Skip to main content

Social Exclusion as Human Insecurity: A Human Cybersecurity Framework Applied to the European High North

  • Chapter
  • First Online:
Digitalisation and Human Security

Part of the book series: New Security Challenges ((NSECH))

Abstract

Digitalisation is changing the way governments provide public services. This has significance for geographically peripheral and sparsely populated regions like the European High North, which is facing challenges associated with an ageing population and labour shortages. A successful transition from traditional to digital services requires adequate digital competence and infrastructure. Without this, rural villages and elderly people in particular are at risk of suffering disadvantage. To address this, we present a cybersecurity framework that combines human security and social exclusion theory. Drawing on key informant interviews conducted in Norway, Sweden and Finland, we show that while digitalisation provides benefits to remote areas, it can also result in digital exclusion. Significant attention must therefore be paid to whose voices and interests shape the current digitalisation agenda.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • AccessNow. (2016). U.N. passes landmark resolution condemning internet shutdowns. Retrieved from https://www.accessnow.org/un-passes-resolution-condemning-internet-shutdowns/.

  • Alkire, S. (2003). A conceptual framework for human security (CRISE Working Paper 2). Centre for Research on Inequality, Human Security and Ethnicity, University of Oxford. Retrieved from https://assets.publishing.service.gov.uk/media/57a08cf740f0b652dd001694/wp2.pdf.

  • ArcticStartup. (2009). Finland makes 1mbps internet connection a legal right—So what? Retrieved from https://arcticstartup.com/finland-makes-1mbps-internet-connection-a-legal-right-so-what/.

  • Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141–165.

    Google Scholar 

  • Atkinson, A. B. (1998). Social exclusion, poverty and unemployment. In A. B. Atkinson & J. Hills (Eds.), Exclusion, employment and opportunity (pp. 1–20). CASE Paper 4. Centre for Analysis of Social Exclusion, London School of Economics. Retrieved from http://sticerd.lse.ac.uk/dps/case/cp/Paper4.pdf.

  • Autti, O., & Hyry-Beihammer, E. K. (2014). School closures in rural Finnish communities. Journal of Research in Rural Education, 29(1), 1–17.

    Google Scholar 

  • Barnett, J. (2001). The meaning of environmental security: Ecological politics and policy in the new Security era. London: Zed Books.

    Google Scholar 

  • Booth, K. (2005). Introduction to part one. In K. Booth (Ed.), Critical security studies and world politics (pp. 21–25). London: Lynne Rienner.

    Google Scholar 

  • Booth, K. (2007). Theory of world security. Cambridge: Cambridge University Press.

    Google Scholar 

  • Bourdieu, P. (1986). The forms of capital. In J. Richardson (Ed.), Handbook of theory and research for the sociology of education (pp. 241–258). Westport, CT: Greenwood.

    Google Scholar 

  • Burchardt, T., Le Grand, J., & Piachaud, D. (2002). Introduction. In J. Hills, J. Le Grand, & D. Piachaud (Eds.), Understanding social exclusion (pp. 1–12). Oxford: Oxford University Press.

    Google Scholar 

  • Buzan, B. (1983). People, states and fear: An agenda for security analysis in the post-Cold War era. Brighton: Wheatsheaf.

    Google Scholar 

  • Buzan, B. (1991). People, states and fear: An agenda for security analysis in the post-Cold War era (2nd ed.). Boulder, CO: Lynne Rienner.

    Google Scholar 

  • Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.

    Google Scholar 

  • Byrne, D. (1999). Social exclusion. Buckingham: Open University Press.

    Google Scholar 

  • Carr, J. (2010). Inside cyber warfare. Sebastopol, CA: O’Reilly Media.

    Google Scholar 

  • Clough, J. (2015). Principles of cybercrime (2nd ed.). Cambridge: Cambridge University Press.

    Google Scholar 

  • Commission on Human Security (CHS). (2003). Human security now (Report). Retrieved from https://reliefweb.int/sites/reliefweb.int/files/resources/91BAEEDBA50C6907C1256D19006A9353-chs-security-may03.pdf.

  • Dahlberg, Ã…. (2012). Användning av IT-baserade tjänster i de nordiska länderna [Use of IT based services in the Nordic countries]. In E. P. Göransson (Ed.), Fokus pÃ¥ eldre i informasjonssamfunnet [Focus on the elderly in information society] (pp. 12–24). Nordens Välfärdscenter. Retrieved from http://www.diva-portal.org/smash/get/diva2:706911/FULLTEXT01.pdf.

  • Demchak, C. C. (2011). Wars of disruption and resilience: Cybered conflict, power and national security. London: The University of Georgia Press.

    Google Scholar 

  • Dunn Cavelty, M. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701–715.

    Google Scholar 

  • Eskelinen, H., Frank, T., & Hirvonen, T. (2008). Does strategy matter? A comparison of broadband rollout policies in Finland and Sweden. Telecommunications Policy, 32(6), 412–421.

    Google Scholar 

  • Esping-Andersen, G. (1999). Social foundations of postindustrial economies. London: Oxford University Press.

    Google Scholar 

  • European Commission. (2018). The Digital Economy and Society Index (DESI). Retrieved from https://ec.europa.eu/digital-single-market/en/desi.

  • Fjørtoft, T. O. (2017). Digitale ferdigheter i ulike aldersgrupper: Unge og høyt utdannede er flinkest foran PC-en [Digital skills in different age groups: The young and highly educated are best in front of the PC] (Report). Statistics Norway. Retrieved from http://www.ssb.no/teknologi-og-innovasjon/artikler-og-publikasjoner/unge-og-hoyt-utdannede-er-flinkest-foran-pc-en.

  • Fløtten, T., Dahl, E., & Grønningsæter, A. (2001). Den norske fattigdommen: Hvordan arter den seg, hvor lenge varer den og hva kan vi gjøre med den? [Norwegian poverty: How does it behave, how long does it last and what can we do about it?] (Fafo Working Paper 2001:16). Forskningsstiftelsen Fafo. Retrieved from https://www.fafo.no/media/com_netsukii/672.pdf.

  • Halleröd, B., & Heikkilä, M. (1999). Poverty and social exclusion in the Nordic countries. In M. Kautto, M. Heikkilä, B. Hvinden, S. Marklund, & N. Ploug (Eds.), Nordic social policy: Changing welfare states (pp. 185–214). London: Routledge.

    Google Scholar 

  • Hargittai, E., & Dobransky, K. (2017). Old dogs, new clicks: Digital inequality in internet skills and uses among older adults. Canadian Journal of Communication, 42(2), 195–212.

    Google Scholar 

  • Helsper, E. J. (2017). The social relativity of digital exclusion: Applying relative deprivation theory to digital inequalities. Communication Theory, 27, 223–242.

    Google Scholar 

  • Henwood, F., Wyatt, S., Miller, N., & Senker, P. (2000). Critical perspectives on technologies, in/equalities and the information society. In F. Henwood, N. Miller, P. Senker, & S. Wyatt (Eds.), Technology and in/equality (pp. 1–18). London: Routledge.

    Google Scholar 

  • Hodge, H., Carson, D., Carson, D., Newman, L., & Garrett, J. (2017). Using internet technologies in rural communities to access services: The views of older people and service providers. Journal of Rural Studies, 54, 469–478.

    Google Scholar 

  • Holland, J., & Jarvis, L. (2015). Security: A critical introduction. London: Palgrave.

    Google Scholar 

  • Hope, S., Martin, C., & Zubairi, S. S. (2016). The role of digital exclusion in social exclusion (Ipsos MORI Scotland & Carnegie UK Trust report). Retrieved from: https://d1ssu070pg2v9i.cloudfront.net/pex/carnegie_uk_trust/2016/09/LOW-2697-CUKT-Digital-Participation-Report-REVISE.pdf.

  • Kaldor, M., Martin, M., & Selchow, S. (2007). Human security: A new strategic narrative for Europe. International Affairs, 83(2), 273–288.

    Google Scholar 

  • Kenyon, S., Lyons, G., & Rafferty, J. (2002). Transport and social exclusion: Investigating the possibility of promoting inclusion through virtual mobility. Journal of Transport Geography, 10(3), 207–219.

    Google Scholar 

  • Kilpeläinen, A., & Seppänen, M. (2014). Information technology and everyday life in ageing rural villages. Journal of Rural Studies, 33, 1–8.

    Google Scholar 

  • Koivunen, E. (2014). Telecare and older people’s social relations (AKTIVE Working Paper 3). Leeds: Centre for International Research on Care, Labour and Equalities. Retrieved from http://www.aktive.org.uk/downloads/AKTIVE_Paper-3.pdf.

  • Lanas, M., Rautio, P., & Syrjala, L. (2013). Beyond educating the marginals: Recognizing life in northern rural Finland. Scandinavian Journal of Educational Research, 57(4), 385–399.

    Google Scholar 

  • Lasch, C. (2004). The degradation of the practical arts. In F. Webster (Ed.), The information society reader (pp. 287–291). London: Routledge.

    Google Scholar 

  • Levitas, R., Pantazis, C., Fahmy, E., Gordon, D., Lloyd, E., & Patsios, D. (2007). The multi-dimensional analysis of social exclusion (Report). Department of Sociology and School for Social Policy, Townsend Centre for the International Study of Poverty and Bristol Institute for Public Affairs. Retrieved from https://dera.ioe.ac.uk/6853/1/multidimensional.pdf.

  • Limnéll, J., Majewski, K., & Salminen, M. (2015). Cyber security for decision makers. Jyväskylä: Docendo.

    Google Scholar 

  • Lüders, M., & Brandtzæg, P. B. (2016). NÃ¥r alt sosialt blir flyktig: En kvalitativ studie av hvordan eldre opplever sosiale medier [When everything social becomes fleeting: A qualitative study of how older people experience social media]. Norsk Medietidsskrift, 23(2), 1–18.

    Google Scholar 

  • Lüders, M., & Brandtzæg, P. B. (2017). ‘My children tell me it’s so simple’: A mixed-methods approach to understand older non-users’ perceptions of social networking sites. New Media & Society, 19(2), 181–198.

    Google Scholar 

  • McAfee and Center for Strategic and International Studies (CSIS). (2013). The economic impact of cybercrime (Report). Retrieved from www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf.

  • McAfee and Center for Strategic and International Studies (CSIS). (2014). Net losses: Estimating the global cost of cybercrime (Report). Retrieved from https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/attachments/140609_rp_economic_impact_cybercrime_report.pdf.

  • McDonald, M. (2013). Discourses of climate security. Political Geography, 33, 42–51.

    Google Scholar 

  • McSweeney, B. (1999). Security, identity and interests: A sociology of international relations. Cambridge: Cambridge University Press.

    Google Scholar 

  • Mearsheimer, J. (2001). The tragedy of great power politics. New York, NY: W. W. Norton.

    Google Scholar 

  • Miliband, D. (2006). Social exclusion: The next steps forward. London: ODPM.

    Google Scholar 

  • Morgenthau, H. (1973). Politics among nations: The struggle for power and peace (5th ed.). New York, NY: Knopf.

    Google Scholar 

  • Noll, H. H. (2002). Towards a European system of social indicators: Theoretical framework and system architecture. Social Indicators Research, 58, 47–87.

    Google Scholar 

  • Norwegian Ministry of Local Government and Modernisation. (2016). Digital agenda for Norway in brief: ICT for a simpler everyday life and increased productivity (White Paper 27 [2015–2016]). Retrieved from https://www.regjeringen.no/contentassets/07b212c03fee4d0a94234b101c5b8ef0/en-gb/pdfs/digital_agenda_for_norway_in_brief.pdf.

  • Ogg, J. (2005). Social exclusion and insecurity among older Europeans: The influence of welfare regimes. Ageing & Society, 25, 69–90.

    Google Scholar 

  • Peoples, C., & Vaughan-Williams, N. (2010). Critical security studies: An introduction. London: Routledge.

    Google Scholar 

  • Randall, L., Berlina, A., Teräs, J., & Rinne, T. (2018). Digitalisation as a tool for sustainable Nordic regional development: Preliminary literature and policy review (Discussion Paper). Stockholm: Nordic Thematic Group for Innovative and Resilient Regions. Retrieved from http://www.nordregio.org/wp-content/uploads/2018/03/Digitalisation_Discussion-Paper_Jan-31.pdf.

  • Rantapelkonen, J., & Salminen, M. (2013). Introduction: Looking for an understanding of cyber. In J. Rantapelkonen & M. Salminen (Eds.), The fog of cyber defence (pp. 14–23). Publication Series 2, Article 10. Helsinki: National Defence University. Retrieved from https://www.cyberwar.nl/d/20130200_The%20Fog%20of%20Cyber%20Defence%20NDU%202013.pdf.

  • Rasi, P., & Kilpeläinen, A. (2015). The digital competences and agency of older people living in rural villages in Finnish Lapland. International Journal of Media, Technology and Lifelong Learning, 11(2), 149–160.

    Google Scholar 

  • Reneland-Forsman, L. (2018). ‘Borrowed access’—The struggle of older persons for digital participation. International Journal of Lifelong Education, 37(3), 333–344.

    Google Scholar 

  • Rid, T. (2013). Cyber war will not take place. Oxford: Oxford University Press.

    Google Scholar 

  • Salemink, K., Strijker, D., & Bosworth, G. (2017). Rural development in the digital age: A systematic literature review on unequal ICT availability, adoption, and use in rural areas. Journal of Rural Studies, 54, 360–371.

    Google Scholar 

  • Scheerder, A., van Deursen, A., & van Dijk, J. (2017). Determinants of internet skills, uses and outcomes: A systematic review of the second- and third-level digital divide. Telematics and Informatics, 34, 1607–1624.

    Google Scholar 

  • Selwyn, N. (2004). Reconsidering political and popular understandings of the digital divide. New Media & Society, 6(3), 341–362.

    Google Scholar 

  • Selwyn, N., Johnson, N., Nemorin, S., & Knight, E. (2016). Going online on behalf of others: An investigation of ‘proxy’ internet consumers. Sydney, Australia: Australian Communications Consumer Action Network. Retrieved from http://eprints.lse.ac.uk/83436/1/Nemorin_Going%20online_2017.pdf.

  • Sen, A. (1999). Development as freedom. Oxford: Oxford University Press.

    Google Scholar 

  • Sheehan, M. (2005). International security: An analytical survey. Boulder, CO: Lynne Rienner.

    Google Scholar 

  • Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press.

    Google Scholar 

  • SlettemeÃ¥s, D. (2014). Eldres bruk av digitale verktøy og internett: En landsdekkende undersøkelse av mestring, støttebehov, motivasjon og hindringer [The elderly’s use of digital tools and the internet: A country wide examination of mastery, needs for support, motivation and barriers] (Report 5). Oslo: Deltasenteret and Statens institutt for forbruksforskning—SIFO. Retrieved from http://www.hioa.no/extension/hioa/design/hioa/images/sifo/files/file79937_oppdragsrapport_5-2014_rev_1.pdf.

  • Sokoloff, C., & Lewis, R. (2005). Denial of citizenship: A challenge to human security (Issue Paper 28). Brussels: European Policy Centre. Retrieved from http://www.epc.eu/documents/uploads/724318296_EPC%20Issue%20Paper%2028%20Denial%20of%20Citizenship.pdf.

  • Staksrud, E. (2011). Norske barn pÃ¥ Internett: Høy risiko - liten skade? Nordicom Information, 33(4), 59–70.

    Google Scholar 

  • Statistics Norway. (2017a). Internett-mÃ¥linga 20 November 2017 [The internet measurement 20 November 2017]. Retrieved from https://www.ssb.no/inet.

  • Statistics Norway. (2017b). Ni av ti surfer pÃ¥ nettet hver dag [Nine out of ten surf the web every day]. Retrieved from http://www.ssb.no/teknologi-og-innovasjon/artikler-og-publikasjoner/ni-av-ti-surfer-pa-nettet-hver-dag.

  • Teräs, J., Salenius, V., Fagerlund, L., & Stanionyte, L. (2018). Smart specialisation in sparsely populated European Arctic regions (Technical Report). Luxembourg: The Joint Research Centre (JRC), Publications Office of the European Union. Retrieved from https://s3platform.jrc.ec.europa.eu/documents/20182/201464/Smart+Specialisation+in+Sparsely+Populated+European+Arctic+Regions/6d39afc9-6b7d-442d-a4bd-d2c4f86d8092.

  • Theobald, H. (2005). Social exclusion and care for the elderly: Theoretical concepts and changing realities in European welfare states (WZB Discussion Paper SP I 2005-301). Berlin: Wissenschaftszentrum Berlin für Sozialforschung (WZB). Retrieved from https://www.econstor.eu/bitstream/10419/47367/1/482174676.pdf.

  • United Nations Development Programme (UNDP). (1994). Human Development Report. Oxford: Oxford University Press. Retrieved from http://hdr.undp.org/sites/default/files/reports/255/hdr_1994_en_complete_nostats.pdf.

  • Van Dijk, J. (2005). The deepening divide: Inequality in the information society. London: Sage.

    Google Scholar 

  • Van Regenmortel, S., de Donder, L., Dury, A., Smetcoren, A., de Witte, N., & Verté, D. (2016). Social exclusion in later life: A systematic review of the literature. Population Ageing, 9, 315–344.

    Google Scholar 

  • Veit-Wilson, J. (1998). Setting adequacy standards: How governments define minimum incomes. Bristol: The Policy Press.

    Google Scholar 

  • Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178.

    Google Scholar 

  • Waltz, K. N. (1979). Theory of international politics. New York, NY: Random House.

    Google Scholar 

  • Warren, M. (2007). The digital vicious cycle: Links between social disadvantage and digital exclusion in rural areas. Telecommunications Policy, 31(6–7), 374–388.

    Google Scholar 

  • Wresch, W. (1996). Disconnected: Haves and have-nots in the information age. New Brunswick, NJ: Rutgers University Press.

    Google Scholar 

  • Wyn Jones, R. (2007). Message in a bottle? Theory and praxis in critical security studies. In B. Buzan & L. Hansen (Eds.), International security (pp. 299–319). London: Sage.

    Google Scholar 

  • Yar, M. (2013). Cybercrime and society (2nd ed.). London: Sage.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Sheehan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gulbrandsen, K.S., Sheehan, M. (2020). Social Exclusion as Human Insecurity: A Human Cybersecurity Framework Applied to the European High North. In: Salminen, M., Zojer, G., Hossain, K. (eds) Digitalisation and Human Security. New Security Challenges. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-48070-7_5

Download citation

Publish with us

Policies and ethics