In the cybersecurity community it is common to think of security as a design feature for systems and infrastructures that may be difficult to balance with other requirements. What is less studied is how security requirements come about, for which reasons, and what their influence is on the actions the system facilitates. Security is for example often used as an argument for or against granting access rights that are of importance to stakeholders, such as in the discussion on counterterrorism and privacy. This paper argues that the ongoing politicization of security issues calls for a paradigm to study cybersecurity as a Politikum: a matter of political concern, embedded in existing and future infrastructures. We summarize literature which i...
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could preven...
In this paper we examine the current state of play with regards to the security of smart city initia...
Assumptions are made by government and technology providers about the power relationships that shape...
In the cybersecurity community it is common to think of security as a design feature for systems and...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
The cybersecurity issue discussed in the paper is seen from the perspective of political science wit...
Saara Jansson & Tanja Sihvonen Cyber security as governmental domain and the threats to it ...
Problems with information and network security have quickly moved up the political agenda. The curre...
<p>Cybersecurity is a global phenomenon representing a complex socio-technical challenge for governm...
Building on conceptual work on security and cyber security, the paper explores how different approac...
The growth of cities continues to be a global megatrend. As more and more people live in urban areas...
The idea of securitization holds that perceived threats and the ensuing need for security measures a...
A Comparative Analysis of Cybersecurity Initiatives Worldwide The worst possible consequences of ris...
In this paper we examine the current state of play with regards to the security of smart city initia...
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could preven...
In this paper we examine the current state of play with regards to the security of smart city initia...
Assumptions are made by government and technology providers about the power relationships that shape...
In the cybersecurity community it is common to think of security as a design feature for systems and...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
The cybersecurity issue discussed in the paper is seen from the perspective of political science wit...
Saara Jansson & Tanja Sihvonen Cyber security as governmental domain and the threats to it ...
Problems with information and network security have quickly moved up the political agenda. The curre...
<p>Cybersecurity is a global phenomenon representing a complex socio-technical challenge for governm...
Building on conceptual work on security and cyber security, the paper explores how different approac...
The growth of cities continues to be a global megatrend. As more and more people live in urban areas...
The idea of securitization holds that perceived threats and the ensuing need for security measures a...
A Comparative Analysis of Cybersecurity Initiatives Worldwide The worst possible consequences of ris...
In this paper we examine the current state of play with regards to the security of smart city initia...
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could preven...
In this paper we examine the current state of play with regards to the security of smart city initia...
Assumptions are made by government and technology providers about the power relationships that shape...