This chapter presents the interconnection between ever-advancing digitalisation, cybersecurity, human security and human rights in the European High North. While digitalisation brings forth multiple opportunities for individuals and communities in the area, it also generates concerns to them. Mainstream cybersecurity approaches neglect many of people’s everyday concerns. Therefore, the authors claim, a human security approach to cybersecurity provides a more inclusive understanding of both the enabling and constraining effects of digitalisation by deepening and widening the prevailing conceptualisations. They back their argument by highlighting the interconnection of human security and human rights. Such an approach places individuals and communities to the heart of cybersecurity and examines the changes that digitalisation generates in their everyday life.
Anzeige
Bitte loggen Sie sich ein, um Zugang zu Ihrer Lizenz zu erhalten.
The DESI is a composite index that summarises the relevant indicators into five dimensions: connectivity, human capital, use of internet services, integration of digital technology and digital public services. It is intended to observe Europe’s digital performance and to track the evolution of EU member states in terms of digital competitiveness (DESI, 2019). More information about the methodology used is available on the website.
The Digital Transformation Scoreboard for 2018 “surveyed EU companies […], screened national policies and analysed in a macro-perspective approach a wide range of national data sourced from Eurostat, national statistics offices and international organisations” and, further, it analysed “information collected online from open sources including online press, blogs, corporate web sites, social media, forums, broadcast television” (Digital Transformation Scoreboard, 2018, n.p.).
Digital transformation is, according to the strategy, said to mean that “an increasing proportion of all activities in society is to varying degrees dependent on networks and information systems, and thereby on cyber security” (Swedish National Cyber Security Strategy, 2016, p. 4).
A zero-day exploit refers to exploiting a software security vulnerability on the first day it is discovered/before a security patch has been developed and disseminated, or before it has been updated for devices running that software.
The NSA’s website describes it as leading “the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) and information assurance (now referred to as cybersecurity) products and services, and enable[ing] computer network operations (CNO) in order to gain a decision advantage for the Nation and [its] allies under all circumstances” (https://www.nsa.gov/about/mission-values/).