Skip to main content

Tipp

Weitere Kapitel dieses Buchs durch Wischen aufrufen

2020 | OriginalPaper | Buchkapitel

5. Social Exclusion as Human Insecurity: A Human Cybersecurity Framework Applied to the European High North

verfasst von : Kristin Smette Gulbrandsen, Michael Sheehan

Erschienen in: Digitalisation and Human Security

Verlag: Springer International Publishing

Abstract

Digitalisation is changing the way governments provide public services. This has significance for geographically peripheral and sparsely populated regions like the European High North, which is facing challenges associated with an ageing population and labour shortages. A successful transition from traditional to digital services requires adequate digital competence and infrastructure. Without this, rural villages and elderly people in particular are at risk of suffering disadvantage. To address this, we present a cybersecurity framework that combines human security and social exclusion theory. Drawing on key informant interviews conducted in Norway, Sweden and Finland, we show that while digitalisation provides benefits to remote areas, it can also result in digital exclusion. Significant attention must therefore be paid to whose voices and interests shape the current digitalisation agenda.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141–165. Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141–165.
Zurück zum Zitat Autti, O., & Hyry-Beihammer, E. K. (2014). School closures in rural Finnish communities. Journal of Research in Rural Education, 29(1), 1–17. Autti, O., & Hyry-Beihammer, E. K. (2014). School closures in rural Finnish communities. Journal of Research in Rural Education, 29(1), 1–17.
Zurück zum Zitat Barnett, J. (2001). The meaning of environmental security: Ecological politics and policy in the new Security era. London: Zed Books. Barnett, J. (2001). The meaning of environmental security: Ecological politics and policy in the new Security era. London: Zed Books.
Zurück zum Zitat Booth, K. (2005). Introduction to part one. In K. Booth (Ed.), Critical security studies and world politics (pp. 21–25). London: Lynne Rienner. Booth, K. (2005). Introduction to part one. In K. Booth (Ed.), Critical security studies and world politics (pp. 21–25). London: Lynne Rienner.
Zurück zum Zitat Booth, K. (2007). Theory of world security. Cambridge: Cambridge University Press. Booth, K. (2007). Theory of world security. Cambridge: Cambridge University Press.
Zurück zum Zitat Bourdieu, P. (1986). The forms of capital. In J. Richardson (Ed.), Handbook of theory and research for the sociology of education (pp. 241–258). Westport, CT: Greenwood. Bourdieu, P. (1986). The forms of capital. In J. Richardson (Ed.), Handbook of theory and research for the sociology of education (pp. 241–258). Westport, CT: Greenwood.
Zurück zum Zitat Burchardt, T., Le Grand, J., & Piachaud, D. (2002). Introduction. In J. Hills, J. Le Grand, & D. Piachaud (Eds.), Understanding social exclusion (pp. 1–12). Oxford: Oxford University Press. Burchardt, T., Le Grand, J., & Piachaud, D. (2002). Introduction. In J. Hills, J. Le Grand, & D. Piachaud (Eds.), Understanding social exclusion (pp. 1–12). Oxford: Oxford University Press.
Zurück zum Zitat Buzan, B. (1983). People, states and fear: An agenda for security analysis in the post-Cold War era. Brighton: Wheatsheaf. Buzan, B. (1983). People, states and fear: An agenda for security analysis in the post-Cold War era. Brighton: Wheatsheaf.
Zurück zum Zitat Buzan, B. (1991). People, states and fear: An agenda for security analysis in the post-Cold War era (2nd ed.). Boulder, CO: Lynne Rienner. Buzan, B. (1991). People, states and fear: An agenda for security analysis in the post-Cold War era (2nd ed.). Boulder, CO: Lynne Rienner.
Zurück zum Zitat Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner. Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.
Zurück zum Zitat Byrne, D. (1999). Social exclusion. Buckingham: Open University Press. Byrne, D. (1999). Social exclusion. Buckingham: Open University Press.
Zurück zum Zitat Carr, J. (2010). Inside cyber warfare. Sebastopol, CA: O’Reilly Media. Carr, J. (2010). Inside cyber warfare. Sebastopol, CA: O’Reilly Media.
Zurück zum Zitat Clough, J. (2015). Principles of cybercrime (2nd ed.). Cambridge: Cambridge University Press. Clough, J. (2015). Principles of cybercrime (2nd ed.). Cambridge: Cambridge University Press.
Zurück zum Zitat Demchak, C. C. (2011). Wars of disruption and resilience: Cybered conflict, power and national security. London: The University of Georgia Press. Demchak, C. C. (2011). Wars of disruption and resilience: Cybered conflict, power and national security. London: The University of Georgia Press.
Zurück zum Zitat Dunn Cavelty, M. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701–715. Dunn Cavelty, M. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701–715.
Zurück zum Zitat Eskelinen, H., Frank, T., & Hirvonen, T. (2008). Does strategy matter? A comparison of broadband rollout policies in Finland and Sweden. Telecommunications Policy, 32(6), 412–421. Eskelinen, H., Frank, T., & Hirvonen, T. (2008). Does strategy matter? A comparison of broadband rollout policies in Finland and Sweden. Telecommunications Policy, 32(6), 412–421.
Zurück zum Zitat Esping-Andersen, G. (1999). Social foundations of postindustrial economies. London: Oxford University Press. Esping-Andersen, G. (1999). Social foundations of postindustrial economies. London: Oxford University Press.
Zurück zum Zitat Fløtten, T., Dahl, E., & Grønningsæter, A. (2001). Den norske fattigdommen: Hvordan arter den seg, hvor lenge varer den og hva kan vi gjøre med den? [Norwegian poverty: How does it behave, how long does it last and what can we do about it?] (Fafo Working Paper 2001:16). Forskningsstiftelsen Fafo. Retrieved from https://​www.​fafo.​no/​media/​com_​netsukii/​672.​pdf. Fløtten, T., Dahl, E., & Grønningsæter, A. (2001). Den norske fattigdommen: Hvordan arter den seg, hvor lenge varer den og hva kan vi gjøre med den? [Norwegian poverty: How does it behave, how long does it last and what can we do about it?] (Fafo Working Paper 2001:16). Forskningsstiftelsen Fafo. Retrieved from https://​www.​fafo.​no/​media/​com_​netsukii/​672.​pdf.
Zurück zum Zitat Halleröd, B., & Heikkilä, M. (1999). Poverty and social exclusion in the Nordic countries. In M. Kautto, M. Heikkilä, B. Hvinden, S. Marklund, & N. Ploug (Eds.), Nordic social policy: Changing welfare states (pp. 185–214). London: Routledge. Halleröd, B., & Heikkilä, M. (1999). Poverty and social exclusion in the Nordic countries. In M. Kautto, M. Heikkilä, B. Hvinden, S. Marklund, & N. Ploug (Eds.), Nordic social policy: Changing welfare states (pp. 185–214). London: Routledge.
Zurück zum Zitat Hargittai, E., & Dobransky, K. (2017). Old dogs, new clicks: Digital inequality in internet skills and uses among older adults. Canadian Journal of Communication, 42(2), 195–212. Hargittai, E., & Dobransky, K. (2017). Old dogs, new clicks: Digital inequality in internet skills and uses among older adults. Canadian Journal of Communication, 42(2), 195–212.
Zurück zum Zitat Helsper, E. J. (2017). The social relativity of digital exclusion: Applying relative deprivation theory to digital inequalities. Communication Theory, 27, 223–242. Helsper, E. J. (2017). The social relativity of digital exclusion: Applying relative deprivation theory to digital inequalities. Communication Theory, 27, 223–242.
Zurück zum Zitat Henwood, F., Wyatt, S., Miller, N., & Senker, P. (2000). Critical perspectives on technologies, in/equalities and the information society. In F. Henwood, N. Miller, P. Senker, & S. Wyatt (Eds.), Technology and in/equality (pp. 1–18). London: Routledge. Henwood, F., Wyatt, S., Miller, N., & Senker, P. (2000). Critical perspectives on technologies, in/equalities and the information society. In F. Henwood, N. Miller, P. Senker, & S. Wyatt (Eds.), Technology and in/equality (pp. 1–18). London: Routledge.
Zurück zum Zitat Hodge, H., Carson, D., Carson, D., Newman, L., & Garrett, J. (2017). Using internet technologies in rural communities to access services: The views of older people and service providers. Journal of Rural Studies, 54, 469–478. Hodge, H., Carson, D., Carson, D., Newman, L., & Garrett, J. (2017). Using internet technologies in rural communities to access services: The views of older people and service providers. Journal of Rural Studies, 54, 469–478.
Zurück zum Zitat Holland, J., & Jarvis, L. (2015). Security: A critical introduction. London: Palgrave. Holland, J., & Jarvis, L. (2015). Security: A critical introduction. London: Palgrave.
Zurück zum Zitat Kaldor, M., Martin, M., & Selchow, S. (2007). Human security: A new strategic narrative for Europe. International Affairs, 83(2), 273–288. Kaldor, M., Martin, M., & Selchow, S. (2007). Human security: A new strategic narrative for Europe. International Affairs, 83(2), 273–288.
Zurück zum Zitat Kenyon, S., Lyons, G., & Rafferty, J. (2002). Transport and social exclusion: Investigating the possibility of promoting inclusion through virtual mobility. Journal of Transport Geography, 10(3), 207–219. Kenyon, S., Lyons, G., & Rafferty, J. (2002). Transport and social exclusion: Investigating the possibility of promoting inclusion through virtual mobility. Journal of Transport Geography, 10(3), 207–219.
Zurück zum Zitat Kilpeläinen, A., & Seppänen, M. (2014). Information technology and everyday life in ageing rural villages. Journal of Rural Studies, 33, 1–8. Kilpeläinen, A., & Seppänen, M. (2014). Information technology and everyday life in ageing rural villages. Journal of Rural Studies, 33, 1–8.
Zurück zum Zitat Lanas, M., Rautio, P., & Syrjala, L. (2013). Beyond educating the marginals: Recognizing life in northern rural Finland. Scandinavian Journal of Educational Research, 57(4), 385–399. Lanas, M., Rautio, P., & Syrjala, L. (2013). Beyond educating the marginals: Recognizing life in northern rural Finland. Scandinavian Journal of Educational Research, 57(4), 385–399.
Zurück zum Zitat Lasch, C. (2004). The degradation of the practical arts. In F. Webster (Ed.), The information society reader (pp. 287–291). London: Routledge. Lasch, C. (2004). The degradation of the practical arts. In F. Webster (Ed.), The information society reader (pp. 287–291). London: Routledge.
Zurück zum Zitat Limnéll, J., Majewski, K., & Salminen, M. (2015). Cyber security for decision makers. Jyväskylä: Docendo. Limnéll, J., Majewski, K., & Salminen, M. (2015). Cyber security for decision makers. Jyväskylä: Docendo.
Zurück zum Zitat Lüders, M., & Brandtzæg, P. B. (2016). Når alt sosialt blir flyktig: En kvalitativ studie av hvordan eldre opplever sosiale medier [When everything social becomes fleeting: A qualitative study of how older people experience social media]. Norsk Medietidsskrift, 23(2), 1–18. Lüders, M., & Brandtzæg, P. B. (2016). Når alt sosialt blir flyktig: En kvalitativ studie av hvordan eldre opplever sosiale medier [When everything social becomes fleeting: A qualitative study of how older people experience social media]. Norsk Medietidsskrift, 23(2), 1–18.
Zurück zum Zitat Lüders, M., & Brandtzæg, P. B. (2017). ‘My children tell me it’s so simple’: A mixed-methods approach to understand older non-users’ perceptions of social networking sites. New Media & Society, 19(2), 181–198. Lüders, M., & Brandtzæg, P. B. (2017). ‘My children tell me it’s so simple’: A mixed-methods approach to understand older non-users’ perceptions of social networking sites. New Media & Society, 19(2), 181–198.
Zurück zum Zitat McDonald, M. (2013). Discourses of climate security. Political Geography, 33, 42–51. McDonald, M. (2013). Discourses of climate security. Political Geography, 33, 42–51.
Zurück zum Zitat McSweeney, B. (1999). Security, identity and interests: A sociology of international relations. Cambridge: Cambridge University Press. McSweeney, B. (1999). Security, identity and interests: A sociology of international relations. Cambridge: Cambridge University Press.
Zurück zum Zitat Mearsheimer, J. (2001). The tragedy of great power politics. New York, NY: W. W. Norton. Mearsheimer, J. (2001). The tragedy of great power politics. New York, NY: W. W. Norton.
Zurück zum Zitat Miliband, D. (2006). Social exclusion: The next steps forward. London: ODPM. Miliband, D. (2006). Social exclusion: The next steps forward. London: ODPM.
Zurück zum Zitat Morgenthau, H. (1973). Politics among nations: The struggle for power and peace (5th ed.). New York, NY: Knopf. Morgenthau, H. (1973). Politics among nations: The struggle for power and peace (5th ed.). New York, NY: Knopf.
Zurück zum Zitat Noll, H. H. (2002). Towards a European system of social indicators: Theoretical framework and system architecture. Social Indicators Research, 58, 47–87. Noll, H. H. (2002). Towards a European system of social indicators: Theoretical framework and system architecture. Social Indicators Research, 58, 47–87.
Zurück zum Zitat Ogg, J. (2005). Social exclusion and insecurity among older Europeans: The influence of welfare regimes. Ageing & Society, 25, 69–90. Ogg, J. (2005). Social exclusion and insecurity among older Europeans: The influence of welfare regimes. Ageing & Society, 25, 69–90.
Zurück zum Zitat Peoples, C., & Vaughan-Williams, N. (2010). Critical security studies: An introduction. London: Routledge. Peoples, C., & Vaughan-Williams, N. (2010). Critical security studies: An introduction. London: Routledge.
Zurück zum Zitat Rasi, P., & Kilpeläinen, A. (2015). The digital competences and agency of older people living in rural villages in Finnish Lapland. International Journal of Media, Technology and Lifelong Learning, 11(2), 149–160. Rasi, P., & Kilpeläinen, A. (2015). The digital competences and agency of older people living in rural villages in Finnish Lapland. International Journal of Media, Technology and Lifelong Learning, 11(2), 149–160.
Zurück zum Zitat Reneland-Forsman, L. (2018). ‘Borrowed access’—The struggle of older persons for digital participation. International Journal of Lifelong Education, 37(3), 333–344. Reneland-Forsman, L. (2018). ‘Borrowed access’—The struggle of older persons for digital participation. International Journal of Lifelong Education, 37(3), 333–344.
Zurück zum Zitat Rid, T. (2013). Cyber war will not take place. Oxford: Oxford University Press. Rid, T. (2013). Cyber war will not take place. Oxford: Oxford University Press.
Zurück zum Zitat Salemink, K., Strijker, D., & Bosworth, G. (2017). Rural development in the digital age: A systematic literature review on unequal ICT availability, adoption, and use in rural areas. Journal of Rural Studies, 54, 360–371. Salemink, K., Strijker, D., & Bosworth, G. (2017). Rural development in the digital age: A systematic literature review on unequal ICT availability, adoption, and use in rural areas. Journal of Rural Studies, 54, 360–371.
Zurück zum Zitat Scheerder, A., van Deursen, A., & van Dijk, J. (2017). Determinants of internet skills, uses and outcomes: A systematic review of the second- and third-level digital divide. Telematics and Informatics, 34, 1607–1624. Scheerder, A., van Deursen, A., & van Dijk, J. (2017). Determinants of internet skills, uses and outcomes: A systematic review of the second- and third-level digital divide. Telematics and Informatics, 34, 1607–1624.
Zurück zum Zitat Selwyn, N. (2004). Reconsidering political and popular understandings of the digital divide. New Media & Society, 6(3), 341–362. Selwyn, N. (2004). Reconsidering political and popular understandings of the digital divide. New Media & Society, 6(3), 341–362.
Zurück zum Zitat Sen, A. (1999). Development as freedom. Oxford: Oxford University Press. Sen, A. (1999). Development as freedom. Oxford: Oxford University Press.
Zurück zum Zitat Sheehan, M. (2005). International security: An analytical survey. Boulder, CO: Lynne Rienner. Sheehan, M. (2005). International security: An analytical survey. Boulder, CO: Lynne Rienner.
Zurück zum Zitat Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press. Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press.
Zurück zum Zitat Staksrud, E. (2011). Norske barn på Internett: Høy risiko - liten skade? Nordicom Information, 33(4), 59–70. Staksrud, E. (2011). Norske barn på Internett: Høy risiko - liten skade? Nordicom Information, 33(4), 59–70.
Zurück zum Zitat Van Dijk, J. (2005). The deepening divide: Inequality in the information society. London: Sage. Van Dijk, J. (2005). The deepening divide: Inequality in the information society. London: Sage.
Zurück zum Zitat Van Regenmortel, S., de Donder, L., Dury, A., Smetcoren, A., de Witte, N., & Verté, D. (2016). Social exclusion in later life: A systematic review of the literature. Population Ageing, 9, 315–344. Van Regenmortel, S., de Donder, L., Dury, A., Smetcoren, A., de Witte, N., & Verté, D. (2016). Social exclusion in later life: A systematic review of the literature. Population Ageing, 9, 315–344.
Zurück zum Zitat Veit-Wilson, J. (1998). Setting adequacy standards: How governments define minimum incomes. Bristol: The Policy Press. Veit-Wilson, J. (1998). Setting adequacy standards: How governments define minimum incomes. Bristol: The Policy Press.
Zurück zum Zitat Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178. Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178.
Zurück zum Zitat Waltz, K. N. (1979). Theory of international politics. New York, NY: Random House. Waltz, K. N. (1979). Theory of international politics. New York, NY: Random House.
Zurück zum Zitat Warren, M. (2007). The digital vicious cycle: Links between social disadvantage and digital exclusion in rural areas. Telecommunications Policy, 31(6–7), 374–388. Warren, M. (2007). The digital vicious cycle: Links between social disadvantage and digital exclusion in rural areas. Telecommunications Policy, 31(6–7), 374–388.
Zurück zum Zitat Wresch, W. (1996). Disconnected: Haves and have-nots in the information age. New Brunswick, NJ: Rutgers University Press. Wresch, W. (1996). Disconnected: Haves and have-nots in the information age. New Brunswick, NJ: Rutgers University Press.
Zurück zum Zitat Wyn Jones, R. (2007). Message in a bottle? Theory and praxis in critical security studies. In B. Buzan & L. Hansen (Eds.), International security (pp. 299–319). London: Sage. Wyn Jones, R. (2007). Message in a bottle? Theory and praxis in critical security studies. In B. Buzan & L. Hansen (Eds.), International security (pp. 299–319). London: Sage.
Zurück zum Zitat Yar, M. (2013). Cybercrime and society (2nd ed.). London: Sage. Yar, M. (2013). Cybercrime and society (2nd ed.). London: Sage.
Metadaten
Titel
Social Exclusion as Human Insecurity: A Human Cybersecurity Framework Applied to the European High North
verfasst von
Kristin Smette Gulbrandsen
Michael Sheehan
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-48070-7_5