Search Results

You are looking at 1 - 10 of 501 items for :

  • All: "cybersecurity" x
  • Search level: All x
Clear All

1 Introduction We live in a highly technological knowledge-based economy. Thus, school leaders will naturally seek ways to integrate technology at their institutions for diverse lifelong learners. Skilled cybersecurity support is critical for implementing enterprise-wide educational

In: Large-Scale Technology Implementation Stories to Inspire Change

ERIS Vol. 5, Issue 3/2018, pp. 49–69 https://doi.org/10.3224/eris.v5i3.03 Politicising Security at the Boundaries: Privacy in Surveillance and Cybersecurity Myriam Dunn Cavelty and Matthias Leese Center for Security Studies, ETH Zurich Abstract: This article looks into the politicisation of

In: European Review of International Studies
Author:

This article introduces cybersecurity in the discussion on security in the European High North in a redefined and refocused form. Instead of scrutinising the technical measures taken to protect the confidentiality, integrity and availability of information in systems and networks (information security) or the criticality of a number of digitally operated infrastructures to the functioning of society (national cybersecurity), it concentrates on the human being. It examines cybersecurity from an individual’s perspective by asking what kind of personal security concerns people may have with regard to digitalisation and how those are or are not present in the discussion on health and social security re-organisation in the Finnish Lapland.

The theoretical foundation of this article rests within the human security framework. Individuals living their everyday lives in particular cyber-physical environments are taken as the referent object of security. In the digitalising European High North, multiple aspects of everyday security depend upon cybersecurity, including economic, environmental, and food securities. This article concentrates on health and social security. It examines linkages between the re-organisation of health and social security in Finland and personal security concerns with a particular focus on the case of Länsi-Pohja area in south-western Lapland. The overall aim is to create room for bottom-up influence on the primarily top-down processes of security production in the cyber-physical environment.

In: The Yearbook of Polar Law Online
Author:

Digitalisation has increased rapidly in recent decades, and became integral part of the development agenda of most states. The development of cyberspace has led to numerous opportunities for human development, but it also has presented certain challenges to societies. In acknowledging the importance of digital technologies, many states have endorsed strategies for digital development and cybersecurity. Because these strategies are often state-centric, techno-deterministic, and simplistic, they disregard the interconnectedness and complexity of the opportunities and challenges these technologies can entail in a region-specific context.

This paper argues that the human security framework may be applied to analyse and study the region-specific implications of digitalisation. The multidimensional and comprehensive human security approach includes state-centric concerns as well as the needs and fears of people and communities in a specific region. Moreover, the human security framework enables the local population to voice their concerns. The insights that the human security approach offers could contribute to developing meaningful and targeted policies that address the concerns of people and communities in specific regions. The paper uses the argument on the European High North as a case study to show that digitalisation has region specific impacts and how digitalisation is interrelated with human security.

In: The Yearbook of Polar Law Online

and loopholes, we hope to empower Palestinian civil society to proactively improve its cybersecurity. In so doing, and in the spirit of this special issue, we join the recent trend within Palestinian politics “away from ultimate ends and towards immediate means,” 10 emphasizing what Palestinians can

In: Middle East Law and Governance
Author:

scholarly rigour and accused of being a ‘fiction’ rather than a ‘fact’ ( Cavelty, 2008 : 20). As such, there is very little scholarly literature regarding Taiwan’s cybersecurity. Paul J. Bolt and Carl N. Brenner looked into information warfare across the Taiwan Strait in 2004, but their investigation

In: International Journal of Taiwan Studies
Author:

I Introduction As President Tsai Ing-wen entered her second term in office, cybersecurity continued to take center stage in her policies for national development. Two years after her administration unveiled Taiwan’s first National Cybersecurity Strategy Report, titled “Cybersecurity is

In: Chinese (Taiwan) Yearbook of International Law and Affairs, Volume 38, 2020

negotiated international cooperation agreements on cybersecurity. And the COVID -19 pandemic introduced many constraints on the ability of parties to conduct international negotiation processes in person; IT solutions were found to address this problem. As a critical source of innovation across many

Full Access
In: International Negotiation

fact, has received notice of a request for arbitration. 36 In addition, the increased use of electronic submissions and online data storage has given rise to heightened concerns about cybersecurity and data protection in arbitration proceedings. In a 2019 survey, 90 percent of survey respondents

Open Access
In: The Impact of Covid on International Disputes

conflicts. 3 Against this factual background, this chapter focuses on States’ obligations and international recommendations regarding cybersecurity, qualified as the application of technologies aimed at preventing unauthorised access and malicious uses of ICT . 4 Given the ongoing political debate on

Open Access
In: International Law and Chemical, Biological, Radio-Nuclear (CBRN) Events