Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "strategia cyfrowa" wg kryterium: Wszystkie pola


Wyświetlanie 1-3 z 3
Tytuł:
Digital Sovereignty Strategies for Every Nation
Autorzy:
Shoker, Ali
Powiązania:
https://bibliotekanauki.pl/articles/27294488.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
autonomy
digital sovereignty
digital strategy
Nash equilibrium
technology sovereign
autonomia
cyfrowa suwerenność
strategia cyfrowa
równowaga Nasha
technologiczna suwerenność
Opis:
Digital Sovereignty must be on the agenda of every modern nation. Digital technology is becoming part of our life details, from the vital essentials, like food and water management, to transcendence in the Metaverse and Space. Protecting these digital assets will, therefore, be inevitable for a modern country to live, excel and lead. Digital Sovereignty is a strategic necessity to protect these digital assets from the monopoly of friendly rational states, and the threats of unfriendly Malicious states and behaviors. In this work, we revisit the definition and scope of digital sovereignty through extending it to cover the entire value chain of using, owning, and producing digital assets. We emphasize the importance of protecting the operational resources, both raw materials and human expertise, in addition to research and innovation necessary to achieve sustainable sovereignty. We also show that digital sovereignty by autonomy is often impossible, and by mutual cooperation is not always sustainable. To this end, we propose implementing digital sovereignty using Nash Equilibrium, often studied in Game Theory, to govern the relation with Rational states. Finally, we propose a digital sovereignty agenda for different country’s digital profiles, based on their status quo, priorities, and capabilities. We survey state-of-the-art digital technology that is useful to make the current digital assets sovereign. Additionally, we propose a roadmap that aims to develop a sovereign digital nation, as close as possible to autonomy. Finally, we draw attention to the need of more research to better understand and implement digital sovereignty from different perspectives: technological, economic, and geopolitical.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-17
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyfrowa suwerenność państwa jako cel niemieckiej strategii cyberbezpieczeństwa z 2021 roku
Autorzy:
Brzostek, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/2158451.pdf
Data publikacji:
2022-12-06
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyfrowa suwerenność
strategia cyberbezpieczństwa
polityka cyberbezpieczeństwa Niemiec
Opis:
Nowa strategia cyberbezpieczeństwa Niemiec z 8 września 2021 roku stworzyła podstawy strategiczne działania rządu federalnego w dziedzinie bezpieczeństwa na najbliższe 5 lat. Strategia jest wbudowana w europejską strategię cyberbezpieczeństwa i pomaga kształtować cyfrową przyszłość Europy. Dlatego rząd federalny postrzega cyberbezpieczeństwo jako wspólne zadanie państwa, biznesu, nauki i społeczeństwa. Wymaga to zorganizowanego podejścia i opartej na zaufaniu współpracy, żeby móc znaleźć wspólne odpowiedzi na cyberzagrożenia i zbudować cyfrową suwerenność państwa.
Źródło:
Cybersecurity and Law; 2022, 8, 2; 251-264
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Cybersecurity Obligations of States Perceived as Platforms: Are Current European National Cybersecurity Strategies Enough?
Autorzy:
Papakonstantinou, Vagelis
Powiązania:
https://bibliotekanauki.pl/articles/27274330.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
data localisation
digital sovereignty
cybersecurity strategies
lokalizacja danych
cyfrowa suwerenność
strategia cyberbezpieczeństwa
Opis:
Cybersecurity is a relatively recent addition to the list of preoccupations for modern states. The forceful emergence of the internet and computer networks and their subsequent prevalence quickly brought this to the fore. By now, it is inconceivable that modern administrations, whether public or private, can exist entirely outside the digital realm. Nevertheless, with great opportunities also comes great risk. Attacks against computer systems quickly evolved from marginalised incidents to matters of state concern. The exponential increase in the importance of cybersecurity over the past few years has led to a multi-level response. New policies, followed by relevant laws and regulations, have been introduced at national and international levels. While modern states have therefore been compelled to devise concrete cybersecurity strategies in response to potential threats, the most notable aspect of these strategies is their resemblance to one another. Such uniform thinking could develop into a risk per se: challenges may appear unexpectedly, given the dynamic nature of the internet and the multitude of actors and sources of risk, which could put common knowledge, or what may be called conventional wisdom, to the test at a stage where the scope for response is limited. This paper builds upon the idea of national states being perceived as platforms within the contemporary digital and regulatory environment. Platforms are in this context information structures or systems, whereby the primary role of states acting as platforms is that of an information broker for its citizens or subjects. This role takes precedence even over the fundamental obligation of states to provide security; it calls upon them first to co-create (basic) personal data, and then to safely store and further transmit such data. Once the key concept of states as platforms has been elaborated in section 2, this paper then presents the concrete consequences of this approach within the cybersecurity field. In section 3, former off-line practices for safely storing personal information, undertaken by states within their role as platforms, are contrasted with the challenges posed by the digitisation of information. The focus is then turned in section 4 to the EU, and the NIS Directive’s obligation upon Member States to introduce and implement national cybersecurity strategies, which are therefore examined under the lens introduced in section 2. Finally, specific points for improvement and relevant recommendations for these cybersecurity strategies are presented in section 5.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-12
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-3 z 3

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies