This chapter addresses the technological megashift and implications for security and accountability within the EU. Digitalised interconnectivity of increasingly ‘embedded’ systems, infrastructures and societal functions are megashift features. Although the EU hardly lacks technological strategies, accountability structures beg improvement, and there are multiple expert groups with insufficient coordination and societal focus. The EU suffers from techno-optimism—coupled to powerful objectives of fuelling economic growth—which can lead to broadly conceived and represented security issues falling in shadow and struggles between interests being inadequately addressed. This chapter analyses how the EU deals with the megashift with respect to threats, surveillance systems, infrastructural vulnerability and public-private accountability. It is suggested that the EU take (i) a holistic grip on the megashift and implications, (ii) abandon optimistic techno-determinism for nuanced and contextual understanding and (iii) avoid outsourcing management of sensitive data and critical infrastructures.
- Critical infrastructure
This is a preview of subscription content, access via your institution.
Tax calculation will be finalised at checkout
Purchases are for personal use onlyLearn about institutional subscriptions
Akaev, A., & Pantin, V. (2014). Technological Innovations and Future Shifts in International Politics. International Studies Quarterly, 58(4), 867–872.
Beck, U. (1992). From Industrial Society to the Risk Society: Questions of Survival, Social Structure and Ecological Enlightenment. Theory, Culture & Society, 9(1), 97–123.
Brouwers, E. (2016). Data Surveillance and Border Control in the EU: Balancing Efficiency and Legal Protection. In T. Balzacq & S. Carrera (Eds.), Security Versus Freedom? A Challenge for Europe’s Future (pp. 137–154). London: Routledge.
Castells, M. (1996). The Information Society. Oxford: Oxford University Press.
Council of the European Union. (2015). Council Conclusions on the Renewed European Union Internal Security Strategy 2015–2020. 10 June 2015. 9798/15.
Dubberly, H., & Pangaro, P. (2015). Cybernetics and Design: Conversations for Action. Cybernetics and Human Knowing, 22(2–3), 73–82.
EEAS. (2016). A Global Strategy for the European Union’s Foreign and Security Policy. Retrieved 20 September 2020 from https://eeas.europa.eu/sites/eeas/files/eugs_review_web_0.pdf
EEAS. (2019). The European Union’s Global Strategy – Three Years On, Looking Forward. Retrieved 20 September 2020 from https://eeas.europa.eu/sites/eeas/files/eu_global_strategy_2019.pdf
Eltantawy, N., & Wiest, J. B. (2011). The Arab Spring: Social Media in the Egyptian Revolution: Reconsidering Resource Mobilization Theory. International Journal of Communication, 5(18), 1207–1224.
Eriksson, J., & Giacomello, G. (2009). Who Controls the Internet? International Studies Review (The Forum), 11, 205–230.
Eriksson, J., & Lagerkvist, J. (2016). Cyber Security in Sweden and China: Going on the Attack? In K. Friis & J. Ringsmose (Eds.), Conflict in Cyber Space (pp. 99–110). New York: Routledge.
European Commission. (2010). The EU Internal Security Strategy in Action – Five Steps Towards a More Secure Europe, 22 November 2010. COM(2010) 673 Final.
European Commission. (2015a). The European Agenda on Security, 28 April 2015, COM(2015) 185 Final.
European Commission. (2015b). A Digital Single Market Strategy for Europe, 6 May 2015. COM/2015/0192 Final.
European Commission. (2020). H2020 Programme: Guidelines for the Classification of Information in Research Projects. Retrieved 20 September 2020, from https://ec.europa.eu/research/participants/data/ref/h2020/other/hi/secur/h2020-hi-guide-classif_en.pdf
Foucault, M. (1979). Discipline and Punish: The Birth of the Prison. New York: Vintage Books.
Fukuyama, F. (1989). The End of History? The National Interest, 16, 3–18.
Haraway, D. (1991). Simians, Cyborgs and Women: The Reinvention of Nature. New York: Routledge.
Hudson, V. M. (Ed.). (1991). Artificial Intelligence and International Politics. Reprinted in 2018. London: Routledge.
Kranzberg, M. (1986). Technology and History: Kranzberg’s Laws. Technology and Culture, 27(3), 544–560.
Lasswell, H. D. (1936). Politics: Who Gets What, When, How. New York: McGraw-Hill.
McCarthy, D. R. (Ed.). (2018). Technology and World Politics. London: Routledge.
Morozov, E. (2012). The Net Delusion: The Dark Side of Internet Freedom. New York: PublicAffairs.
Newlove-Eriksson, L. (2020). Accountability and Patchwork Governance in Urban Rail Interchanges: Junctions of London Crossrail and Stockholm City Line Compared. Public Works, Management & Policy, 25(2), 105–131.
Newlove-Eriksson, L., & Eriksson, J. (2013). Governance Beyond the Global: Who Controls the Extraterrestrial? Globalizations, 10(2), 277–292.
Newlove-Eriksson, L., Giacomello, G., & Eriksson, J. (2018). The Invisible Hand? Critical Information Infrastructures, Commercialisation and National Security. The International Spectator, 53(2), 124–140.
Keohane, R. O., &Nye, J. S. (Eds.). (1971). Transnational Relations and World Politics. Cambridge: Harvard University Press.
Perrow, C. (1999). Normal Accidents: Living with High-Risk Technologies (Rev. ed.). Princeton: Princeton University Press.
Rosenau, J. N., & Singh, J. P. (Eds.). (2002). Information Technologies and Global Politics: The Changing Scope of Power and Governance. New York: SUNY Press.
Schwab, K. (2017). The Fourth Industrial Revolution. New York: Crown Business.
SOU. (1996). SOU 1996:181. In S. Öman (Ed.), Megabyte. Stockholm: Ungdomens IT-råd.
Vermeulejn, G., & Lievens, E. (Eds.). (2018). Data Protection and Privacy Under Pressure. Antwerp: Maklu.
Wolfsfeld, G., Segev, E., & Sheafer, T. (2013). Social Media and the Arab Spring: Politics Comes First. The International Journal of Press/Politics, 18(2), 115–137.
Editors and Affiliations
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Newlove-Eriksson, L.M., Eriksson, J. (2021). Technological Megashift and the EU: Threats, Vulnerabilities and Fragmented Responsibilities. In: Bakardjieva Engelbrekt, A., Leijon, K., Michalski, A., Oxelheim, L. (eds) The European Union and the Technology Shift. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-63672-2_2
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-63671-5
Online ISBN: 978-3-030-63672-2