Hostname: page-component-cd9895bd7-8ctnn Total loading time: 0 Render date: 2024-12-28T15:34:35.409Z Has data issue: false hasContentIssue false

Digitalisation and human security dimensions in cybersecurity: an appraisal for the European High North

Published online by Cambridge University Press:  25 June 2018

Mirva Salminen
Affiliation:
The Northern Institute for Environmental and Minority Law at the Arctic Centre, University of Lapland, Rovaniemi, Finland ([email protected])
Kamrul Hossain
Affiliation:
The Northern Institute for Environmental and Minority Law at the Arctic Centre, and Faculty of Law, University of Lapland, Rovaniemi, Finland

Abstract

Overarching digitalisation is producing significant socio-cultural, economic and policy changes in the European High North. These changes create new opportunities, but also challenges and concerns for people and communities living in the region. Digital development is guided by supranational, national and regional digital policies and is secured through national cybersecurity agendas. These frameworks concentrate on advancing overall economic growth and safeguarding critical information infrastructure and information security, but pay inadequate attention to the interests, needs and fears of people and communities experiencing digitalisation in everyday life. In order to generate a more comprehensive cybersecurity agenda, which focuses on human security and empowering people to influence the digital development, a research framework highlighting the actual ways people use, wish to use, or are unable to use information and communication technologies is needed. The focus of this article is therefore on regionally contextualised digital opportunities and threats as they may be experienced by local people and communities. It utilises insights of securitisation theory to grant people a say in the direction of digital development in their region. The aim is to introduce issues of human security to cybersecurity agendas, for a more comprehensive understanding of the societal changes that digitalisation generates.

Type
Research Article
Copyright
Copyright © Cambridge University Press 2018 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aaltola, M., Käpylä, J., & Vuorisalo, V. (2014). The challenge of global commons and flows for US power. The perils of missing the human domain. Farnham: Ashgate.Google Scholar
Arctic Economic Council (AEC). (2017). Arctic Broadband. Recommendations for an interconnected Arctic. Retrieved 3 October 2017 from https://arcticeconomiccouncil.com/wp-content/uploads/2017/02/Google Scholar
AEC (Arctic Economic Council). (2018). Save the date: 3rd Top of the world Arctic broadband summit 2018, Sapporo, Japan. Retrieved 8 March 2018 from https://arcticeconomiccouncil.com/save-date-3rd-top-world-arctic-broadband-summit-2018-sapporo-japan/Google Scholar
Axelrod, W. (2004). Outsourcing information security. Norwood, MA: Artech House Books.Google Scholar
Booth, K. (2005). Introduction to part one. In Booth, K. (Ed.), Critical security studies and world politics. London: Lynne Rienner.Google Scholar
Brennen, S., & Kreiss, D. (2014). Digitalization and digitization. Culture Digitally [group blog]. Retrieved 16 August 2016 from http://culturedigitally.org/2014/09/digitalization-and-digitization/Google Scholar
Burgess, J.P., & Sissel, H.J. (2008). The influence of globalization on societal security: the international setting. PRIO Policy Brief 3. Retrieved 14 March 2018 from https://www.prio.org/utility/DownloadFile.ashx?id=176&type=publicationfileGoogle Scholar
Buzan, B., & Hansen, L. (2009). The evolution of international security studies. Cambridge: Cambridge University Press.Google Scholar
Buzan, B., & Wæver, O. (2003). Regions and powers: The structure of international security. Cambridge: Cambridge University Press.Google Scholar
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.Google Scholar
Carr, M. (2012). The political history of the Internet: A theoretical approach to the implications for U.S. power. In Costigan, S. S. & Perry, J. (Eds.), Cyberspace and global affairs (pp. 173187). Farnham: Ashgate.Google Scholar
Castells, M. (2009). Communication power. Oxford: Oxford University Press.Google Scholar
Castells, M. (2010). The rise of the network society (2nd ed.). Malden, MA: Wiley-Blackwell.Google Scholar
Clough, J. (2010). Principles of cybercrime. Cambridge: Cambridge University Press.Google Scholar
Commission on Human Security. (2003). Human security now. Retrieved 4 January 2017 from http://www.un.org/humansecurity/sites/www.un.org.humansecurity/files/chs_final_report_-_english.pdfGoogle Scholar
Crosby, E. (2016). Information technology's cultural setting: Some considerations. In Janczewski, L. J. & Caelli, W. (Eds.), Cyber conflicts and small states (pp. 817). Abingdon: Ashgate.Google Scholar
Cruz-Jesus, F., Oliveira, T., & Bacao, F. (2012). Digital divide across the European Union. Information and Management, 49 (6), 278291. http://doi.org/10.1016/j.im.2012.09.003Google Scholar
CSSN (Cyber Security Strategy for Norway) 17.12.2012. Ministry of Government Administration, Reform and Church Affairs. Retrieved 11 August 2016 from https://www.regjeringen.no/globalassets/upload/fad/vedlegg/iktpolitikk/cyber_security_strategy_norway.pdfGoogle Scholar
Davi, M. (2009). Human security as the one size fits all policy approach? The European Security and Defence Forum WS2, Chatham House. Retrieved 4 October 2016 from https://www.chathamhouse.org/sites/files/chathamhouse/public/Research/International%20Security/1109esdf_davi.pdfGoogle Scholar
Dunn Cavelty, M. (2013). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20 (3), 701715. https://doi.org/10.1007/s11948-014-9551-yGoogle Scholar
European Commission. (2016). Digital Single Market, Digital Scoreboard, Progress by Country -reports for Finland, Sweden and Norway. Retrieved 26 August 2016 from https://ec.europa.eu/digital-single-market/en/progress-countryGoogle Scholar
European Union Agency for Network and Information Security (ENISA). Threat Landscape-reports for 2012, 2013, 2014 and 2015. Retrieved 14 December 2016 from https://www.enisa.europa.eu/publications#c5=2006&c5=2016&c5=false&c2=publicationDate&reversed=on&b_start=0Google Scholar
Figuères, C. M., & Eugelink, H. (2014). The role of ICTs in poverty eradication: More than 15 years’ experience from the field. In Kaur, H. & Tao, X. (Eds.), ICTs and the millennium development goals. A United Nations perspective (pp. 199222). New York, NY: Springer.Google Scholar
FCSS (Finland's Cyber Security Strategy). Government Resolution 24.1.2013. Secretariat of the Security Committee. Retrieved 26 August 2016 from http://www.defmin.fi/files/2378/Finland_s_Cyber_Security_Strategy.pdfGoogle Scholar
Finnemore, M., & Hollis, D. B. (2016). Constructing norms for global cybersecurity. The American Journal of International Law, 110 (3), 425479. Retrieved 5 April 2018 from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2843913Google Scholar
Finnish Transport Agency / Centre for Economic Development, Transport and the Environment. (2016). AURORA, valtatie 21/E8 Kolari-Muonio-Kilpisjärvi.2/2016. Retrieved 3 October 2017 from https://devtest.liikennevirasto.fi/webgis-aineistot/Tie_Aurora_Vt21_E8.pdfGoogle Scholar
Finnmark Fylkeskommune [Finnmark County]. (2015). Digitaliseringsstrategi Finnmark fylkeskommune 2015–2018. [Digitalisation strategy of Finnmark county 2015-2018] Retrieved 5 September 2016 from http://www.ffk.no/Handlers/fh.ashx?MId1=11523&FilId=25682Google Scholar
FireEye. (2015). Cyber threats to the Nordic region. Threat intelligence report. Retrieved July 11, 2016 from https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-nordic-threat-landscape.pdfGoogle Scholar
FireEye. (2016). Beyond the bottom line: The real costs of data breaches. Retrieved 11 July 2016 from https://www2.fireeye.com/WEB-Real-Cost-of-Data-Breaches.htmlGoogle Scholar
Giacomello, G. (2014). Introduction: Security in cyberspace. In Giacomello, G. (Ed.), Security in cyberspace. Targeting nations, infrastructures, individuals (pp. 119). New York, NY: Bloomsbury.Google Scholar
Greenstein, S. (2015). How the Internet became commercial: Innovation, privatization, and the birth of the network. Princeton, NJ: Princeton University Press.Google Scholar
Informations och cybersäkerhet i Sverige. Strategi och åtgärder för säker information i staten. [Cybersecurity in Sweden. Strategy and measures for secure information in central government] Statens Offentliga Utredningar (SOU) 2015: 23. Retrieved 19 October 2016 from http://www.sou.gov.se/wp-content/uploads/2015/03/SOU-2015_23_webb.pdfGoogle Scholar
Kaldor, M. H., Martin, M. E., & Selchow, S. (2007). Human security: A new strategic narrative for Europe. International Affairs, 83 (2), 273288. https://doi.org/10.1111/j.1468-2346.2007.00618.xGoogle Scholar
Kilpeläinen, A. (2016). Teknologiavälitteisyys kyläläisten arjessa. Tutkimus ikääntyvien sivukylien teknologiavälitteisyydestä ja sen rajapinnoista maaseutusosiaalityöhön. [Technology mediatedness in the everyday life of people living in rural villages. A study of technology mediatedness in ageing villages and interfaces with social work in the countryside] (Doctoral dissertation). University of Lapland. Rovaniemi: Acta Universitatis Lapponiensis 316.Google Scholar
Kluver, R. (2000). Globalization, informatization and intercultural communication. American Journal of Communication, 3 (3). Retrieved 11 November 2015 from unpan1.un.org/intradoc/groups/public/documents/apcity/unpan002006.htmGoogle Scholar
Kommunenes Sentralforbund [Norwegian Association of Local and Regional Authorities]. (2013). Digitaliseringsstrategi 2013–2016 for kommuner og fylkeskommuner. [Digitalisation strategy 2013–2016 for municipalities and counties]. Retrieved 9 November 2016 from http://www.ks.no/contentassets/e7f699792add4068aaedcb25a97ff56a/ks-digitaliseringsstrategi.pdf?id=8215Google Scholar
Länsstyrelsen Norrbotten [County Council of Norrbotten]. (2013). Digital Agenda. Norrbotten. Retrieved 19 October 2016 from http://www.itnorrbotten.se/files/1394112515_itn_Digital_Agenda_BD_webbversion.pdfGoogle Scholar
Lapin liitto [Regional Council of Lapland]. (2013). Lapin digiohjelma 2020. [Digitalisation programme for Lapland 2020] Retrieved 28 July 2016 from http://www.lappi.fi/lapinliitto/c/document_library/get_file?folderId=1457612&name=DLFE21300.pdfGoogle Scholar
Larsen, J. N., & Fondahl, G. (Eds.) (2014). Arctic human development report. Regional processes and global linkages. Nordic Council of Ministers. TemaNord 2014:567. Retrieved 21 November 2016 from http://norden.divaportal.org/smash/get/diva2:788965/FULLTEXT03.pdfGoogle Scholar
Limnéll, J., Majewski, K., & Salminen, M. (2015). Cyber security for decision makers. Edited by Samani, R.. Jyväskylä: Docendo.Google Scholar
Marichal, J. (2012). Facebook democracy. The architecture of disclosure and the threat to public life. Farnham: Ashgate.Google Scholar
Mayer-Schönberger, V., & Hurley, D. (2000). Globalization of communication. In Nye, J. S. & Donahue, J. D. (Eds.), Governance in a globalizing world (pp. 135151). Washington, DC: Brookings Institution.Google Scholar
McCormack, T. (2008). Power and agency in the human security framework. Cambridge Review of International Affairs, 21 (1), 113128. https://doi.org/10.1080/09557570701828618Google Scholar
Ministry for Foreign Affairs of Finland. (2016). Finland's Chairmanship Program for the Arctic Council 2017–2019. Exploring common solutions. Retrieved 3 October 2017 from http://arcticjournal.com/sites/default/files/suomen_arktisen_neuvoston_puheenjohtajuusohjelma.pdfGoogle Scholar
Ministry of Enterprise, Energy and Communications. (2011). ICT for Everyone – A Digital Agenda for Sweden. 2011/342/ITP. Retrieved 26 August 2016 from http://www.government.se/contentassets/8512aaa8012941deaee5cf9594e50ef4/ict-for-everyone—a-digital-agenda-for-swedenGoogle Scholar
Ministry of Local Government and Modernisation. (2016). Digital agenda for Norway in brief. ICT for a simpler everyday life and increased productivity. Meld. St. 27. Retrieved 25 August 2016 from https://www.regjeringen.no/contentassets/07b212c03fee4d0a94234b101c5b8ef0/engb/pdfs/digital_agenda_for_norway_in_brief.pdfGoogle Scholar
Ministry of Transport and Communications. (2011). Productive and inventive Finland – Digital agenda for 2011–2020. Retrieved 26 August 2016 from http://oph.fi/download/135323_productive_and_inventive_finland.pdfGoogle Scholar
Ministry of Transport and Communications. (2016). Information security strategy for Finland. The world's most trusted digital business environment. Publications 9/2016. Retrieved 18 July 2016 from https://julkaisut.valtioneuvosto.fi/bitstream/handle/10024/75353/9-2016_Information_Security_Strategy_for_Finland.pdf?sequence=1Google Scholar
Mordini, E. (2014). Considering the human implications of new and emerging technologies in the area of human security. Science and Engineering Ethics, 20 (3), 617638. https://doi.org/10.1007/s11948-014-9555-7Google Scholar
National Crime Agency, NCA Strategic Cyber Industry Group. (2016). Cyber Crime Assessment 2016 – Need for a stronger law enforcement and business partnership to fight cyber crime. Retrieved 12 December 2016 from http://www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/fileGoogle Scholar
NCSS (Nationell strategi för samhällets informations- och cybersäkerhet). [A National Cyber Security Strategy] Skr. 2016/ 17:213. Regeringskansliet [the Government Offices], Justitiedepartementet [Ministry of Justice]. Retrieved 3 October 2017 from http://www.regeringen.se/49f22c/contentassets/3f89e3c77ad74163909c092b1beae15e/nationell-strategi-for-samhallets-informations–och-cybersakerhet-skr.-201617213Google Scholar
Norden – NordForsk. (2013). Societal security in the Nordic countries. Policy paper 1. Retrieved 16 August 2016 from http://norden.diva-portal.org/smash/get/diva2:707865/FULLTEXT01.pdfGoogle Scholar
Nordic Council of Ministers. (2017). An inclusive, innovative and secure Nordic region. The Swedish Presidency 2018. Retrieved 8 March 2018 from http://norden.diva-portal.org/smash/get/diva2:1151389/FULLTEXT01.pdfGoogle Scholar
Paris, R. (2001). Human security: Paradigm shift or hot air? International Security, 26 (2), 87102. Retrieved 5 April 2018 from http://aix1.uottawa.ca/~rparis/Paris.2001.IS.Human%20Security.pdfGoogle Scholar
Räsänen, P. (2008). The persistence of information structures in Nordic countries. The Information Society, 24 (4), 219228. https://doi.org/10.1080/01972240802191555Google Scholar
Sartor, G. (2013). Human rights and the information society: Utopias, dystopias and human values. In de Azevedo Cunha, M. V., de Andrade, N. N. G., Lixinski, L., & Feteira, L. T. (Eds.), New technologies and human rights: Challenges to regulation (pp.1126). Abingdon: Ashgate.Google Scholar
Sheehan, M. (2005). International security: An analytical survey. Boulder, CO: Lynne Rienner.Google Scholar
Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar. What everyone needs to know. New York, NY: Oxford University Press.Google Scholar
Skepys, B. (2012). Is there a human right to the Internet? Journal of Politics and Law, 5 (4), 1529. http://dx.doi.org/10.5539/jpl.v5n4p15Google Scholar
Taddeo, M. (2013). Cyber security and individual rights, striking the right balance. Philosophy and Technology, 26 (4), 353357. https://doi.org/10.1007/s13347-013-0140-9Google Scholar
Taipale, S. (2012). The use of e-government services and the Internet: The role of socio-demographic, economic and geographical predictors. Telecommunications Policy, 37 (4–5), 413422. https://doi.org/10.1016/j.telpol.2012.05.005Google Scholar
UNDP (United Nations Development Programme). (1994). Human development report. Retrieved 8 November 2016 from http://hdr.undp.org/sites/default/files/reports/255/hdr_1994_en_complete_nostats.pdfGoogle Scholar
UNHRC (United Nations Human Rights Council). (2011). Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression. A/HCR/17/27. Retrieved 16 August 2016 from http://www2.ohchr.org/English/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.PDFGoogle Scholar
Webster, F. (2014). Theories of the information society (4th ed.). Abingdon: Routledge.Google Scholar
Yar, M. (2006). Cybercrime and society. London: SAGE.Google Scholar