Matches in SemOpenAlex for { <https://semopenalex.org/work/W1580917586> ?p ?o ?g. }
Showing items 1 to 72 of
72
with 100 items per page.
- W1580917586 startingPage "38" @default.
- W1580917586 abstract "The majority of social processes have become very dependent on information and communication technologies (ICT) according to their quick development and increasing use. With the emergence of technologies and growing dependence of society on ICT, threats have emerged, which experts described as new. Information security or cyber dimension of national security has thus become an increasing priority for the countries, but they face these threats differently. This article contains a specialized in-depth analysis of the situation of ICT in Estonia, Switzerland, Sweden and the United Kingdom. The selection of the countries was based on their ICT development, experience with information threats and membership in various political and security organizations. We examined the following indicators: the incidence of threats, normative (legal) acts and actors who are responsible for assuring information security. These indicators subsequently allowed us a detailed understanding of ICT threats faced by selected countries and their responses to them.? IntroductionToday, the modern and technologically advanced state is undoubtedly facing the greatest structural change since the fall of the Berlin Wall and the end of the Cold War, referring to its economic, political, information and nonetheless security role. In our analysis, the latter is especially going to be emphasised, as the attitude towards the question of security has recently undergone a fundamental change, whilst the information dimension has become one of the key sources of social power.3 Cyberpower is now fundamental fact of global life, while in political, economic, and military affairs, information and information technology provide and support crucial elements of operational activities.4Throughout the human history, technological-technical revolutions have always been a matter of security dimensions as well. However, few had had such a profound impact on the power relations as it has been the case with the information and communication technologies (the ICT) and the related information revolution. Even though we often think that the Cold War Era was primarily marked by the nuclear arms race and the struggle for resources in the physical (real) space, more and more authors have been looking for causes of the well-known outcome of this period as well as the final domination of the Western world in the development of information technology and its influence both on weapons systems and the ways of operation of both military and non-military organizational structures.5 In spite of differing explanations of causes and intentions that eventually led to the Internet's predecessor, the ARPANET,6 an increasing consensus is emerging that the rise of the Internet-Protocol-based ICT and the creation of cyber space have undoubtedly changed the fundamental aspects of literally all social subsystems as well as the individual's role within them. Regardless of how we assess the events of the late 1950s and early 1960s that brought about the informatisation of the world, there is no doubt that the cyberspace and security sector have been interrelated from the beginning, both in theoretical-conceptual and empirical sense, whereby their relationship has been of inverse-deductive character.Hence, the discourse of a conceptualisation of security is completely understandable. It is the looks or the external image of security that has changed so much. Apart from national, state and individual security,7 we nowadays also speak of cyber security, which is becoming more and more equivalent an agenda in the more developed states.8 Nevertheless, information or cyber threats are still so new that they are still fairly unresolved, especially as concerns international law. However, the only certainty regarding them is that these threats take place in the virtual space of the critical information infrastructure (the CII) and with the assistance of the ICT. Cyber threats to security are connected with the use of modern ICT. …" @default.
- W1580917586 created "2016-06-24" @default.
- W1580917586 creator A5015811462 @default.
- W1580917586 date "2012-01-01" @default.
- W1580917586 modified "2023-09-24" @default.
- W1580917586 title "European E-Readiness? Cyber Dimension of National Security Policies1" @default.
- W1580917586 hasPublicationYear "2012" @default.
- W1580917586 type Work @default.
- W1580917586 sameAs 1580917586 @default.
- W1580917586 citedByCount "0" @default.
- W1580917586 crossrefType "journal-article" @default.
- W1580917586 hasAuthorship W1580917586A5015811462 @default.
- W1580917586 hasConcept C121017731 @default.
- W1580917586 hasConcept C144133560 @default.
- W1580917586 hasConcept C17744445 @default.
- W1580917586 hasConcept C199539241 @default.
- W1580917586 hasConcept C202444582 @default.
- W1580917586 hasConcept C33676613 @default.
- W1580917586 hasConcept C33923547 @default.
- W1580917586 hasConcept C38652104 @default.
- W1580917586 hasConcept C39549134 @default.
- W1580917586 hasConcept C41008148 @default.
- W1580917586 hasConcept C44725695 @default.
- W1580917586 hasConcept C527648132 @default.
- W1580917586 hasConcept C528167355 @default.
- W1580917586 hasConcept C67363961 @default.
- W1580917586 hasConcept C94625758 @default.
- W1580917586 hasConceptScore W1580917586C121017731 @default.
- W1580917586 hasConceptScore W1580917586C144133560 @default.
- W1580917586 hasConceptScore W1580917586C17744445 @default.
- W1580917586 hasConceptScore W1580917586C199539241 @default.
- W1580917586 hasConceptScore W1580917586C202444582 @default.
- W1580917586 hasConceptScore W1580917586C33676613 @default.
- W1580917586 hasConceptScore W1580917586C33923547 @default.
- W1580917586 hasConceptScore W1580917586C38652104 @default.
- W1580917586 hasConceptScore W1580917586C39549134 @default.
- W1580917586 hasConceptScore W1580917586C41008148 @default.
- W1580917586 hasConceptScore W1580917586C44725695 @default.
- W1580917586 hasConceptScore W1580917586C527648132 @default.
- W1580917586 hasConceptScore W1580917586C528167355 @default.
- W1580917586 hasConceptScore W1580917586C67363961 @default.
- W1580917586 hasConceptScore W1580917586C94625758 @default.
- W1580917586 hasIssue "1" @default.
- W1580917586 hasLocation W15809175861 @default.
- W1580917586 hasOpenAccess W1580917586 @default.
- W1580917586 hasPrimaryLocation W15809175861 @default.
- W1580917586 hasRelatedWork W1233167833 @default.
- W1580917586 hasRelatedWork W1979303116 @default.
- W1580917586 hasRelatedWork W2186345319 @default.
- W1580917586 hasRelatedWork W2279045796 @default.
- W1580917586 hasRelatedWork W2294662036 @default.
- W1580917586 hasRelatedWork W2364773532 @default.
- W1580917586 hasRelatedWork W2626737907 @default.
- W1580917586 hasRelatedWork W2626741122 @default.
- W1580917586 hasRelatedWork W2883507501 @default.
- W1580917586 hasRelatedWork W2980035251 @default.
- W1580917586 hasRelatedWork W3031075168 @default.
- W1580917586 hasRelatedWork W3087807689 @default.
- W1580917586 hasRelatedWork W3091505846 @default.
- W1580917586 hasRelatedWork W3110927384 @default.
- W1580917586 hasRelatedWork W3123907585 @default.
- W1580917586 hasRelatedWork W3157778200 @default.
- W1580917586 hasRelatedWork W40102422 @default.
- W1580917586 hasRelatedWork W2316095192 @default.
- W1580917586 hasRelatedWork W2977332579 @default.
- W1580917586 hasRelatedWork W3083538307 @default.
- W1580917586 hasVolume "5" @default.
- W1580917586 isParatext "false" @default.
- W1580917586 isRetracted "false" @default.
- W1580917586 magId "1580917586" @default.
- W1580917586 workType "article" @default.