Publicação
Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen
| Resumo: | Assumptions are made by government and technology providers about the power relationships that shape the use of technological security controls and the norms under which technology usage occurs. We present a case study carried out in the North East of England that examined how a community might work together using a digital information sharing platform to respond to the pressures of welfare policy change. We describe an inductive consideration of this highly local case study before reviewing it in the light of broader security theory. By taking this approach we problematise the tendency of the state to focus on the security of technology at the expense of the security of the citizen. From insights gained from the case study and the subsequent literature review, we conclude that there are three main absences not addressed by the current designs of cybersecurity architectures. These are absences of: consensus as to whose security is being addressed, evidence of equivalence between the mechanisms that control behaviour, and two-way legibility. We argue that by addressing these absences the foundations of trust and collaboration can be built which are necessary for effective cybersecurity. Our consideration of the case study within the context of sovereignty indicates that the design of the cybersecurity architecture and its concomitant service design has a significant bearing on the social contract between citizen and state. By taking this novel perspective new directions emerge for the understanding of the effectiveness of cybersecurity technologies. |
|---|---|
| Autores principais: | Coles-Kemp, Lizzie |
| Outros Autores: | Ashenden, Debi; O'Hara, Kieron |
| Assunto: | cybersecurity; cyberspace; power; social contract; sovereignty |
| Ano: | 2018 |
| País: | Portugal |
| Tipo de documento: | artigo |
| Tipo de acesso: | unknown |
| Instituição associada: | Cogitatio Press |
| Idioma: | inglês |
| Origem: | Politics and Governance |
Registos relacionados
article BIBLIOMETRIC ANALYSIS ON CYBERSPACE SECURITY - NIS DIRECTIVES
por: Cláudia, Borgguen
Publicado em: (2023)
por: Cláudia, Borgguen
Publicado em: (2023)
article The war on cyberterrorism
por: Marsili, M.
Publicado em: (2019)
por: Marsili, M.
Publicado em: (2019)
school Securing cyberspace : threats and challenges to NATO
por: Almeida, António Miguel Correia Semedo Neves
Publicado em: (2024)
por: Almeida, António Miguel Correia Semedo Neves
Publicado em: (2024)
groups Cybersecurity games for secure programming education in the industry: gameplay analysis
por: Gasiba, Tiago
Publicado em: (2020)
por: Gasiba, Tiago
Publicado em: (2020)
article May the source be with you: On ChatGPT, cybersecurity, and secure coding
por: Gasiba, T. E.
Publicado em: (2024)
por: Gasiba, T. E.
Publicado em: (2024)
category Contributos para a definição das competências do Centro Nacional de Ciberdefesa no panorama da cibersegurança nacional: a definição de responsabilidades e a coordenação com os diferentes atores
por: Costa, José
Publicado em: (2017)
por: Costa, José
Publicado em: (2017)
category O papel da GNR no contexto da Cibersegurança Nacional
por: Machado, Paulo
Publicado em: (2015)
por: Machado, Paulo
Publicado em: (2015)
groups Design of secure coding challenges for cybersecurity education in the industry
por: Gasiba, Tiago
Publicado em: (2020)
por: Gasiba, Tiago
Publicado em: (2020)
article Cyberspace regulation: cesurist and traditionalists
por: Santos, Lino
Publicado em: (2015)
por: Santos, Lino
Publicado em: (2015)
rate_review A review of attacks, vulnerabilities, and defenses in industry 4.0 with new challenges on data sovereignty ahead
por: Pedreira, Vítor
Publicado em: (2021)
por: Pedreira, Vítor
Publicado em: (2021)
book Behavioural psychology towards artificial intelligence in cybersecurity
por: Galvão, Ana Maria
Publicado em: (2023)
por: Galvão, Ana Maria
Publicado em: (2023)
school Cibersegurança: o papel da Polícia da República de Moçambique (PRM) na prevenção da cibercriminalidade
por: Abel, Tauale
Publicado em: (2024)
por: Abel, Tauale
Publicado em: (2024)
article Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal
por: Antunes, Mário
Publicado em: (2021)
por: Antunes, Mário
Publicado em: (2021)
groups Enhancing cybersecurity education for the healthcare sector: Fostering interdisciplinary ManagiDiTH approach
por: Rajamäki, J.
Publicado em: (2024)
por: Rajamäki, J.
Publicado em: (2024)
groups Raising security awareness using cybersecurity challenges in embedded programming courses
por: Gasiba, T. E.
Publicado em: (2021)
por: Gasiba, T. E.
Publicado em: (2021)
school Defence strategies in the digital space: the case of Israel
por: Vilinskiy, Egor Nikolaevich
Publicado em: (2024)
por: Vilinskiy, Egor Nikolaevich
Publicado em: (2024)
category Comparação dos processos de edificação de capacidades no ciberespaço pela OTAN E UE, na sua vertente militar
por: Alvarenga, Hugo Filipe Matias de Atouguia de
Publicado em: (2022)
por: Alvarenga, Hugo Filipe Matias de Atouguia de
Publicado em: (2022)
article A Customizable Web Platform to Manage Standards Compliance of Information Security and Cybersecurity Auditing
por: Antunes, Mário
Publicado em: (2022)
por: Antunes, Mário
Publicado em: (2022)
article Predicting cybersecurity risk: a methodology for assessments
por: Ferreira, Daniel Jorge
Publicado em: (2022)
por: Ferreira, Daniel Jorge
Publicado em: (2022)
school A imputação de ciberataques aos Estados
por: Martins, Inês Maria Araújo
Publicado em: (2022)
por: Martins, Inês Maria Araújo
Publicado em: (2022)
category O ciberespaço como nova dimensão nos conflitos
por: Costa, Manuel
Publicado em: (2017)
por: Costa, Manuel
Publicado em: (2017)
groups A decision support system for corporations cybersecurity management
por: Roldán-Molina, G.
Publicado em: (2017)
por: Roldán-Molina, G.
Publicado em: (2017)
article A decision support system for corporations cybersecurity management
por: Roldan-Molina, Gabriela
Publicado em: (2017)
por: Roldan-Molina, Gabriela
Publicado em: (2017)
book Poverty and Food (In)security
por: Truninger, Mónica
Publicado em: (2017)
por: Truninger, Mónica
Publicado em: (2017)
groups Cybersecurity culture in Portuguese organizations: An exploratory analysis
por: Cardoso, M. G. M. S.
Publicado em: (2017)
por: Cardoso, M. G. M. S.
Publicado em: (2017)
article Continuous industrial sector cybersecurity assessment paradigm proposed model of cybersecurity certification
por: Oliveira, Andre da Silva
Publicado em: (2022)
por: Oliveira, Andre da Silva
Publicado em: (2022)
article Ethical and legal aspects of cybersecurity in health
por: Galvão, Ana Maria
Publicado em: (2024)
por: Galvão, Ana Maria
Publicado em: (2024)
school Solution for the management of Cybersecurity for Smart Homes
por: Lalangui, Erick Alexander Calvopiña
Publicado em: (2025)
por: Lalangui, Erick Alexander Calvopiña
Publicado em: (2025)
article The impact of cybersecurity on the regulatory legal framework for maritime security
por: Faria, Duarte Lynce de
Publicado em: (2020)
por: Faria, Duarte Lynce de
Publicado em: (2020)
school Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance
por: Hasan, Mahmudul
Publicado em: (2021)
por: Hasan, Mahmudul
Publicado em: (2021)
school Assessment of Iscte's cybersecurity capabilities
por: Faria, João Miguel Jorge Manuelito
Publicado em: (2023)
por: Faria, João Miguel Jorge Manuelito
Publicado em: (2023)
school HANDLING CYBERSECURITY RELATED INCIDENTS IN THE SECURITY OPERATION CENTER OF THE POLYTECHNIC OF LEIRIA
por: Mateus, Marco Alexandre Clemente
Publicado em: (2021)
por: Mateus, Marco Alexandre Clemente
Publicado em: (2021)
article Enacting Expertise: Ritual and Risk in Cybersecurity
por: Shires, James
Publicado em: (2018)
por: Shires, James
Publicado em: (2018)
article Cybersecurity challenges in healthcare medical devices
por: Longras, Ana
Publicado em: (2023)
por: Longras, Ana
Publicado em: (2023)
school Cibersegurança na PSP: uma análise do nível de consciencialização dos polícias do COMETLIS
por: Afonso, Pedro Miguel Nunes Barreiros
Publicado em: (2024)
por: Afonso, Pedro Miguel Nunes Barreiros
Publicado em: (2024)
school Estudo sobre o atual cenário dos Cibercrimes denunciados na cidade de Luanda
por: Tavares, Matias Francisco Sanches
Publicado em: (2025)
por: Tavares, Matias Francisco Sanches
Publicado em: (2025)
school UE e NATO no ciberespaço : o caso do conflito russo-ucraniano
por: Cunha, Diogo Silva da
Publicado em: (2025)
por: Cunha, Diogo Silva da
Publicado em: (2025)
school O ciberterrorismo como tática de guerra no séc. XXI : O papel das Organizações Internacionais na prevenção e proteção desta ameaça
por: Bastos, Patrícia Ramos de Carvalho Barros
Publicado em: (2023)
por: Bastos, Patrícia Ramos de Carvalho Barros
Publicado em: (2023)
category Contributos para um modelo de atuação da Guarda Nacional Republicana no ciberespaço
por: Carvalho, Gonçalo Nuno Silva Gonçalves de
Publicado em: (2023)
por: Carvalho, Gonçalo Nuno Silva Gonçalves de
Publicado em: (2023)
category Ciberguerra e Ciberpaz nas novas Relações Internacionais
por: Passos, Carlos
Publicado em: (2017)
por: Passos, Carlos
Publicado em: (2017)
Registos relacionados
-
article BIBLIOMETRIC ANALYSIS ON CYBERSPACE SECURITY - NIS DIRECTIVES
por: Cláudia, Borgguen
Publicado em: (2023) -
article The war on cyberterrorism
por: Marsili, M.
Publicado em: (2019) -
school Securing cyberspace : threats and challenges to NATO
por: Almeida, António Miguel Correia Semedo Neves
Publicado em: (2024) -
groups Cybersecurity games for secure programming education in the industry: gameplay analysis
por: Gasiba, Tiago
Publicado em: (2020) -
article May the source be with you: On ChatGPT, cybersecurity, and secure coding
por: Gasiba, T. E.
Publicado em: (2024)