Skip to main content
Top

Hint

Swipe to navigate through the chapters of this book

2020 | OriginalPaper | Chapter

5. Social Exclusion as Human Insecurity: A Human Cybersecurity Framework Applied to the European High North

Authors : Kristin Smette Gulbrandsen, Michael Sheehan

Published in: Digitalisation and Human Security

Publisher: Springer International Publishing

Abstract

Digitalisation is changing the way governments provide public services. This has significance for geographically peripheral and sparsely populated regions like the European High North, which is facing challenges associated with an ageing population and labour shortages. A successful transition from traditional to digital services requires adequate digital competence and infrastructure. Without this, rural villages and elderly people in particular are at risk of suffering disadvantage. To address this, we present a cybersecurity framework that combines human security and social exclusion theory. Drawing on key informant interviews conducted in Norway, Sweden and Finland, we show that while digitalisation provides benefits to remote areas, it can also result in digital exclusion. Significant attention must therefore be paid to whose voices and interests shape the current digitalisation agenda.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141–165. Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141–165.
go back to reference Autti, O., & Hyry-Beihammer, E. K. (2014). School closures in rural Finnish communities. Journal of Research in Rural Education, 29(1), 1–17. Autti, O., & Hyry-Beihammer, E. K. (2014). School closures in rural Finnish communities. Journal of Research in Rural Education, 29(1), 1–17.
go back to reference Barnett, J. (2001). The meaning of environmental security: Ecological politics and policy in the new Security era. London: Zed Books. Barnett, J. (2001). The meaning of environmental security: Ecological politics and policy in the new Security era. London: Zed Books.
go back to reference Booth, K. (2005). Introduction to part one. In K. Booth (Ed.), Critical security studies and world politics (pp. 21–25). London: Lynne Rienner. Booth, K. (2005). Introduction to part one. In K. Booth (Ed.), Critical security studies and world politics (pp. 21–25). London: Lynne Rienner.
go back to reference Booth, K. (2007). Theory of world security. Cambridge: Cambridge University Press. Booth, K. (2007). Theory of world security. Cambridge: Cambridge University Press.
go back to reference Bourdieu, P. (1986). The forms of capital. In J. Richardson (Ed.), Handbook of theory and research for the sociology of education (pp. 241–258). Westport, CT: Greenwood. Bourdieu, P. (1986). The forms of capital. In J. Richardson (Ed.), Handbook of theory and research for the sociology of education (pp. 241–258). Westport, CT: Greenwood.
go back to reference Burchardt, T., Le Grand, J., & Piachaud, D. (2002). Introduction. In J. Hills, J. Le Grand, & D. Piachaud (Eds.), Understanding social exclusion (pp. 1–12). Oxford: Oxford University Press. Burchardt, T., Le Grand, J., & Piachaud, D. (2002). Introduction. In J. Hills, J. Le Grand, & D. Piachaud (Eds.), Understanding social exclusion (pp. 1–12). Oxford: Oxford University Press.
go back to reference Buzan, B. (1983). People, states and fear: An agenda for security analysis in the post-Cold War era. Brighton: Wheatsheaf. Buzan, B. (1983). People, states and fear: An agenda for security analysis in the post-Cold War era. Brighton: Wheatsheaf.
go back to reference Buzan, B. (1991). People, states and fear: An agenda for security analysis in the post-Cold War era (2nd ed.). Boulder, CO: Lynne Rienner. Buzan, B. (1991). People, states and fear: An agenda for security analysis in the post-Cold War era (2nd ed.). Boulder, CO: Lynne Rienner.
go back to reference Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner. Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.
go back to reference Byrne, D. (1999). Social exclusion. Buckingham: Open University Press. Byrne, D. (1999). Social exclusion. Buckingham: Open University Press.
go back to reference Carr, J. (2010). Inside cyber warfare. Sebastopol, CA: O’Reilly Media. Carr, J. (2010). Inside cyber warfare. Sebastopol, CA: O’Reilly Media.
go back to reference Clough, J. (2015). Principles of cybercrime (2nd ed.). Cambridge: Cambridge University Press. Clough, J. (2015). Principles of cybercrime (2nd ed.). Cambridge: Cambridge University Press.
go back to reference Demchak, C. C. (2011). Wars of disruption and resilience: Cybered conflict, power and national security. London: The University of Georgia Press. Demchak, C. C. (2011). Wars of disruption and resilience: Cybered conflict, power and national security. London: The University of Georgia Press.
go back to reference Dunn Cavelty, M. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701–715. Dunn Cavelty, M. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701–715.
go back to reference Eskelinen, H., Frank, T., & Hirvonen, T. (2008). Does strategy matter? A comparison of broadband rollout policies in Finland and Sweden. Telecommunications Policy, 32(6), 412–421. Eskelinen, H., Frank, T., & Hirvonen, T. (2008). Does strategy matter? A comparison of broadband rollout policies in Finland and Sweden. Telecommunications Policy, 32(6), 412–421.
go back to reference Esping-Andersen, G. (1999). Social foundations of postindustrial economies. London: Oxford University Press. Esping-Andersen, G. (1999). Social foundations of postindustrial economies. London: Oxford University Press.
go back to reference Halleröd, B., & Heikkilä, M. (1999). Poverty and social exclusion in the Nordic countries. In M. Kautto, M. Heikkilä, B. Hvinden, S. Marklund, & N. Ploug (Eds.), Nordic social policy: Changing welfare states (pp. 185–214). London: Routledge. Halleröd, B., & Heikkilä, M. (1999). Poverty and social exclusion in the Nordic countries. In M. Kautto, M. Heikkilä, B. Hvinden, S. Marklund, & N. Ploug (Eds.), Nordic social policy: Changing welfare states (pp. 185–214). London: Routledge.
go back to reference Hargittai, E., & Dobransky, K. (2017). Old dogs, new clicks: Digital inequality in internet skills and uses among older adults. Canadian Journal of Communication, 42(2), 195–212. Hargittai, E., & Dobransky, K. (2017). Old dogs, new clicks: Digital inequality in internet skills and uses among older adults. Canadian Journal of Communication, 42(2), 195–212.
go back to reference Helsper, E. J. (2017). The social relativity of digital exclusion: Applying relative deprivation theory to digital inequalities. Communication Theory, 27, 223–242. Helsper, E. J. (2017). The social relativity of digital exclusion: Applying relative deprivation theory to digital inequalities. Communication Theory, 27, 223–242.
go back to reference Henwood, F., Wyatt, S., Miller, N., & Senker, P. (2000). Critical perspectives on technologies, in/equalities and the information society. In F. Henwood, N. Miller, P. Senker, & S. Wyatt (Eds.), Technology and in/equality (pp. 1–18). London: Routledge. Henwood, F., Wyatt, S., Miller, N., & Senker, P. (2000). Critical perspectives on technologies, in/equalities and the information society. In F. Henwood, N. Miller, P. Senker, & S. Wyatt (Eds.), Technology and in/equality (pp. 1–18). London: Routledge.
go back to reference Hodge, H., Carson, D., Carson, D., Newman, L., & Garrett, J. (2017). Using internet technologies in rural communities to access services: The views of older people and service providers. Journal of Rural Studies, 54, 469–478. Hodge, H., Carson, D., Carson, D., Newman, L., & Garrett, J. (2017). Using internet technologies in rural communities to access services: The views of older people and service providers. Journal of Rural Studies, 54, 469–478.
go back to reference Holland, J., & Jarvis, L. (2015). Security: A critical introduction. London: Palgrave. Holland, J., & Jarvis, L. (2015). Security: A critical introduction. London: Palgrave.
go back to reference Kaldor, M., Martin, M., & Selchow, S. (2007). Human security: A new strategic narrative for Europe. International Affairs, 83(2), 273–288. Kaldor, M., Martin, M., & Selchow, S. (2007). Human security: A new strategic narrative for Europe. International Affairs, 83(2), 273–288.
go back to reference Kenyon, S., Lyons, G., & Rafferty, J. (2002). Transport and social exclusion: Investigating the possibility of promoting inclusion through virtual mobility. Journal of Transport Geography, 10(3), 207–219. Kenyon, S., Lyons, G., & Rafferty, J. (2002). Transport and social exclusion: Investigating the possibility of promoting inclusion through virtual mobility. Journal of Transport Geography, 10(3), 207–219.
go back to reference Kilpeläinen, A., & Seppänen, M. (2014). Information technology and everyday life in ageing rural villages. Journal of Rural Studies, 33, 1–8. Kilpeläinen, A., & Seppänen, M. (2014). Information technology and everyday life in ageing rural villages. Journal of Rural Studies, 33, 1–8.
go back to reference Lanas, M., Rautio, P., & Syrjala, L. (2013). Beyond educating the marginals: Recognizing life in northern rural Finland. Scandinavian Journal of Educational Research, 57(4), 385–399. Lanas, M., Rautio, P., & Syrjala, L. (2013). Beyond educating the marginals: Recognizing life in northern rural Finland. Scandinavian Journal of Educational Research, 57(4), 385–399.
go back to reference Lasch, C. (2004). The degradation of the practical arts. In F. Webster (Ed.), The information society reader (pp. 287–291). London: Routledge. Lasch, C. (2004). The degradation of the practical arts. In F. Webster (Ed.), The information society reader (pp. 287–291). London: Routledge.
go back to reference Limnéll, J., Majewski, K., & Salminen, M. (2015). Cyber security for decision makers. Jyväskylä: Docendo. Limnéll, J., Majewski, K., & Salminen, M. (2015). Cyber security for decision makers. Jyväskylä: Docendo.
go back to reference Lüders, M., & Brandtzæg, P. B. (2016). Når alt sosialt blir flyktig: En kvalitativ studie av hvordan eldre opplever sosiale medier [When everything social becomes fleeting: A qualitative study of how older people experience social media]. Norsk Medietidsskrift, 23(2), 1–18. Lüders, M., & Brandtzæg, P. B. (2016). Når alt sosialt blir flyktig: En kvalitativ studie av hvordan eldre opplever sosiale medier [When everything social becomes fleeting: A qualitative study of how older people experience social media]. Norsk Medietidsskrift, 23(2), 1–18.
go back to reference Lüders, M., & Brandtzæg, P. B. (2017). ‘My children tell me it’s so simple’: A mixed-methods approach to understand older non-users’ perceptions of social networking sites. New Media & Society, 19(2), 181–198. Lüders, M., & Brandtzæg, P. B. (2017). ‘My children tell me it’s so simple’: A mixed-methods approach to understand older non-users’ perceptions of social networking sites. New Media & Society, 19(2), 181–198.
go back to reference McDonald, M. (2013). Discourses of climate security. Political Geography, 33, 42–51. McDonald, M. (2013). Discourses of climate security. Political Geography, 33, 42–51.
go back to reference McSweeney, B. (1999). Security, identity and interests: A sociology of international relations. Cambridge: Cambridge University Press. McSweeney, B. (1999). Security, identity and interests: A sociology of international relations. Cambridge: Cambridge University Press.
go back to reference Mearsheimer, J. (2001). The tragedy of great power politics. New York, NY: W. W. Norton. Mearsheimer, J. (2001). The tragedy of great power politics. New York, NY: W. W. Norton.
go back to reference Miliband, D. (2006). Social exclusion: The next steps forward. London: ODPM. Miliband, D. (2006). Social exclusion: The next steps forward. London: ODPM.
go back to reference Morgenthau, H. (1973). Politics among nations: The struggle for power and peace (5th ed.). New York, NY: Knopf. Morgenthau, H. (1973). Politics among nations: The struggle for power and peace (5th ed.). New York, NY: Knopf.
go back to reference Noll, H. H. (2002). Towards a European system of social indicators: Theoretical framework and system architecture. Social Indicators Research, 58, 47–87. Noll, H. H. (2002). Towards a European system of social indicators: Theoretical framework and system architecture. Social Indicators Research, 58, 47–87.
go back to reference Ogg, J. (2005). Social exclusion and insecurity among older Europeans: The influence of welfare regimes. Ageing & Society, 25, 69–90. Ogg, J. (2005). Social exclusion and insecurity among older Europeans: The influence of welfare regimes. Ageing & Society, 25, 69–90.
go back to reference Peoples, C., & Vaughan-Williams, N. (2010). Critical security studies: An introduction. London: Routledge. Peoples, C., & Vaughan-Williams, N. (2010). Critical security studies: An introduction. London: Routledge.
go back to reference Rasi, P., & Kilpeläinen, A. (2015). The digital competences and agency of older people living in rural villages in Finnish Lapland. International Journal of Media, Technology and Lifelong Learning, 11(2), 149–160. Rasi, P., & Kilpeläinen, A. (2015). The digital competences and agency of older people living in rural villages in Finnish Lapland. International Journal of Media, Technology and Lifelong Learning, 11(2), 149–160.
go back to reference Reneland-Forsman, L. (2018). ‘Borrowed access’—The struggle of older persons for digital participation. International Journal of Lifelong Education, 37(3), 333–344. Reneland-Forsman, L. (2018). ‘Borrowed access’—The struggle of older persons for digital participation. International Journal of Lifelong Education, 37(3), 333–344.
go back to reference Rid, T. (2013). Cyber war will not take place. Oxford: Oxford University Press. Rid, T. (2013). Cyber war will not take place. Oxford: Oxford University Press.
go back to reference Salemink, K., Strijker, D., & Bosworth, G. (2017). Rural development in the digital age: A systematic literature review on unequal ICT availability, adoption, and use in rural areas. Journal of Rural Studies, 54, 360–371. Salemink, K., Strijker, D., & Bosworth, G. (2017). Rural development in the digital age: A systematic literature review on unequal ICT availability, adoption, and use in rural areas. Journal of Rural Studies, 54, 360–371.
go back to reference Scheerder, A., van Deursen, A., & van Dijk, J. (2017). Determinants of internet skills, uses and outcomes: A systematic review of the second- and third-level digital divide. Telematics and Informatics, 34, 1607–1624. Scheerder, A., van Deursen, A., & van Dijk, J. (2017). Determinants of internet skills, uses and outcomes: A systematic review of the second- and third-level digital divide. Telematics and Informatics, 34, 1607–1624.
go back to reference Selwyn, N. (2004). Reconsidering political and popular understandings of the digital divide. New Media & Society, 6(3), 341–362. Selwyn, N. (2004). Reconsidering political and popular understandings of the digital divide. New Media & Society, 6(3), 341–362.
go back to reference Sen, A. (1999). Development as freedom. Oxford: Oxford University Press. Sen, A. (1999). Development as freedom. Oxford: Oxford University Press.
go back to reference Sheehan, M. (2005). International security: An analytical survey. Boulder, CO: Lynne Rienner. Sheehan, M. (2005). International security: An analytical survey. Boulder, CO: Lynne Rienner.
go back to reference Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press. Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press.
go back to reference Staksrud, E. (2011). Norske barn på Internett: Høy risiko - liten skade? Nordicom Information, 33(4), 59–70. Staksrud, E. (2011). Norske barn på Internett: Høy risiko - liten skade? Nordicom Information, 33(4), 59–70.
go back to reference Van Dijk, J. (2005). The deepening divide: Inequality in the information society. London: Sage. Van Dijk, J. (2005). The deepening divide: Inequality in the information society. London: Sage.
go back to reference Van Regenmortel, S., de Donder, L., Dury, A., Smetcoren, A., de Witte, N., & Verté, D. (2016). Social exclusion in later life: A systematic review of the literature. Population Ageing, 9, 315–344. Van Regenmortel, S., de Donder, L., Dury, A., Smetcoren, A., de Witte, N., & Verté, D. (2016). Social exclusion in later life: A systematic review of the literature. Population Ageing, 9, 315–344.
go back to reference Veit-Wilson, J. (1998). Setting adequacy standards: How governments define minimum incomes. Bristol: The Policy Press. Veit-Wilson, J. (1998). Setting adequacy standards: How governments define minimum incomes. Bristol: The Policy Press.
go back to reference Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178. Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178.
go back to reference Waltz, K. N. (1979). Theory of international politics. New York, NY: Random House. Waltz, K. N. (1979). Theory of international politics. New York, NY: Random House.
go back to reference Warren, M. (2007). The digital vicious cycle: Links between social disadvantage and digital exclusion in rural areas. Telecommunications Policy, 31(6–7), 374–388. Warren, M. (2007). The digital vicious cycle: Links between social disadvantage and digital exclusion in rural areas. Telecommunications Policy, 31(6–7), 374–388.
go back to reference Wresch, W. (1996). Disconnected: Haves and have-nots in the information age. New Brunswick, NJ: Rutgers University Press. Wresch, W. (1996). Disconnected: Haves and have-nots in the information age. New Brunswick, NJ: Rutgers University Press.
go back to reference Wyn Jones, R. (2007). Message in a bottle? Theory and praxis in critical security studies. In B. Buzan & L. Hansen (Eds.), International security (pp. 299–319). London: Sage. Wyn Jones, R. (2007). Message in a bottle? Theory and praxis in critical security studies. In B. Buzan & L. Hansen (Eds.), International security (pp. 299–319). London: Sage.
go back to reference Yar, M. (2013). Cybercrime and society (2nd ed.). London: Sage. Yar, M. (2013). Cybercrime and society (2nd ed.). London: Sage.
Metadata
Title
Social Exclusion as Human Insecurity: A Human Cybersecurity Framework Applied to the European High North
Authors
Kristin Smette Gulbrandsen
Michael Sheehan
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-48070-7_5

Premium Partner