In the cybersecurity community it is common to think of security as a design feature for systems and infrastructures that may be dicult to balance with other requirements. What is less studied is how security requirements come about, for which reasons, and what their influence is on the actions the system facilitates. Security is for example often used as an argument for or against granting access rights that are of importance to stakeholders, such as in the discussion on counterterrorism versus privacy. This paper argues that the ongoing politicization of security calls for a paradigm to study security as a Politikum: a matter of political concern, embedded in existing and future infrastructures. We summarize literature that inspired this ...
At meetings of internet governance organisations, participants generally agree that improving securi...
Problems with information and network security have quickly moved up the political agenda. The curre...
Assumptions are made by government and technology providers about the power relationships that shape...
In the cybersecurity community it is common to think of security as a design feature for systems and...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
The idea of securitization holds that perceived threats and the ensuing need for security measures a...
Saara Jansson & Tanja Sihvonen Cyber security as governmental domain and the threats to it ...
Building on conceptual work on security and cyber security, the paper explores how different approac...
In this paper we examine the current state of play with regards to the security of smart city initia...
The cybersecurity issue discussed in the paper is seen from the perspective of political science wit...
Writing an article on critical infrastructure protection is quite challenging. Scientifically speaki...
In this paper we examine the current state of play with regards to the security of smart city initia...
Criticism of the idea of «smart cities», enabled by Web2.0+, has gathered pace in the wake of the gl...
The growth of cities continues to be a global megatrend. As more and more people live in urban areas...
At meetings of internet governance organisations, participants generally agree that improving securi...
Problems with information and network security have quickly moved up the political agenda. The curre...
Assumptions are made by government and technology providers about the power relationships that shape...
In the cybersecurity community it is common to think of security as a design feature for systems and...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
The idea of securitization holds that perceived threats and the ensuing need for security measures a...
Saara Jansson & Tanja Sihvonen Cyber security as governmental domain and the threats to it ...
Building on conceptual work on security and cyber security, the paper explores how different approac...
In this paper we examine the current state of play with regards to the security of smart city initia...
The cybersecurity issue discussed in the paper is seen from the perspective of political science wit...
Writing an article on critical infrastructure protection is quite challenging. Scientifically speaki...
In this paper we examine the current state of play with regards to the security of smart city initia...
Criticism of the idea of «smart cities», enabled by Web2.0+, has gathered pace in the wake of the gl...
The growth of cities continues to be a global megatrend. As more and more people live in urban areas...
At meetings of internet governance organisations, participants generally agree that improving securi...
Problems with information and network security have quickly moved up the political agenda. The curre...
Assumptions are made by government and technology providers about the power relationships that shape...