were placed into relation to each other in a consistency analysis. Specifically, after the projected key factors were compared in pairs, we decided consensually whether both projections could occur simultaneously, without contradiction. Using a consistency matrix, pairwise consistency ratings were assigned using a scale of 1 (total inconsistency) to 5 (strong mutual support). For example, greater reliance on technology by the police was seen as very consistent with a high rate of innovation in the future. By contrast, we considered a slow pace of innovation in combination with the adoption of new technologies by government authorities Fig. 2 Influence matrix responsible for security to be two developments unlikely to occur simultaneously in the future.
To minimize the influence of personal bias, individual assessments were first made by each researcher and then, in the case of divergent assessments, an agreement was reached by consensus. This consistency analysis resulted in a large number of "projection bundles." These bundles represent internally consistent pictures of the future. In a subsequent step, these projection bundles were tested in for similarities. Therefore, a cluster analysis was performed to compress similar projection bundles to be consistent to a manageable number of future [11]. The cluster analysis and resulting scree diagram indicated that the projection bundles can be most reasonably divided into two scenarios. Accordingly, we opted for two distinctive rather than three or more less delimitable scenarios. This offers the advantage that projections are clearly assigned to a factor, which guides the scenario writing more clearly. In addition, the differences between the scenarios are easier to grasp. Table 1 shows, for each scenario, the share attributable to each projection within the respective projection bundle. Percentages above 65 4 indicate a clear projection within the scenario. If alternative projections are also conceivable, but the percentage is less than 25, these should not be considered in scenario-writing stage. A projection is considered characteristic of a scenario if it only appears in that scenario. The unique, characteristic and alternative projections are the "scenario elements" of each the scenario [11]. In the scenario-writing stage, the insights from the literature are used to interpret these scenario elements and elaborate two sociotechnical imaginaries.

Scenario writing
The scenario-writing stage aims to translate the scenario elements that have been distilled in a systematic way into consistent, plausible, and easily accessible pictures of future [17,52]. In the following, we use a written format that addresses the key factors step-by-step, differentiating them into a coherent narrative about a possible future. To this end, we assemble the insights gathered 4 The parameters are from the software manual and were determined on the basis of research and evaluation. thus far and seek to synthesize them into a seamless and consistent picture [52]. In each scenario, the individual key factors are contextualized and further developed. Potential manifestations of the factors are elaborated and used to flesh out the scenarios, based on the insights developed in the literature review. We differentiate between driving (active), driven (reactive), and dynamic key factors. In our scenario writing, we strive for a factual presentation, without literary embellishments. Nevertheless, our scenario writing is based in part on a creative process that is influenced by the experiences and assessments of the authors. Accordingly, scenario writing can never be fully objective or devoid of individual bias. Subjective evaluations were reduced based on critical dialog between the authors. The scenarios are thus grounded in the findings of the preceding methodological steps (see Table 1). The two scenarios are compared to each other based on the key factors. Driving, driven, and dynamic key factors (Table 1) are emphasized according to their role in each narrative. Inert factors are displayed as well, but nor projections were made.

Results
Factors, projections, and relevance for the scenarios Table 1 shows our results for the projections of the key factors, as well as their relevance for the scenarios.

The scenarios
Narrative Scenario 1: "To Be Ahead" Key Factor Narrative Scenario 2: "Turning Back the Clock" The year is 2035, and in Germany public security is now considered an inalienable right. Almost without exception, public security is understood as the absence of threat to life or limb, especially in the public realm. Germany has been repeatedly struck by terrorist attacksfrom knifings on the street to cyberattacks. The prevailing political credo is that "everything that can be done to protect the population will be undertaken. In the 2020s, public concerns about security gave rise to numerous legal changes. The powers enjoyed by the police were expanded and a legal foundation was created for the use of advanced security technologies by emergency services and disaster relief authorities. The sense of uncertainty among the populace was particularly high following the terrorist attacks of the 2020s. Each new incident led to the further expansion of police powers, and ever more invasive security technologies were adopted as the decade wore on. Public opinion increasingly favored a proactive rather than reactive stance to the policing of terrorist threats; this, in turn, shaped the legal basis for the deployment of new security technologies. Constant and farreaching surveillance was viewed as justified to avert terrorist attacks, given the scale of the damage they inflicted.
In 2035, Germany's legal framework for security technologies entails limitations to data privacy and other rights. However, the law also enshrines ethical standards for the responsible use of information gathered in surveillance operations.

Legal Regulation of Security Technologies
Following the hasty implementation of new security technologies in the early 2020swith attendant negative consequencesan international treaty was signed to regulate the ethical use of artificial intelligence. The primary goal of this treaty was to protect data privacy and prevent international espionage. In 2030, European legislators initiated multi-year deliberations on AI ethics, which culminated in the adoption of mandatory standards for all EU states. Among other things, these standards call for the use of "unbiased" data when developing AI systems, in order to prevent discrimination. Surveillance technologies must fulfill numerous criteria before they can be implemented in Germany.
Other EU countries are entrusted with auditing such systems before they are implemented. The scenarios (Continued) Narrative Scenario 1: "To Be Ahead" Key Factor Narrative Scenario 2: "Turning Back the Clock" is used, regulators consider whether it is compatible with individual rights, and whether it can make a tangible contribution to foiling criminal acts or prosecuting lawbreakers. Internationally, the EU plays a vanguard role in the regulation of new security technology; its progressive approach to regulation is seen as crucial to preventing the rise of a surveillance state.
Laws introduced in recent years have made it possible to store data about Germany's citizens on a grand scale. Using these data, the effectiveness of facial recognition software and predictive policing has been significantly improved. At the same time, in the event of a major emergencies and mass casualty events, it is now much easier to identify victims and inform relatives. Public authorities are very transparent about the data they possess and why they are needed. Among the citizenry, consent for data collection practices is therefore high. Citizens are generally willingly to allow government agencies to take their fingerprints, conduct retinal scans, or collect other personal or biometric data. Laws have also been passed that allow data collected by companies such as airlines or search engine providers to be shared with the government for law enforcement purposes. For large sections of the population, the government's judicious handling of personal data legitimizes data collection practices, as confirmed by public access to the telecommunications data of private companies on the grounds that this was necessary to protect national security. While such activities were deemed permissible by some regional courts, these rulings were ultimately overturned by higher courts again and again.
Individuals have the right to view the data used to calculate their social score. However, hardly anyone does this, as public trust in the system is very high. Furthermore, there are no high profile instances of an individual suffering major disadvantages from his or her social score. Most people are ignorant of the scope and nature of data collection conducted by public authorities. Furthermore, the scoring process is extremely elaborate. Accordingly, the vast majority of individuals fail to see the point in requesting access to the data maintained about their person.

Social Scoring Systems
In 2035, there is high public awareness for the right to data privacy, thanks to numerous prominent court rulings. While government data collection has been minimal over the last fifteen years and a government-run social scoring system remains unthinkable, private social scoring systems have been hotly debated since 2032. In 2034, a law was passed to make the data collected by creditreporting agencies, health insurers, and other companies more transparent. In addition to viewing stored data, individuals can request information about scoring methods, and can also have incorrect data revised or, in some cases, deleted. For example, Irene S. was able to have her health insurance company delete information about her non-participation in a subsidized sports program, because, as a single working mother, she did not have sufficient free time. This deletion reduced her monthly insurance premium.  The population's perception of security is subjective and is determined by individually selected and weighted criteria. It has a cognitive dimension (perceived likelihood of danger and threat) and an affective dimension (fear, worry). There is often a pronounced discrepancy between subjective perceptions and objective threats to public security.
People perceive security appropriately (correspondence between subjective perception and statistical security situation).

Conclusion
Two contrasting sociotechnical imaginaries were elaborated in the foregoing paper. In the first scenario, we considered a security-oriented society that is quick to embrace "technological fixes." In the second scenario, by way of contrast, we examined a somewhat more traditionalist society that is skeptical of technology and more tolerant of risk.
The dynamic factors that we identified at the outset of the paper are characterized by a certain degree of ambivalence. Specifically, our dynamic factors have the potential to drive future developments, yet are also dependent themselves on specific developments. Our findings indicate that regulatory decisions in combination with international norms and standards will play an important role in shaping future developments with regard to an increasing or decreasing use of security technologies. At the same time, concrete developments "on the ground" that are enabled by technical advancements are likely to be an important influencing factor. To provide one example, the adoption of proactive surveillance technologies by the police, once firmly established, could become difficult to reverse.
In this way, the future that ultimately manifests will be the crucially conditioned by the decisions taken by legislators and the courts. At the same time, the concrete technological possibilities that are realized at any given time will play an important mediating role. These mutually independent key factors will set the stage for future developments. In this way, any effort to bring about a desired set of future relationships in the domain of security must necessarily devoted special attention to the political culture that we collectively foster and the legal regulations that emerge therefrom. Such considerations, in turn, highlight the difficulty at arriving at a firm definition of a "secure future". Security cannot be assessed on a one-dimensional continuum; we cannot say conclusively that the "To Be Ahead" scenario is the more "secure" one. The definition of "security" is naturally subject to a process of political negotiation, as vividly demonstrated by our contrasting projections of future developments. Our scenarios illustrate the practical implications of security technologies for the populace while also casting light on their intended and unintended consequences.
The presented scenarios are particularly valuable with a view to the divergent alternative futures they present. By definition, both futures cannot occur simultaneously. In this way, they illuminate alternative paths on which we might embark, herein resides their true value. By distilling relevant developmental factors and projecting them forward within the scope of internally coherent, tangible narratives, we provide a foundation for further deliberation. Indeed, for knowledge to be successfully disseminated and invested with practical value, it is necessary to encourage its adoption on the part of addressees. In this context, "knowledge transfer" refers to the communication of research findings to an audience such as policy makers. However, the process of transfer cannot directly be observed, as it tends to take place in an unstructured manner. In addition, the acceptance and dissemination of knowledge is influenced by various factors, and the knowledge transferred is often not applied in a direct manner [14]. Effective science communication informs about the consequences of decisions, including the associated risks, costs, and benefits. Accordingly, it aims to furnish a shared basis of understanding, and thus enable recipients make informed decisions [12]. Scenariossuch as those presented in this paper-are a means of supporting this goal.
In this way, our paper aims to provide a concrete, empirically basis for discussions regarding our future; our scenarios are also illustrative, as they furnish practical points of reference for the consideration of possible policy strategies. By acting as a "policy entrepreneur" and using "policy windows", one can arrange talks, discussions, and workshops with decision makers. These deliberations should concentrate on the key factors identified in this study-that is, on the factors that are highly relevant in the scenario process. A focus should lie on dynamic key factors and driving factors (Quadrant I and II, Fig. 2), because the key factors have strong reciprocal relationships, and the driving factors in particular operate as a "lever" or catalyst for future developments. Focusing on these issues can help to avoid getting sidetracked in less relevant discussions. It is our aim that the presented scenarios will serve as a springboard for broader public discussion regarding various aspects of security technology, for-as our scenarios indicate-such technologies have the potential to exert major impacts on the domains of politics, society, and the economy.

Methodical reflections
In developing the scenarios, we sought to ensure that our imagined futures satisfied numerous quality criteria. Specifically, we aimed to ensure they were plausible, consistent, understandable, traceable, distinctive, integrated, triangulated, and theoretically grounded (cf. [13,16,30,31,36]). We have ensured that our scenarios are internally coherent by conducting impact assessments and associated consistency analysis. Our scenarios represent divergent development paths, which makes them clearly distinctive. Our overall research process was disclosed at the outset and can thus be traced at every step. We, the authors, worked in unison to complete each step. Individual methodological sections were at first undertaken separately, in order to identify similarities and points of contrast. Nevertheless, we allow that an alternatively composed research team could potentially arrive at scenarios with different features. The data compiled in our literature review could have permitted the elaboration of more than two scenarios. However, this would have complicated a clear delineation between the scenarios.
Our scenarios should be understood as a tool for enabling communication. Specifically, the narratives sequences and their content seek to facilitate to "meaning making" [8]. While the scenarios we have described intend to enable negotiative processes, a scenario development approach can never be suitable for arriving at a final or conclusive assessment of a subject matter. In this way, far from seeking to adopt a specific polemic tact, we aim instead with this paper to provide impetus to debates about our collective future.