Abstract
The objective of this chapter is to explore the opportunities and threats this hyper-connectivity presents to national security, specifically from an economic security point of view. How can national critical societal functions and infrastructures be secured against transnational and extra-sovereign dependencies that extend beyond the mandate of sovereign states? Moreover, how can a nation secure its external “lifelines” without violating the sovereignty of states these reside in or pass through? In the theoretical level these questions relate to the sovereign state’s autonomy of action in economics and national security in a system that increasingly functions on transnational and extraterritorial logic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aaltola M, Käpylä J, Mikkola M, Behr T (2014) Towards the geopolitics of flows: implications for finland. Available via FIIA. http://www.fiia.fi/en/publication/424/towards_the_geopolitics_of_flows/. Accessed 7 June 2015
Accenture (2015) Winning the industrial internet of things. Available via Accenture. http://newsroom.accenture.com/news/industrial-internet-of-things-will-boost-economic-growth-but-greater-government-and-business-action-needed-to-fulfill-its-potential-finds-accenture.htm. Accessed 26 May 2015
Australian Government (2010) Critical infrastructure resilience Strategy. Available via TISN. http://www.tisn.gov.au/documents/australian+government+s+critical+infrastructure+resilience+strategy.pdf. Accessed 28 May 2015
BBC News (2010) Wikileaks: site list reveals US sensitivities. Available via BBC. http://www.bbc.com/news/11932041. Accessed 30 May 2015
BlackRock (2014) Viewpoint. Available via BlackRock. https://www.blackrock.com/corporate/en-au/literature/whitepaper/viewpoint-us-equity-market-structure-april-2014.pdf. Accessed 27 May 2015
BlackRock (2015). http://www.blackrock.com/corporate/en-us/about-us. Accessed 27 May 2015
Buzan B (2007) What is national security in the age of globalization? Department of Foreign Affairs, Oslo. Available via Refleks. http://www.regjeringen.no/nb/dep/ud/kampanjer/refleks/innspill/sikkerhet/buzan.html?id¼493187. Accessed 3 July 2013
Chatham House (2013) Cyber Security and Global Interdependence: What is Critical?:6. Available via Chatham House. http://www.chathamhouse.org/sites/files/chathamhouse/public/Research/International%20Security/0213pr_cyber.pdf. Accessed 29 May 2015, p 8
Chatham House (2014) Cyber Security and Global Interdependence: What is Critical? https://www.chathamhouse.org/sites/files/chathamhouse/public/Research/International%20Security/0213pr_cyber.pdf. Accessed 2 June 2015
CNN (1997) Experts prepare for ‘an electronic Pearl Harbor’. Available via CNN. http://edition.cnn.com/US/9711/07/terrorism.infrastructure/. Accessed 26 May 2015
DHL (2014) Global Connectedness Index 2014. Available via DHL. http://www.dhl.com/content/dam/Campaigns/gci2014/downloads/dhl_gci_2014_study_high.pdf. Accessed 2 May 2015, p 8
Dillon M (2005) Global security in the 21st century: circulation, complexity and contingency. In: The globalisation of security, ISP/NSC Briefing Paper 2005/02, p 2
European Union (2008) Council directive 2008//114/EC. Available via Eur-Lex. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2008:345:0075:0082:EN:PDF. Accessed 30 May 2015
European Network and Information Security Agency (2012) European Cyber Security strategies. Available via ENISA. https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/cyber-security-strategies-paper. Accessed 15 May 2015
European Commission (2013) Cybersecurity strategy of the European Union—an open, safe and secure cyberspace. Available via EC. http://eeas.europa.eu/policies/eu-cyber-security/cybsec_comm_en.pdf. Accessed 26 May 2015
European Commission (2015) Critical Infrastructure. Available via EC. http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/crisis-and-terrorism/critical-infrastructure/index_en.htm. Accessed 30 May 2015
European Union (2015) EU-US-Canada Expert Meeting on Critical Infrastructure Protection. Available via EU Newsroom. http://europa.eu/newsroom/calendar/events/2015/05/06_critical_infrastructure_protection_en.htm. Accessed 30 May 2015
Forbes (2013) Why we could easily have another flash crash. Available via Forbes. http://www.forbes.com/sites/deborahljacobs/2013/08/09/why-we-could-easily-have-another-flash-crash/. Accessed 27 May 2015
Government of Canada—Public Safety Canada (2015) Securing an open society: Canada’s National Security Policy. Available via Public Safety Canada. http://www.publicsafety.gc.ca/cnt/ntnl-scrt/scrng-eng.aspx. Accessed 01 May 2015
Government of Canada (2015) Canada’s economic action plan. Available via http://actionplan.gc.ca/en/page/bbg-tpf/critical-infrastructure-and-cyber-security. Accessed 29 May 2015
Government of the Netherlands (2013) A secure Netherlands in a Secure world: international security strategy. Available via Government of the Netherlands. http://www.government.nl/documents-and-publications/notes/2013/06/21/international-security-strategy.html. Accessed 24 May 2014
Helbing D (2013) Globally networked risks and how to respond. Nature 497:51–59
Heng Y-K (2013) A global city in an age of global risks: Singapore’s evolving discourse on vulnerability. Contemporary Southeast Asia 35(3):423–446
HM Government (2010) A strong Britain in the age of uncertainty: the national security strategy. Available via HMG. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/61936/national-security-strategy.pdf. Accessed 28 March 2014
Investopedia (2014) High-frequency trading—HTF. http://www.investopedia.com/terms/h/high-frequency-trading.asp. Accessed 26 May 2015
Kahler M (2004) Economic security in the age of globalization: Definition and provision. The Pacific Review 17(4):485–502
Keohane RO, Nye JS (1977) Power and interdependence: world politics in transition. Little, Brown, Boston
Krause K (2007) National security in the age of globalization: a brainstorming note, Department of Foreign Affairs, Oslo. Available via Refleks. http://www.regjeringen.no/nb/dep/ud/kampanjer/refleks/innspill/sikkerhet/krause.html?id=493206. Accessed 3 July 2013
McKinsey Global Institute (MGI) (2013) Disruptive technologies: advances that will transform life, business and the global economy. Available via MGI. http://www.mckinsey.com/~/media/mckinsey/dotcom/insights%20and%20pubs/mgi/research/technology%20and%20innovation/disruptive%20technologies/mgi_disruptive_technologies_full_report_may2013.ashx. Accessed 26 May 2015. p 52
Milner H (2009) Power, interdependence, and Nonstate Actors in world politics: researchfrontiers. In: Milner H, Moravcsik A (2009) Power, interdependence, and nonstate actors in world politics. Princeton University Press, p 15
Moisio S, Paasi A (2013) Beyond state-centricity: geopolitics of changing state spaces. Geopolitics 18(2):255–266
Morhenthau HJ (1960) Politics among nations: the struggle for power and peace. Alfred A. Knopf, New York
Nanto D (2011) Economics and national security: issues and implications for U.S. policy. Congressional Research Service (CRS). Available via FAS. http://fas.org/sgp/crs/natsec/R41589.pdf. Accessed 27 May 2015
NATO Cooperative Cyber Defence Centre of Excellence (2015) Cyber definitions. Available via CCDCOE. https://ccdcoe.org/cyber-definitions.html. Accessed 5 June 2015
Neowin (2013) Microsoft: internet users will double to 4 billion worldwide by 2020. Available via Neowin. http://www.neowin.net/news/microsoft-internet-users-will-double-to-4-billion-worldwide-by-2020. Accessed 30 May 2015
Neu C.R, Wolf J. (1994) The economic dimensions of national security. RAND, Santa Monica. Available via RAND. http://www.rand.org/content/dam/rand/pubs/monograph_reports/2006/MR466.pdf. Accessed 1 June 2015, p xi–xii
Nye J (2010) Cyber power. Available via Belfer Centre for Science and International Affairs, http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf, Accessed 6 June 2015, p 15
OECD (2008) Protection of ‘Critical Infrastructure’ and the role of investment policies relating to national security. Available via OECD. http://www.oecd.org/daf/inv/investment-policy/40700392.pdf. Accessed 8 May 2013, p 3
Ripsman NM, Paul TV (2010) Globalization and the national security state. Oxford University Press, Oxford, p 10
Telecom Circle (2014) What is the internet of things? Available via Telecom Circle. http://www.telecomcircle.com/2014/05/what-is-internet-of-things/. Accessed 26 May 2015
The Economist Intelligence Unit (2014) The hypeconnected economy: how the growing interconnectedness of society is changing the landscape for business. Available via EUI: http://www.economistinsights.com/technology-innovation/analysis/hyperconnected-economy. Accessed 15 May 2015
The New York Times (2012) Panetta warns of dire threat of cyber attacks on U.S. Available via NY Times. Accessed 26 May 2015
UK Cabinet Office (2010) Strategic framework and policy statement on improving the resilience of critical infrastructure to disruption from natural hazards. Available via Cabinet Office. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/62504/strategic-framework.pdf. Accessed 25 May 2015
Value Walk (2014) Goldman Projects “Internet of Things” to become biggest mega trend yet. http://www.valuewalk.com/2014/06/internet-of-things-to-become-biggest-mega-trend-yet/. Accessed 26 May 2015
We are Social (2015) Digital, social & mobile worldwide in 2015. Available via We are Social. http://wearesocial.net/blog/2015/01/digital-social-mobile-worldwide-2015/. Accessed 15 May 2015
Whitehouse (2012) National strategy for the global supply chain security. Available via Whitehouse. https://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf. Accessed 2 June 2015
Whitehouse, President Obama (2013) Cybersecurity. Available via Whitehouse. https://www.whitehouse.gov/issues/foreign-policy/cybersecurity. Accessed 2 June 2015
World Economic Forum (2012) Risk and responsibility in a hyperconnected world. Available via World Economic Forum. http://www.weforum.org/reports/risk-and-responsibility-hyperconnected-world-pathways-global-cyber-resilience. Accessed 15 May 2015
World Economic Forum and Accenture (2013) Building resilience in supply chains. Available via WEF. http://www3.weforum.org/docs/WEF_RRN_MO_BuildingResilienceSupplyChains_Report_2013.pdf, p 7
Zurich, Atlantic Council (2014) Beyond data breaches: global interconnections of cyber risk. Available via Zurich. https://www.zurich.com/_/media/dbe/corporate/docs/whitepapers/risk-nexus-beyond-data-breaches-global-interconnections-of-cyber-risk%202014.pdf, p 14
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Fjäder, C.O. (2016). National Security in a Hyper-connected World. In: Masys, A. (eds) Exploring the Security Landscape: Non-Traditional Security Challenges. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-27914-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-27914-5_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27913-8
Online ISBN: 978-3-319-27914-5
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)