scispace - formally typeset
Search or ask a question
Institution

Swedish National Defence College

EducationStockholm, Sweden
About: Swedish National Defence College is a education organization based out in Stockholm, Sweden. It is known for research contribution in the topics: Crisis management & European union. The organization has 218 authors who have published 569 publications receiving 8074 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors argue that when we fail to do so, phenomena such as Islamophobia are allowed to fester beneath the surface and we find ourselves confronted with a brutality that is of our own making -a dehumanizing of that which we don't understand.
Abstract: look, believe, or act like ourselves, is to discuss our own values and beliefs, along with our misconceptions of each other – this also includes the right to critique each other. When we fail to do so, phenomena such as Islamophobia are allowed to fester beneath the surface and we find ourselves confronted with a brutality that is of our own making – a dehumanizing of that which we don’t understand. All of which leads to the ultimate abridgement of our own freedom. This book has helped me to understand how those abridgements take shape and who ultimately benefits from our lack of freedom of expression.
Book ChapterDOI
25 Jul 2022
01 Jan 2011
TL;DR: The emerging digital threats that the authors' increasingly connected network society is faced with are discussed and a strategy based on collaboration and information sharing between civilian and military agencies aimed at increasing societal robustness in a small, yet highly connected country with limited resources is considered.
Abstract: This paper discusses the emerging digital threats that our increasingly connected network society is faced with. It considers a strategy based on collaboration and information sharing between civilian and military agencies aimed at increasing societal robustness in a small, yet highly connected country with limited resources.The term Network Society, first coined in the 1990s by Jan van Dijk (2006) and Manuel Castells (1996), refers to a societal structure formed by the abundant access to information and communication technologies (ICTs), allowing information to be generated, processed and distributed on the basis of the knowledge accumulated in the nodes of the network. In the network society, government decision making and public service delivery are conducted by increasing use of advanced ICTs (Yang and Bergrud, 2008). ICT is also leveraged to create new and improved public services, for more efficient service provisioning and for reduction of operating expenses.However, as information becomes pervasive, complex intersystem dependencies are formed that may induce serious vulnerabilities. These vulnerabilities can manifest as single points of failure in critical infrastructures, but also as an increased exposure to antagonistic threats such as cyber attacks. Mitigating the vulnerability of our increasingly technology-dependant society has therefore become a high-priority task for many governments and administrations of technically mature countries with well-developed ICT infrastructures. In Sweden, commonly ranking among the top countries in the world when it comes to ICT use, cyber security has become an increasingly important issue.In 2010, the Swedish government decided to develop a national strategy for the protection of critical public services and infrastructure. The work was initiated by the identification of sectors containing functionality that continuously needs to be upheld in order to guarantee delivery of basic societal services, such as power production, water and food distribution, voice and data communications, emergency health care and financial services. These highly important societal functions are faced with several threats; traditional ones such as natural disasters and large-scale accidents may lead to disruptions limiting the access to goods and services. There are also new threats, brought on by the transition to a network society.Preparing for these extreme events is an obviously difficult task, not least since they are unexpected by nature and hard to characterize in detail. When it comes to cyber security, this holds even more true. Not only is the target hard to predict, but the method of attack and the extent of the resulting consequences are often difficult to fully evaluate. A challenging problem is the initial classification of a cyber attack – as a criminal act or a military aggression. Since the identity of the attacker is commonly unknown, and since information flowing through computer networks is oblivious to geographical boundaries, an attack emanating from a server physically located in a certain country could in reality be initiated by a person in the same country as the victim, or equally by a government-sanctioned entity in an unidentified hostile nation.Creating a robust network society requires a systematic analysis of existing threats, which vulnerabilities they may exploit, what assets that are involved and an assessment of the resulting risk. Several countries have invested substantial resources in building new lines of defense against the emerging digital threats, where the U.S. is probably the one that has come the farthest by the establishment of its Cyber Command. Sweden is in these circumstances a quite small country, geographically the size of California but with a population not exceeding 10 million. Even though the degree of national ICT development is high, the available resources for dealing with the threat of large scale hostile cyber attacks are limited, both when it comes to civilian agencies and the armed forces. Combining resources in a comprehensive approach to cyber security is thus needed in order to achieve effect.A focus on increased collaboration, information exchange, education and combined exercises between the stakeholders responsible for responding to cyber attacks is most likely a key factor in increasing robustness of the network society. Besides reactive resources, which can be used to mitigate the consequences of an attack, proactive methods and assets are also needed to prevent an attack from succeeding or to limit its consequences. Signals intelligence and information operations have proven to be useful methods in this work and an extensive cooperation between parties possessing these capabilities is thus highly valuable. One must also realize that technology itself will not solve any problems, either civilian or military, but the focus must instead be on how it is used and in what context.
Proceedings ArticleDOI
01 May 2017
TL;DR: A case study approach was used to analyze the systems engineering processes of the SEP and Visby class corvette cases, finding a preferred workflow from mission analysis to sub system design has been derived from lessons identified.
Abstract: A case study approach, based on interviews and document reviews, was used to analyze the systems engineering processes of the SEP (Armored Multirole Vehicle, in Swedish) and the Visby class corvette cases respectively. The focus was on signature management. The result is a thorough investigation of what worked in the cases studied. The main conclusions can be summarized in three points. 1) A preferred workflow from mission analysis to sub system design has been derived from lessons identified; 2) The three main success factors identified were: building technology demonstrators, having an Integrated Product Team approach, and establishing stealth as a key system design goal; 3) Coherence and traceability between military needs on the battlefield and signature requirements need further research.

Authors

Showing all 225 results

Network Information
Related Institutions (5)
Copenhagen Business School
9.6K papers, 341.8K citations

77% related

Stockholm School of Economics
4.8K papers, 285.5K citations

74% related

European University Institute
6.5K papers, 168.1K citations

74% related

London School of Economics and Political Science
35K papers, 1.4M citations

72% related

Tilburg University
22.3K papers, 791.3K citations

71% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202218
202165
202051
201935
201840