Academic literature on the topic 'National security – Finland'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'National security – Finland.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "National security – Finland"

1

Lohse, Mikael. "Sharing national security information in Finland." Information & Communications Technology Law 29, no. 3 (May 12, 2020): 279–90. http://dx.doi.org/10.1080/13600834.2020.1759277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lehto, Martti, and Pekka Neittaanmäki. "Cyber security training in Finnish basic and general upper secondary education." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 199–208. http://dx.doi.org/10.34190/iccws.18.1.984.

Full text
Abstract:
Cyber security in Finland is part of other areas of comprehensive security, as digital solutions multiply in society and technologies advance. Cyber security is one of the primary national security and national defense concerns. Cyber security has quickly evolved from a technical discipline to a strategic concept. Cyber security capacity building can be measured based on the existence and number of research and developments, education and training programs, and certified professionals and public sector agencies. Cybersecurity awareness and the related civic skills play an increasingly important role as our societies become more digitalized. Improving citizens' cyber skills through education is an important goal that would strengthen Finland as a country of higher education and expertise and lay the foundation for the society of the future. Pursuant to the Finland’s Cyber Security Strategy (2019) “National cyber security competence will be ensured by identifying requirements and strengthening education and research.” Finland’s Cyber Security Development Programme (2021) necessitates that in basic education ensures young people have sufficient skills to operate in a digital operating environment and that they understand cyber security threats and know how to protect themselves from them. So, cybersecurity is an important subject for everyone, not just industry or public organizations. It’s also vital for our children to understand how to stay safe online, and the need to be aware of any dangers that might come their way. Cybersecurity awareness training is important because it teaches pupils how they can protect themselves from cyber-attacks (MTC, 2021). The study of cybersecurity education in Finland was made in autumn 2021 and spring 2022 for the National Cyber Security Director. According to the study, measures are needed so that cyber security becomes an important aspect when planning education and teaching. There are different models to choose from to make training more effective. This paper presents the results of the research focusing basic and general upper secondary education.
APA, Harvard, Vancouver, ISO, and other styles
3

Lehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.

Full text
Abstract:
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives. The Cyber Security Strategy also describes the key objectives that will be undertaken through a comprehensive body of work across the nation to achieve these strategic priorities. Cyberspace underpins almost every facet of the national functions vital to society and provides critical support for areas like critical infrastructure, economy, public safety, and national security. National governments aim at making a substantial contribution to secure cyberspace and they have different focus areas in the cyber ecosystem. In this context the level of cyber security reached is the sum of all national and international measures taken to protect all activities in the cyber ecosystem. This paper will analyze the cyber security threats, vulnerabilities and cyber weaponry and the cyber security objectives of the Cyber Security Strategies made by Australia, Canada, Czech Republic, Estonia, Finland, Germany, the Netherlands, the United Kingdom and the United States.
APA, Harvard, Vancouver, ISO, and other styles
4

Lohse, Mikael. "Finnish Defence Intelligence Agency - an Actor in National Security?" Journal of Strategic Security 13, no. 2 (July 2020): 107–20. http://dx.doi.org/10.5038/1944-0472.13.2.1799.

Full text
Abstract:
One disparate feature between Finnish civilian and military intelligence is their express relationship to national security. The Finnish Security and Intelligence Service prominently declares to be an expert in national security whereas no corresponding public territorial claim has been made by its counterpart – the Finnish Defence Intelligence Agency (FDIA). This observation leads to the question: are the tasks of the FDIA limited solely to the military defence of Finland or has it any more comprehensive role in safeguarding national security. This article aims to examine this question by comparing the provisions governing the purpose of civilian and military intelligence and analysing the provision on the targets of military intelligence. Legal analysis indicate that military intelligence targets are broadly located in the field on national security, both at the core of military activities and in the outer reaches on non-military activities. The FDIA actually has a wide mandate which extends its mission beyond the reaches of civilian intelligence.
APA, Harvard, Vancouver, ISO, and other styles
5

Nykänen, Riku, and Tommi Kärkkäinen. "Aligning Two Specifications for Controlling Information Security." International Journal of Cyber Warfare and Terrorism 4, no. 2 (April 2014): 46–62. http://dx.doi.org/10.4018/ijcwt.2014040104.

Full text
Abstract:
Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in the process, structural, and operational level, focusing on the security control objectives and the actual controls. Even if both specifications share the same topics on high level, the results reveal the differences in the scope and in the included security controls.
APA, Harvard, Vancouver, ISO, and other styles
6

Marttunen, Mika, Jyri Mustajoki, Suvi Sojamo, Lauri Ahopelto, and Marko Keskinen. "A Framework for Assessing Water Security and the Water–Energy–Food Nexus—The Case of Finland." Sustainability 11, no. 10 (May 22, 2019): 2900. http://dx.doi.org/10.3390/su11102900.

Full text
Abstract:
Water security demands guaranteeing economic, social and environmental sustainability and simultaneously addressing the diversity of risks and threats related to water. Various frameworks have been suggested to support water security assessment. They are typically based on indexes enabling national comparisons; these may, however, oversimplify complex and often contested water issues. We developed a structured and systemic way to assess water security and its future trends via a participatory process. The framework establishes a criteria hierarchy for water security, consisting of four main themes: the state of the water environment; human health and well-being; the sustainability of livelihoods; and the stability, functions and responsibility of society. The framework further enables the analysis of relationships between the water security criteria as well as between water, energy and food security. The framework was applied to a national water security assessment of Finland in 2018 and 2030. Our experience indicates that using the framework collaboratively with stakeholders provides a meaningful way to improve understanding and to facilitate discussion about the state of water security and the actions needed for its improvement.
APA, Harvard, Vancouver, ISO, and other styles
7

Lehto, Martti. "Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences." International Journal of Cyber Warfare and Terrorism 6, no. 2 (April 2016): 15–31. http://dx.doi.org/10.4018/ijcwt.2016040102.

Full text
Abstract:
The revolution in information technology that began in the 1990s has been transforming Finland into an information society. Imaginative data processing and utilization, arising from the needs of citizens and the business community, are some of the most important elements in a thriving society. Information and know-how have become key ‘commodities' in society, and they can be utilized all the more efficiently through information technology. For all nations, the information technology revolution quietly changed the way business and government operate, as well as the daily life of citizens. Our daily life, fundamental rights, social interactions and economies depend on information and communication technology working seamlessly. An open and free cyberspace has promoted political and social inclusion worldwide; it has broken down barriers between countries, communities and citizens, allowing interaction and sharing of information and ideas across the globe. Individuals, public and private organizations alike depend on the cyber world. From the citizens using social media, to banks growing their business, to law enforcement supporting national security – every sector of the society is increasingly dependent upon technology and networked systems. While the public sector, the economy and the business community as well as citizens benefit from globally networked services, the digital IT society contains inherent vulnerabilities which may generate security risks to citizens, the business community or the vital functions of society. Without sufficient awareness of the risks in cyber world, however, behavioral decisions and unseen threats can negatively impact the security of the critical infrastructure and can cause physical damage in the real world. On an individual level, what is at stake is the vulnerability of each individual user in cyber world. As the world grows more connected through cyber world, a highly skilled cyber security workforce is required to secure, protect, and defend national critical information infrastructure. Across the private and public sector organizations are looking for well-trained professionals to assess, design, develop, and implement cyber security solutions and strategies. While the demand for cyber security professionals is high, the supply is low. Meeting the growing demand for cyber security professionals begins in the education system. The most efficient custom to increase cyber security is the improvement of the know-how. The cyber security strategies and development plans require the improvement of the know-how of the citizens and actors of the economic life and public administration. Pursuant to Finland's Cyber Security Strategy (2013) “the implementation of cyber security R&D and education at different levels does not only strengthen national expertise, it also bolsters Finland as an information society.” In this article are analyzed the cyber security research and education which is offered in Finland's universities and universities of applied sciences.
APA, Harvard, Vancouver, ISO, and other styles
8

Dragomir, Elena. "To Be or to Become ‘European’? ‘Westernizing’ Narratives in Post-Cold War Finland." Romanian Journal for Baltic and Nordic Studies 1, no. 1 (November 15, 2009): 31–50. http://dx.doi.org/10.53604/rjbns.v1i1_3.

Full text
Abstract:
The Finnish ‘westernizing’ narrative emphasizes Finland’s ‘westernness’, i.e. the idea that Finland and Finns have always been western and part of the ‘European family’. The recent past is not seen as an obstacle for this interpretation. Thus, according to this type of discourse, after the collapse of the Soviet Union, and ‘liberated’ from the constraints of the Cold War, Finland could finally ‘return’ to the West, to Europe, to its ‘natural’ origins. This article examines in short what might be called the post-Cold War narrative of Finnish westernness as it appears in the English language sources. It argues that the westernizing narrative is very important in justifying Finland’s post-Cold War position in the international politics, especially its position in the European politics. The article is divided in two parts. The first one examines the narrative of the westernness of Finland, Finns or Finnish ‘identity’ as it appears in some scientific writings, press materials and political texts. Within this narrative an important element is the re-evaluation of Finland’s international position during the Cold War. Therefore, the Finnish security ‘solution’ – by some called ‘Nordic and neutral identity’ – is either criticized, attacked and characterized as an aberration and betrayal of the ‘Finnish western identity’, or accepted as the only possible ‘instrument for pursuing national security interests’ in those times. The second part of the article advances some explanations for this narrative and addresses questions such as: why was it developed, by whom, and how successful was it? The article shows how highly political is the (re)presentation of Finnish history and how much its ‘western character’ is related to Finland’s current political situation and goals in Europe. It also reveals how important the ideology is in backing a political choice.
APA, Harvard, Vancouver, ISO, and other styles
9

Holsti, Kal J. "Politics in command: foreign trade as national security policy." International Organization 40, no. 3 (1986): 643–71. http://dx.doi.org/10.1017/s0020818300027302.

Full text
Abstract:
Many of the current theoretical debates in international relations focus on the connection between economics and security policies. Most traditional North American textbooks have considered the two policy areas as separate domains. Some scholars view the major economic trends and events of the 1970s as intertwined, whereas others argue that “state” interests properly should prevail when the two sets of values conflict. The traditional liberal, mercantilist, and neo-Marxist literatures shed some light on the nexus between politics and economics in foreign policy, but they offer very general statements that reflect only the conditions of the major powers. Two case studies of Japan and Finland in the postwar period suggest that generalizations must be applied cautiously, that some states are compelled to follow mercantilist policies to protect their political independence and autonomy, and that policies of welfare maximization often have to be subordinated to security concerns. The cases also reveal that the connection between economic and security concerns changes over time. A dynamic model of foreign policy will thus have to be sensitive both to the peculiar circumstances of a variety of states and to the sources of foreign-policy change.
APA, Harvard, Vancouver, ISO, and other styles
10

Tuukkanen, Topi. "Adapting the Current National Defence Doctrine to Cyber Domain." International Journal of Cyber Warfare and Terrorism 1, no. 4 (October 2011): 32–52. http://dx.doi.org/10.4018/ijcwt.2011100103.

Full text
Abstract:
The current defence doctrine in Finland is analysed from a cyber perspective, and doctrinal tenets that adapt to the cyber domain as well as fundaments that do not, are pointed out. In most cases, current defence doctrine and fundaments can be adjusted to cyber domain. Some need more research and planning, but also new legislation and organisational arrangements would be needed. As such, a cyber defence doctrine has a sound basis but should be elaborated in more detail once national cyber security strategy has been completed.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "National security – Finland"

1

Linna, Lundström Molly. "Stora stygga vargen? : Porträtteringen av Ryssland och dess inverkan på svensk försvars- och säkerhetspolitik, 2008–2018." Thesis, Umeå universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-154149.

Full text
Abstract:
Drawing on a theoretical framework based on securitization and threat construction, the attempt in this study was to broaden the understanding of how the perception of a Russian threat in the Baltic Sea is influencing Swedish defence and security policy. The method used was based on Bacchis WPR-approach. Three questions were asked at the beginning of this study, regardning how Russia is viewed in Sweden, how the representation of Russia has changed from the war in Georgia in 2008 until 2018, as well as how Sweden is to strengthen it's defence capacity, nationally and through cooperation, to tacle the Russian threat. Four key aspects of Russian behaviour that is considered threatening were identified. Russia is viewed as a country with power ambitions and expansionist tendencies; characterised as tactically unpredictable; looked upon as a risk calculating actor; and considered misstrusting in its views of the West. The perception of Russia is complex which creates difficulties regarding how the threat is to be met. Policy makers have urged the strengthening of Swedish national defence capacity to create a conflict threshold in the region. To further strengthen this threshold, the bilateral defence cooperation with Finland has deepened. In addition, the question of military non-alignment has been raised in relation to a possible Swedish membership in Nato. The answer to whether or not Sweden should join depends on political affiliation. This underlines the theoretical assumptions; security and defence policy is not merely a response to an external circumstance, but rather the result of an interplay between circumstance and actor.
APA, Harvard, Vancouver, ISO, and other styles
2

POLVI-LOHIKOSKI, Johanna. "Changing security policy in Finland and Sweden." Doctoral thesis, 2003. http://hdl.handle.net/1814/5352.

Full text
Abstract:
Defence date: 22 September 2003
Examining board: Dr. Pauli Järvenpää (Ministry of Defence, Finland) ; Prof. Rutger Lindahl (University of Göteborg, Sweden) ; Prof. Helen Wallace (EUI) ; Prof. Jan Zielonka (EUI - Supervisor)
PDF of thesis uploaded from the Library digitised archive of EUI PhD theses completed between 2013 and 2017
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "National security – Finland"

1

Ries, Tomas. Finland and NATO. Helsinki: National Defence College, Dept. of Strategic and Defence Studies, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lindberg, Steve. Hotbilder för Finland: Säkerhetspolitisk förändring och kontinuitet. Åbo: Åbo akademis förlag, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ries, Tomas, and Axel Hagelstam. Sweden and Finland: Security perceptions and defence policy. Helsinki: Maanpuolustuskorkeakoulu, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Valtioneuvosto, Finland. European security and Finnish defence: Report by the Council of State to Parliament on 17 March 1997. Helsinki: The Council, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cordier, Sherwood S. Scandinavia and Finland: Security policies and military capabilities in the 1990s. Mosbach: AFES-Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jürgen, Kuhlmann, Sozialwissenschaftliches Institut der Bundeswehr, and International Sociological Association. Research Committee 01: Armed Forces and Conflict Resolution., eds. Military interventions and democracy: Security policy and defence in Finland. München: Sozialwissenschaftliches Institut der Bundeswehr, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Suominen, Tapani. Det hotade landet och det skyddade: Sverige och Finland från 1500-talet till våra dagar : historiska och säkerhetspolitiska betraktelser. Stockholm: Atlantis, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kullberg, Anssi. Suomi, terrorismi, Supo: Koira joka ei haukkunut : miksi ja miten Suomi on välttynyt terroristisen toiminnan leviämiseltä? Helsinki: Werner Söderström Osakeyhtiö, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Petteri, Jouko, and Maanpuolustuskorkeakoulu (Finland), eds. Towards east or west?: Defence planning in Finland 1944-1966. Helsinki: National Defence University, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Roloff, Ralf. Auf dem Weg zur Neuordnung Europas: Die Regierungen Kohl/Genscher und die KSZE-Politik der Bundesrepublik Deutschland von 1986 bis 1992. Vierow bei Greifswald: SH-Verlag, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "National security – Finland"

1

Harle, Vilho, and Sami Moisio. "Language Games on Security in Finland: Towards Changing Concepts of the State and National Survival." In Hexagon Series on Human and Environmental Security and Peace, 235–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17776-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"FINLAND: Pragmatic adapter." In Europeanization of National Security Identity, 104–36. Routledge, 2006. http://dx.doi.org/10.4324/9780203087343-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lehto, Martti. "Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences." In Cyber Security and Threats, 248–67. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch015.

Full text
Abstract:
The revolution in information technology that began in the 1990s has been transforming Finland into an information society. Imaginative data processing and utilization, arising from the needs of citizens and the business community, are some of the most important elements in a thriving society. Information and know-how have become key ‘commodities' in society, and they can be utilized all the more efficiently through information technology. For all nations, the information technology revolution quietly changed the way business and government operate, as well as the daily life of citizens. Our daily life, fundamental rights, social interactions and economies depend on information and communication technology working seamlessly. An open and free cyberspace has promoted political and social inclusion worldwide; it has broken down barriers between countries, communities and citizens, allowing interaction and sharing of information and ideas across the globe. Individuals, public and private organizations alike depend on the cyber world. From the citizens using social media, to banks growing their business, to law enforcement supporting national security – every sector of the society is increasingly dependent upon technology and networked systems. While the public sector, the economy and the business community as well as citizens benefit from globally networked services, the digital IT society contains inherent vulnerabilities which may generate security risks to citizens, the business community or the vital functions of society. Without sufficient awareness of the risks in cyber world, however, behavioral decisions and unseen threats can negatively impact the security of the critical infrastructure and can cause physical damage in the real world. On an individual level, what is at stake is the vulnerability of each individual user in cyber world. As the world grows more connected through cyber world, a highly skilled cyber security workforce is required to secure, protect, and defend national critical information infrastructure. Across the private and public sector organizations are looking for well-trained professionals to assess, design, develop, and implement cyber security solutions and strategies. While the demand for cyber security professionals is high, the supply is low. Meeting the growing demand for cyber security professionals begins in the education system. The most efficient custom to increase cyber security is the improvement of the know-how. The cyber security strategies and development plans require the improvement of the know-how of the citizens and actors of the economic life and public administration. Pursuant to Finland's Cyber Security Strategy (2013) “the implementation of cyber security R&D and education at different levels does not only strengthen national expertise, it also bolsters Finland as an information society.” In this article are analyzed the cyber security research and education which is offered in Finland's universities and universities of applied sciences.
APA, Harvard, Vancouver, ISO, and other styles
4

Kosonen, Jarkko, and Juha Mälkki. "The Finnish Model of Conscription." In Successful Public Policy in the Nordic Countries, 456–72. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780192856296.003.0022.

Full text
Abstract:
Abstract The Finnish conscription model dates to the end of the nineteenth century when Finland was still an autonomous Grand Duchy of the Russian Empire. Conscription has maintained its legitimate role as the basis of the armed defence ever since. The chapter explores Finland’s conscription programme as a policy success over time and covers which factors have fortified the endurance of the programme for over a hundred years. It also discusses the counternarratives that have been used to challenge the policy success of the programme of conscription. All Finnish citizens are subject to a national defence obligation by constitutional law. Conscription is mandatory for men, and their service completion rate varies due to political, social and health reasons. The law for volunteer military service for women came into effect in 1995. Conscription in Finland forms the basis for a political programme of national defence. The armed defence of the state is part of Finland´s national defence policy and comprehensive security. The endurance and legitimacy of conscription has traditionally held strong support among politicians and public opinion. The conscription model has been challenged in the political sphere with either the opportunity to transition to a professional standing army or to a mandatory, gender-neutral national service model for the entire age group. A professional standing army would be a costly alternative compared to an economically efficient conscription model. It is more likely that in the future a gender-neutral national service model will become relevant in political discourse.
APA, Harvard, Vancouver, ISO, and other styles
5

Kupari, Helena, and Tatiana Tiaynen-Qadir. "Women as Agents of Glocalization in the Orthodox Church of Finland." In Women and Religiosity in Orthodox Christianity, 206–40. Fordham University Press, 2021. http://dx.doi.org/10.5422/fordham/9780823298600.003.0009.

Full text
Abstract:
The Orthodox Church of Finland is a small autonomous national church with a significant foreign-born membership. In this chapter, we approach Finnish Orthodoxy through a glocalization framework. Making use of qualitative data gathered from women of diverse backgrounds—different generations and nationalities, “cradle” Orthodox as well as converts and returnees—we demonstrate how women are active participants in the glocal making of Finnish Orthodoxy. In the analysis, we focus on women’s agency as manifested in 1) experiences of the Divine Liturgy, 2) family-making as mothers and grandmothers, and 3) participation in parish life. Theoretically, our interpretation of the women’s practices draws from and advances discussions concerning gendered religious agency. We argue that women’s religious agency also encompasses their sensual engagements with artistic and creative applications of religion. Overall, we conceive of our interlocutors’ agency as their capacity to create and sustain home-like spaces where they can express themselves, be united with their (extended) families, experience existential security and belonging, and, generally speaking, feel “at home.”
APA, Harvard, Vancouver, ISO, and other styles
6

"Refugees and Humanitarian Settings." In Blockchain Technology for Global Social Change, 157–79. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-9578-6.ch007.

Full text
Abstract:
Mass migration has become one of the 21st century's greatest challenges. With an estimated 214 million people on the move internationally and forced displacement at a record high, population mobility is one of the leading policy issues of the 21st century. Women and children with no identity can be missed by national social programs in addition to the risks posed by being on the move. Developments in Blockchain can enable the tracking and delivery of in-kind aid and facilitate cash assistance programs in humanitarian settings and coordinate, collect, and analyse data in crisis to enable a timely and appropriate response. This chapter presents the ways in which Blockchain is being deployed in humanitarian and refugee settings and a series of case studies from Finland, Moldova, Kenya, and Iraq. While promising progress has been made, there remains a need for more research and evaluation as these technologies are implemented, increased user participation in design, and to ensure that privacy and security issues are addressed.
APA, Harvard, Vancouver, ISO, and other styles
7

Thomason, Jane, Sonja Bernhardt, Tia Kansara, and Nichola Cooper. "Refugees and Humanitarian Settings." In Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government, 1098–113. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5351-0.ch060.

Full text
Abstract:
Mass migration has become one of the 21st century's greatest challenges. With an estimated 214 million people on the move internationally and forced displacement at a record high, population mobility is one of the leading policy issues of the 21st century. Women and children with no identity can be missed by national social programs in addition to the risks posed by being on the move. Developments in Blockchain can enable the tracking and delivery of in-kind aid and facilitate cash assistance programs in humanitarian settings and coordinate, collect, and analyse data in crisis to enable a timely and appropriate response. This chapter presents the ways in which Blockchain is being deployed in humanitarian and refugee settings and a series of case studies from Finland, Moldova, Kenya, and Iraq. While promising progress has been made, there remains a need for more research and evaluation as these technologies are implemented, increased user participation in design, and to ensure that privacy and security issues are addressed.
APA, Harvard, Vancouver, ISO, and other styles
8

Huhtinen, Aki-Mauri, Tommi Kangasmaa, and Arto Hirvelä. "The Opportunities for a National Cyber Strategy and Social Media in the Rhizome Networks." In Developments in Information Security and Cybernetic Wars, 76–96. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch004.

Full text
Abstract:
Securing society is a central task of the state. In the present day as well as in the future, knowledge and information are ever more closely tied to electronic data transfer. Finland's published Cyber Security Strategy depicts how the government safeguards electronic data transfer, that is, information security against different threat and risk scenarios. Cyber Security Strategy was introduced 2013 and has provided guidance to all governmental actors how to implement security activities to be able to respond to increased security threats in networks. Visuality has increasing importance in strategic communications, not least because it is faster than the written word and globally distributed via social media. Relatedly, camera drones are becoming increasingly important tools in the security economy, especially when it comes to enhancing military capability through combat cameras. The main challenge facing society is that the cyber domain in general, and social media in particular, is moving out of the control of the nation-state.
APA, Harvard, Vancouver, ISO, and other styles
9

Forsberg, Tuomas, and Matti Pesu. "THE ROLE OF PUBLIC OPINION IN FINLAND’S FOREIGN AND SECURITY POLICY." In National Security, Public Opinion and Regime Asymmetry, 147–73. WORLD SCIENTIFIC, 2017. http://dx.doi.org/10.1142/9789813206953_0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Huhtinen, Aki-Mauri, Arto Hirvelä, and Tommi Kangasmaa. "The Opportunities of National Cyber Strategy and Social Media in the Rhizome Networks." In Cyber Law, Privacy, and Security, 923–36. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch043.

Full text
Abstract:
Securing the society is a central task of the state. In the present day, as well as in the future, knowledge and information are evermore closely tied to electronic data transfer. Finland's newly published Cyber Security Strategy depicts how the government safeguards electronic data transfer, that is, information security against different threat and risk scenarios. Cyberspace has a human element and a technological element. It is a way to influence and affect society. It may be used to influence minds or to attack the physical world, for example by disrupting traffic control. But cyberspace cannot exist without people. The cyberspace offers the platform so called strategic communication. Strategic communication is a concept that unites the efforts of governmental organisations to influence people in support of national interests. Formal organisations and institutions are often seen as being opposed or resistant to change. Social Media and the cyber domain can offer many opportunities but also unknown threats and risks. In this paper we argue that securing an organisation is a living and continuously changing process. Deleuze and Guattari (1983) present the concept of a rhizome, meaning a dynamic weed formation which, opposed to the arboreal and hierarchical structure of the tree, involves spontaneous, unpredictable and distant connections between heterogeneous elements (Linstead & Thanem 2007, 1484) Strategic Communication is the focus of a heated discussion in the military field: How can militaries be credible and uphold the high standards of democracy within the asymmetric and complex battlefield? To be credible one must act according to what is said. The challenge is that the scene is global in the information age. The act, the actor, the scene, the purpose – all are exposed to a global audience through cyberspace on a very short notice. The most effective way of showing the scene and actors is an audiovisual product. Examples of this come from all conflict zones. Militaries are establishing Youtube channels and supplying material from intense fighting and frontline action. The solution for supporting the organisation's own arguments has been the Combat Camera capability, in other words media-trained soldiers who are where the main effort is happening. Within the spirit of strategic communication, the cyber strategy itself is one way to operationalise cyber security by announcing measures to be taken against cyber attacks. In this article the authors reflect on the Finnish Cyber Strategy and Strategic Communications from a phenomenological perspective.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "National security – Finland"

1

Mäkelä, Antti, Tapio Tourula, Heikki Tuomenvirta, Pauli Jokinen, Terhi Laurila, Ari-Juhani Punkka, Minna Huuskonen, Tuomo Brgman, and Hannu Valta. Climate change impacts to the security of supply. Finnish Meteorological Institute, 2023. http://dx.doi.org/10.35614/isbn.9789523361645.

Full text
Abstract:
Serious disruptions and exceptional circumstances for society, that the society tries to prepare for and act in them are at the center of security of supply. Current examples are the COVID pandemic and the ongoing energy crisis for which Finland's security of supply has also been strongly highlighted. Disturbances can also be caused by weather phenomena: in Finland, such examples are windstorms, severe thunderstorms, floods, and droughts, which can, at least in principle, paralyze the society. It is possible to prepare for the impacts of weather phenomena, but the ongoing rapid climate change makes it more complicated. Some of the weather phenomena that cause impacts are fast and violent (e.g. intense thunderstorms) and some occur more slowly (e.g. long heat waves), and climate change affects the phenomena in different ways. In this work, the estimated impacts of climate change on Finland's security of supply were investigated. The starting point was to gain an understanding of which weather phenomena and weather situations are central to security of supply and which sectors of security of supply are the most vulnerable. The work constituted of workshops and expert interviews organized with the National Emergency Supply Agency. In addition to the interviews, the work covered past significant weather situations in Finland that are known to have had significant societal impacts. Information was also extracted from recent literature, especially regarding the vulnerabilities and adaptability of different sectors in Finland. Estimates of the climate change impacts on the identified phenomena were combined with the collected information, resulting in a first understanding of how climate change affects Finland's security of supply. Based on the results, it can be concluded that the impacts of climate change on security of supply are quite complex, especially due to the wide spectrum of weather phenomena and their different impact mechanisms. In addition, the matter becomes more complicated by the fact that there is no clear distinction of what weather phenomenon actually is critical to security of supply and what is not. For example, could the increasing adverse impacts on health care due to the increasingly common heat conditions reach a serious societal disturbance situation at some point, if it is not sufficiently prepared in advance? Another key result is that in terms of security of supply, the direct effects of climate change are very small in Finland compared to many other countries. Although the climate in Finland has already changed considerably and will continue to change in the future, the biggest impacts to security of supply seem to be reflected from elsewhere: the experts of the National Emergency Supply Agency consider the worst situation to be a lack of food, water and habitable living environment in the world, which would also be reflected to Finland. Among the sectors, food/water and energy supply and logistics are perceived as the most vulnerable. The work mainly focused on the direct effects of climate change, i.e. the effects of climate change on the occurrence of various weather phenomena. However, the work also considers to some extent indirect effects, i.e. those reflected from other parts of the world, and transitional effects that result from climate change mitigation measures, especially from the rapid energy transition.
APA, Harvard, Vancouver, ISO, and other styles
2

Rezaie, Shogofa, Fedra Vanhuyse, Karin André, and Maryna Henrysson. Governing the circular economy: how urban policymakers can accelerate the agenda. Stockholm Environment Institute, September 2022. http://dx.doi.org/10.51414/sei2022.027.

Full text
Abstract:
We believe the climate crisis will be resolved in cities. Today, while cities occupy only 2% of the Earth's surface, 57% of the world's population lives in cities, and by 2050, it will jump to 68% (UN, 2018). Currently, cities consume over 75% of natural resources, accumulate 50% of the global waste and emit up to 80% of greenhouse gases (Ellen MacArthur Foundation, 2017). Cities generate 70% of the global gross domestic product and are significant drivers of economic growth (UN-Habitat III, 2016). At the same time, cities sit on the frontline of natural disasters such as floods, storms and droughts (De Sherbinin et al., 2007; Major et al., 2011; Rockström et al., 2021). One of the sustainability pathways to reduce the environmental consequences of the current extract-make-dispose model (or the "linear economy") is a circular economy (CE) model. A CE is defined as "an economic system that is based on business models which replace the 'end-of-life' concept with reducing, alternatively reusing, recycling and recovering materials in production/distribution and consumption processes" (Kirchherr et al., 2017, p. 224). By redesigning production processes and thereby extending the lifespan of goods and materials, researchers suggest that CE approaches reduce waste and increase employment and resource security while sustaining business competitiveness (Korhonen et al., 2018; Niskanen et al., 2020; Stahel, 2012; Winans et al., 2017). Organizations such as the Ellen MacArthur Foundation and Circle Economy help steer businesses toward CE strategies. The CE is also a political priority in countries and municipalities globally. For instance, the CE Action Plan, launched by the European Commission in 2015 and reconfirmed in 2020, is a central pillar of the European Green Deal (European Commission, 2015, 2020). Additionally, more governments are implementing national CE strategies in China (Ellen MacArthur Foundation, 2018), Colombia (Government of the Republic of Colombia, 2019), Finland (Sitra, 2016), Sweden (Government Offices of Sweden, 2020) and the US (Metabolic, 2018, 2019), to name a few. Meanwhile, more cities worldwide are adopting CE models to achieve more resource-efficient urban management systems, thereby advancing their environmental ambitions (Petit-Boix & Leipold, 2018; Turcu & Gillie, 2020; Vanhuyse, Haddaway, et al., 2021). Cities with CE ambitions include, Amsterdam, Barcelona, Paris, Toronto, Peterborough (England) and Umeå (Sweden) (OECD, 2020a). In Europe, over 60 cities signed the European Circular Cities Declaration (2020) to harmonize the transition towards a CE in the region. In this policy brief, we provide insights into common challenges local governments face in implementing their CE plans and suggest recommendations for overcoming these. It aims to answer the question: How can the CE agenda be governed in cities? It is based on the results of the Urban Circularity Assessment Framework (UCAF) project, building on findings from 25 interviews, focus group discussions and workshops held with different stakeholder groups in Umeå, as well as research on Stockholm's urban circularity potential, including findings from 11 expert interviews (Rezaie, 2021). Our findings were complemented by the Circular Economy Lab project (Rezaie et al., 2022) and experiences from working with municipal governments in Sweden, Belgium, France and the UK, on CE and environmental and social sustainability.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography