Skip to main content
Top

2020 | OriginalPaper | Chapter

2. Comprehensive Cybersecurity and Human Rights in the Digitalising European High North

Authors : Mirva Salminen, Gerald Zojer, Kamrul Hossain

Published in: Digitalisation and Human Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter presents the interconnection between ever-advancing digitalisation, cybersecurity, human security and human rights in the European High North. While digitalisation brings forth multiple opportunities for individuals and communities in the area, it also generates concerns to them. Mainstream cybersecurity approaches neglect many of people’s everyday concerns. Therefore, the authors claim, a human security approach to cybersecurity provides a more inclusive understanding of both the enabling and constraining effects of digitalisation by deepening and widening the prevailing conceptualisations. They back their argument by highlighting the interconnection of human security and human rights. Such an approach places individuals and communities to the heart of cybersecurity and examines the changes that digitalisation generates in their everyday life.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
1
The DESI is a composite index that summarises the relevant indicators into five dimensions: connectivity, human capital, use of internet services, integration of digital technology and digital public services. It is intended to observe Europe’s digital performance and to track the evolution of EU member states in terms of digital competitiveness (DESI, 2019). More information about the methodology used is available on the website.
 
2
The Digital Transformation Scoreboard for 2018 “surveyed EU companies […], screened national policies and analysed in a macro-perspective approach a wide range of national data sourced from Eurostat, national statistics offices and international organisations” and, further, it analysed “information collected online from open sources including online press, blogs, corporate web sites, social media, forums, broadcast television” (Digital Transformation Scoreboard, 2018, n.p.).
 
3
Troms and Finnmark will merge into one county on 1st January 2020. At the time of writing, however, they are two independent counties.
 
4
Data collected in November 2018 in Enontekiö by Mirva Salminen for another article (case study).
 
5
Digital transformation is, according to the strategy, said to mean that “an increasing proportion of all activities in society is to varying degrees dependent on networks and information systems, and thereby on cyber security” (Swedish National Cyber Security Strategy, 2016, p. 4).
 
6
A backdoor is a software aspect that allows access to the device on which the software is running by bypassing its security means.
 
7
A zero-day exploit refers to exploiting a software security vulnerability on the first day it is discovered/before a security patch has been developed and disseminated, or before it has been updated for devices running that software.
 
8
The NSA’s website describes it as leading “the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) and information assurance (now referred to as cybersecurity) products and services, and enable[ing] computer network operations (CNO) in order to gain a decision advantage for the Nation and [its] allies under all circumstances” (https://​www.​nsa.​gov/​about/​mission-values/​).
 
9
Data collected in November 2018 in Enontekiö by Mirva Salminen for another article (case study).
 
Literature
go back to reference Alkire, S. (2002). Conceptual framework for human security (CRISE Working Paper 1(2)). Centre for Research on Inequality, Human Security and Ethnicity, University of Oxford. Alkire, S. (2002). Conceptual framework for human security (CRISE Working Paper 1(2)). Centre for Research on Inequality, Human Security and Ethnicity, University of Oxford.
go back to reference Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner. Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.
go back to reference Carr, M. (2012). The political history of the internet: A theoretical approach to the implications for U.S. Power. In S. S. Costigan & J. Perry (Eds.), Cyberspaces and global affairs (pp. 173–188). Farnham: Ashgate. Carr, M. (2012). The political history of the internet: A theoretical approach to the implications for U.S. Power. In S. S. Costigan & J. Perry (Eds.), Cyberspaces and global affairs (pp. 173–188). Farnham: Ashgate.
go back to reference Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701–715. Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701–715.
go back to reference Commission on Human Security. (2003). Human security now. New York, NY: United Nations. Commission on Human Security. (2003). Human security now. New York, NY: United Nations.
go back to reference de Oliveira Albuquerque, R., Garcia Villalba, L. J., Sandoval Orozco, A. L., de Sousa, R. T., Jr., & Kim, T. H. (2016). Leveraging information security and computational trust for cybersecurity. The Journal of Supercomputing, 72(10), 3729–3763.CrossRef de Oliveira Albuquerque, R., Garcia Villalba, L. J., Sandoval Orozco, A. L., de Sousa, R. T., Jr., & Kim, T. H. (2016). Leveraging information security and computational trust for cybersecurity. The Journal of Supercomputing, 72(10), 3729–3763.CrossRef
go back to reference Dymet, M. (2019). Digital language divide in the European High North: The level of online presence of minority languages from Northern Finland, Norway and Sweden. The Yearbook of Polar Law, 10, 247–274. Dymet, M. (2019). Digital language divide in the European High North: The level of online presence of minority languages from Northern Finland, Norway and Sweden. The Yearbook of Polar Law, 10, 247–274.
go back to reference Floyd, R. (2007). Human security and the Copenhagen school’s securitization approach. Human Security Journal, 5, 38–49. Floyd, R. (2007). Human security and the Copenhagen school’s securitization approach. Human Security Journal, 5, 38–49.
go back to reference Franklin, M. I. (2019). Human rights futures for the internet. In B. Wagner, M. Kettemann, & K. Vieth (Eds.), Research handbook on human rights and digital technology. Global politics, law and international relations (pp. 5–23). Cheltenham: Edward Elgar. Franklin, M. I. (2019). Human rights futures for the internet. In B. Wagner, M. Kettemann, & K. Vieth (Eds.), Research handbook on human rights and digital technology. Global politics, law and international relations (pp. 5–23). Cheltenham: Edward Elgar.
go back to reference Gasper, D. (2014). Human security: From definitions to investigating a discourse. In M. Martin & T. Owen (Eds.), Routledge handbook of human security (pp. 28–42). London and New York, NY: Routledge/Taylor Francis Group. Gasper, D. (2014). Human security: From definitions to investigating a discourse. In M. Martin & T. Owen (Eds.), Routledge handbook of human security (pp. 28–42). London and New York, NY: Routledge/Taylor Francis Group.
go back to reference Heinämäki, L. (2010). The right to be a part of nature—Indigenous peoples and the environment. Acta Universitatis Lapponiensis 180. Rovaniemi: Lapland University Press. Heinämäki, L. (2010). The right to be a part of nature—Indigenous peoples and the environment. Acta Universitatis Lapponiensis 180. Rovaniemi: Lapland University Press.
go back to reference Heininen, L. (2013a). “Politicization” of the environment, and environmental politics and security in the Circumpolar North. In B. S. Zellen (Ed.), The fast-changing Arctic: Rethinking Arctic security for a warmer world (pp. 35–55). Calgary: University of Calgary Press.CrossRef Heininen, L. (2013a). “Politicization” of the environment, and environmental politics and security in the Circumpolar North. In B. S. Zellen (Ed.), The fast-changing Arctic: Rethinking Arctic security for a warmer world (pp. 35–55). Calgary: University of Calgary Press.CrossRef
go back to reference Heininen, L. (2013b). Security in the Arctic. In N. Loukacheva (Ed.), Polar law textbook II (pp. 37–52). Copenhagen: Norden. Heininen, L. (2013b). Security in the Arctic. In N. Loukacheva (Ed.), Polar law textbook II (pp. 37–52). Copenhagen: Norden.
go back to reference Hildebrandt, M. (2013). Balance or trade-off? Online security technologies and fundamental rights. Philosophy & Technology, 26(4), 357–379.CrossRef Hildebrandt, M. (2013). Balance or trade-off? Online security technologies and fundamental rights. Philosophy & Technology, 26(4), 357–379.CrossRef
go back to reference Hoogensen Gjørv, G., Bazely, D. R., Goloviznina, M., & Tanentzap, A. J. (Eds.). (2014). Environmental and human security in the Arctic. London and New York, NY: Earthscan from Routledge. Hoogensen Gjørv, G., Bazely, D. R., Goloviznina, M., & Tanentzap, A. J. (Eds.). (2014). Environmental and human security in the Arctic. London and New York, NY: Earthscan from Routledge.
go back to reference Hossain, K. (2019). The evolving information-based society and its influence on traditional culture: Framing community culture and human security of the Sámi in the European High North. The Yearbook of Polar Law, 10, 275–296.CrossRef Hossain, K. (2019). The evolving information-based society and its influence on traditional culture: Framing community culture and human security of the Sámi in the European High North. The Yearbook of Polar Law, 10, 275–296.CrossRef
go back to reference Howard-Hassmann, R. E. (2012). Human security: Undermining human rights? Human Rights Quarterly, 34, 88–112.CrossRef Howard-Hassmann, R. E. (2012). Human security: Undermining human rights? Human Rights Quarterly, 34, 88–112.CrossRef
go back to reference Keskitalo, E. C. H., & Southcott, C. (2014). Globalization. In J. Nymand Larsen & G. Fondahl (Eds.), Arctic human development report: Regional processes and global linkages (pp. 397–422). Copenhagen: Nordic Council of Ministers. Keskitalo, E. C. H., & Southcott, C. (2014). Globalization. In J. Nymand Larsen & G. Fondahl (Eds.), Arctic human development report: Regional processes and global linkages (pp. 397–422). Copenhagen: Nordic Council of Ministers.
go back to reference Kilpeläinen, A. (2016). Teknologiavälitteisyys kyläläisten arjessa. Tutkimus ikääntyvien sivukylien teknologiavälitteisyydestä ja sen rajapinnoista maaseutusosiaalityöhön [Technology mediatedness in the everyday life of people living in rural villages. A study of technology mediatedness in ageing villages and interfaces with social work in the countryside]. Acta Universitatis Lapponiensis 316. Rovaniemi: University of Lapland Press. Kilpeläinen, A. (2016). Teknologiavälitteisyys kyläläisten arjessa. Tutkimus ikääntyvien sivukylien teknologiavälitteisyydestä ja sen rajapinnoista maaseutusosiaalityöhön [Technology mediatedness in the everyday life of people living in rural villages. A study of technology mediatedness in ageing villages and interfaces with social work in the countryside]. Acta Universitatis Lapponiensis 316. Rovaniemi: University of Lapland Press.
go back to reference Kotituomi, S., Huju, M., Kulmala, R., & Lahtela, A. (2019). Selvitys Porokello-varoitusjärjestelmän vaikutuksista [Impact evaluation of the Porokello alert service]. Traficomin tutkimuksia ja selvityksiä 9/2019 [Traficom Research Reports 9/2019]. Kotituomi, S., Huju, M., Kulmala, R., & Lahtela, A. (2019). Selvitys Porokello-varoitusjärjestelmän vaikutuksista [Impact evaluation of the Porokello alert service]. Traficomin tutkimuksia ja selvityksiä 9/2019 [Traficom Research Reports 9/2019].
go back to reference Kurtti, T., & Berg, K.-M. (2018). Digitalisation among NGOs—The case of the Toimeksi.fi online service. In K. Hossain & A. Petrétei (Eds.), Unconventional aspects of human security in the Arctic—Cases from the Barents Region (pp. 100–128). Juridica Lapponica 45. Rovaniemi: University of Lapland. http://urn.fi/URN:ISBN:978-952-337-122-4. Kurtti, T., & Berg, K.-M. (2018). Digitalisation among NGOs—The case of the Toimeksi.fi online service. In K. Hossain & A. Petrétei (Eds.), Unconventional aspects of human security in the Arctic—Cases from the Barents Region (pp. 100–128). Juridica Lapponica 45. Rovaniemi: University of Lapland. http://​urn.​fi/​URN:​ISBN:​978-952-337-122-4.
go back to reference Laakso, V., & Terävä, H. (2019, June 26). Netti syö kasvavalla tahdilla sähköä ja suurin syyllinen ovat nettivideot – “Epämiellyttävä totuus, josta ei haluta puhua” [Internet consumes electricity at an increasing rate and videos are the guilty party—“An unpleasant truth nobody wants to talk about”]. YLE. Retrieved from https://yle.fi/uutiset/3-10832413. Laakso, V., & Terävä, H. (2019, June 26). Netti syö kasvavalla tahdilla sähköä ja suurin syyllinen ovat nettivideot – “Epämiellyttävä totuus, josta ei haluta puhua” [Internet consumes electricity at an increasing rate and videos are the guilty party—“An unpleasant truth nobody wants to talk about”]. YLE. Retrieved from https://​yle.​fi/​uutiset/​3-10832413.
go back to reference Maréchal, N. (2015). Ranking digital rights: Human rights, the internet and the fifth estate. International Journal of Communication, 9, 3440–3449. Maréchal, N. (2015). Ranking digital rights: Human rights, the internet and the fifth estate. International Journal of Communication, 9, 3440–3449.
go back to reference Martin, M., & Owen, T. (2014). Introduction. In M. Martin & T. Owen (Eds.), Routledge handbook of human security (pp. 1–14). London and New York, NY: Routledge/Taylor Francis Group. Martin, M., & Owen, T. (2014). Introduction. In M. Martin & T. Owen (Eds.), Routledge handbook of human security (pp. 1–14). London and New York, NY: Routledge/Taylor Francis Group.
go back to reference Mathisen, S. R. (2010). Indigenous spirituality in the touristic borderzone: Virtual performances of Sámi shamanism in Sápmi Park. The Finnish Society for the Study of Religion, 46(1), 53–72. Mathisen, S. R. (2010). Indigenous spirituality in the touristic borderzone: Virtual performances of Sámi shamanism in Sápmi Park. The Finnish Society for the Study of Religion, 46(1), 53–72.
go back to reference McSweeney, B. (1999). Security, identity, and interests: A sociology of international relations. Cambridge and New York, NY: Cambridge University Press. McSweeney, B. (1999). Security, identity, and interests: A sociology of international relations. Cambridge and New York, NY: Cambridge University Press.
go back to reference Mearsheimer, J. J. (2014). The tragedy of great power politics (Updated ed.). New York, NY: W. W. Norton. Mearsheimer, J. J. (2014). The tragedy of great power politics (Updated ed.). New York, NY: W. W. Norton.
go back to reference Mesch, G. S. (2012). Minority status and the use of computer-mediated communication: A test of the social diversification hypothesis. Communication Research, 39(3), 317–337.CrossRef Mesch, G. S. (2012). Minority status and the use of computer-mediated communication: A test of the social diversification hypothesis. Communication Research, 39(3), 317–337.CrossRef
go back to reference Päläs, J., & Salminen, M. (2019). Alustan asiakkaan vastuusta ja vastuuttamisesta yksilöturvallisuuden tuottamisessa – sopimusoikeudellinen näkökulma kyberturvallisuuteen jakamistaloudessa [Responsibility and responsibilisation of the platform user in the production of individual security—A contract law perspective to cybersecurity in sharing economy]. In J. Päläs & K. Määttä (Eds.), Jakamistalousjuridiikan käsikirja [Handbook of sharing economy and law] (pp. 319–380). Helsinki: Alma Talent. Päläs, J., & Salminen, M. (2019). Alustan asiakkaan vastuusta ja vastuuttamisesta yksilöturvallisuuden tuottamisessa – sopimusoikeudellinen näkökulma kyberturvallisuuteen jakamistaloudessa [Responsibility and responsibilisation of the platform user in the production of individual security—A contract law perspective to cybersecurity in sharing economy]. In J. Päläs & K. Määttä (Eds.), Jakamistalousjuridiikan käsikirja [Handbook of sharing economy and law] (pp. 319–380). Helsinki: Alma Talent.
go back to reference Rätti, O., & Wallén, H. (2017). Porotalouden digitalisoituminen. Loppuraportti [Digitalisation of reindeer husbandry. Final report]. Lapin yliopiston Arktinen keskus & Saamelaisalueen koulutuskeskus. Rätti, O., & Wallén, H. (2017). Porotalouden digitalisoituminen. Loppuraportti [Digitalisation of reindeer husbandry. Final report]. Lapin yliopiston Arktinen keskus & Saamelaisalueen koulutuskeskus.
go back to reference Romany, C., & Chu, J. (2004). Affirmative action in international human rights law: A critical perspective of its normative assumptions. Connecticut Law Review, 36, 831–870. Romany, C., & Chu, J. (2004). Affirmative action in international human rights law: A critical perspective of its normative assumptions. Connecticut Law Review, 36, 831–870.
go back to reference Salminen, M. (2018). Digital security in the Barents Region. In K. Hossain & D. Cambou (Eds.), Society, environment and human security in the Arctic Barents Region (pp. 187–204). Abingdon: Routledge.CrossRef Salminen, M. (2018). Digital security in the Barents Region. In K. Hossain & D. Cambou (Eds.), Society, environment and human security in the Arctic Barents Region (pp. 187–204). Abingdon: Routledge.CrossRef
go back to reference Salminen, M. (2019). Refocusing and redefining cybersecurity: Individual security in the digitalising European High North. The Yearbook of Polar Law, 10, 321–356.CrossRef Salminen, M. (2019). Refocusing and redefining cybersecurity: Individual security in the digitalising European High North. The Yearbook of Polar Law, 10, 321–356.CrossRef
go back to reference Schou, J., & Hjelholt, M. (2018). Digitalization and public sector transformations. Cham: Palgrave Macmillan.CrossRef Schou, J., & Hjelholt, M. (2018). Digitalization and public sector transformations. Cham: Palgrave Macmillan.CrossRef
go back to reference Sen, A. (2014). Birth of a discourse. In M. Martin & T. Owen (Eds.), Routledge handbook of human security (pp. 17–27). London and New York, NY: Routledge/Taylor Francis Group. Sen, A. (2014). Birth of a discourse. In M. Martin & T. Owen (Eds.), Routledge handbook of human security (pp. 17–27). London and New York, NY: Routledge/Taylor Francis Group.
go back to reference Smith, P. S. (2012). Imprisonment and internet-access human rights, the principle of normalization and the question of prisoners’ access to digital communications technology. Nordic Journal of Human Rights, 30(4), 454–482. Smith, P. S. (2012). Imprisonment and internet-access human rights, the principle of normalization and the question of prisoners’ access to digital communications technology. Nordic Journal of Human Rights, 30(4), 454–482.
go back to reference Taddeo, M. (2013). Cyber security and individual rights, striking the right balance. Philosophy and Technology, 26(4), 353–357.CrossRef Taddeo, M. (2013). Cyber security and individual rights, striking the right balance. Philosophy and Technology, 26(4), 353–357.CrossRef
go back to reference Tadjbakhsh, S. (2014). In defense of the broad view of human security. In M. Martin & T. Owen (Eds.), Routledge handbook of human security (pp. 43–57). London and New York, NY: Routledge/Taylor Francis Group. Tadjbakhsh, S. (2014). In defense of the broad view of human security. In M. Martin & T. Owen (Eds.), Routledge handbook of human security (pp. 43–57). London and New York, NY: Routledge/Taylor Francis Group.
go back to reference Takkunen, J., & Ortamo, S. (2018, December 22). Euroopan elektroniikkajäte kertyy Ghanan romupihoille – Baba Adi lajittelee tietokoneita ja vaarantaa terveytensä, koska romu tuo rahaa [Electronic waste from Europe piles up on the junkyards of Ghana—Baba Adi sorts computers and risks his life because scrap turns into money]. YLE. Retrieved from https://yle.fi/uutiset/3-10472211. Takkunen, J., & Ortamo, S. (2018, December 22). Euroopan elektroniikkajäte kertyy Ghanan romupihoille – Baba Adi lajittelee tietokoneita ja vaarantaa terveytensä, koska romu tuo rahaa [Electronic waste from Europe piles up on the junkyards of Ghana—Baba Adi sorts computers and risks his life because scrap turns into money]. YLE. Retrieved from https://​yle.​fi/​uutiset/​3-10472211.
go back to reference Tamnes, R., & Offerdal, K. (Eds.). (2014). Geopolitics and security in the Arctic: Regional dynamics in a global world. Oxford and New York, NY: Routledge. Tamnes, R., & Offerdal, K. (Eds.). (2014). Geopolitics and security in the Arctic: Regional dynamics in a global world. Oxford and New York, NY: Routledge.
go back to reference United Nations Development Programme (UNDP). (1994). Human development report 1994. New York, NY: Oxford University Press.CrossRef United Nations Development Programme (UNDP). (1994). Human development report 1994. New York, NY: Oxford University Press.CrossRef
go back to reference United Nations Human Rights Council (2018). The promotion, protection and enjoyment of human rights on the Internet. General Assembly. No. 38. A/HRC/38/L.10/Rev.1. July 4, 2018. United Nations Human Rights Council (2018). The promotion, protection and enjoyment of human rights on the Internet. General Assembly. No. 38. A/HRC/38/L.10/Rev.1. July 4, 2018.
go back to reference United Nations Secretary General. (2005). In larger freedom: Towards development, security and human rights for all. Report of the Secretary-General, A/59/2005. United Nations Secretary General. (2005). In larger freedom: Towards development, security and human rights for all. Report of the Secretary-General, A/59/2005.
go back to reference Waltz, K. N. (2010). Theory of international politics. Long Grove, IL: Waveland Press. Waltz, K. N. (2010). Theory of international politics. Long Grove, IL: Waveland Press.
go back to reference Webster, F. (2006). Theories of the information society (3rd ed.). Abingdon: Routledge. Webster, F. (2006). Theories of the information society (3rd ed.). Abingdon: Routledge.
go back to reference Zambianchi, M., Rönnlund, M., & Grazia Carelli, M. (2019). Attitudes towards and use of information and communication technologies (ICTs) among older adults in Italy and Sweden: The influence of cultural context, socio-demographic factors, and time perspective. Journal of Cross-Cultural Gerontology, 1–16. https://doi.org/10.1007/s10823-019-09370-y. Zambianchi, M., Rönnlund, M., & Grazia Carelli, M. (2019). Attitudes towards and use of information and communication technologies (ICTs) among older adults in Italy and Sweden: The influence of cultural context, socio-demographic factors, and time perspective. Journal of Cross-Cultural Gerontology, 1–16. https://​doi.​org/​10.​1007/​s10823-019-09370-y.
go back to reference Zojer, G. (2019b). Free and open source software as a contribution to digital security in the Arctic. Arctic Yearbook, 173–188. Zojer, G. (2019b). Free and open source software as a contribution to digital security in the Arctic. Arctic Yearbook, 173–188.
Metadata
Title
Comprehensive Cybersecurity and Human Rights in the Digitalising European High North
Authors
Mirva Salminen
Gerald Zojer
Kamrul Hossain
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-48070-7_2