2019
DOI: 10.1016/j.erss.2019.01.003
|View full text |Cite
|
Sign up to set email alerts
|

Sustainable cybersecurity? Rethinking approaches to protecting energy infrastructure in the European High North

Abstract: Rapidly increasing digitization has positively contributed to economic and social development and helped increasing environmental protection. However, it also made socio-technical systems and ecosystems more vulnerable to cyber-threats. Critical infrastructure (CI) in the energy sector is particularly vulnerable to such threats. Remoteness, seasonal darkness, and severe climate that is becoming less predictable due to global climate change-the kind of conditions present in the Arctic European High North (EHN),… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 10 publications
0
10
0
1
Order By: Relevance
“…Based on systems thinking, embedding technology to a system increases the interdependencies among systemic entities and possibly between different systems, leading to a vicious circle for the rise of complexity [46]. The integration of the Information and Communication Technologies (ICT) is regarded as a vulnerability factor and a threat for the system's resilience [10,47].…”
Section: Technologymentioning
confidence: 99%
See 1 more Smart Citation
“…Based on systems thinking, embedding technology to a system increases the interdependencies among systemic entities and possibly between different systems, leading to a vicious circle for the rise of complexity [46]. The integration of the Information and Communication Technologies (ICT) is regarded as a vulnerability factor and a threat for the system's resilience [10,47].…”
Section: Technologymentioning
confidence: 99%
“…Likewise, while the smart city has become a trend in the field of urban development [6][7][8], the understanding of the term remains obscure [4,9]. At the same time, the necessity to integrate the two concepts at the operational level towards a transition from conventional, vulnerable, and mismanaged urban built environments to smart, sustainable, and resilient ones has just recently started to emerge [4,10]. It is interesting that only a few research projects have already explored the resonance between the smart city and the resilience frameworks in real urban systems.…”
Section: Introductionmentioning
confidence: 99%
“…44 Casotta and Sidortsov also underline the vulnerability of critical infrastructure and argue that a new approach to the impact of digitalisation and climate change on the integrity of energy management systems is of vital importance for different states in the EHN. 45 Rather than considering cyber security solely within a framework of securing a physical object, this article considers cyber security through the lens of "techne and logos," as suggested by Cavelty in reference to contextualising Bijker's three types of technology into modern understandings of cyber security. 46 In this understanding of cyber security, technology becomes as much a social practice as societal knowledge and therefore re-centres the human into equations about the well-being or integrity of a cyber system.…”
Section: The Cybersecurity Framework and Climate Change -Security Examentioning
confidence: 99%
“…Application of digital technologies has greatly contributed to economical and social aspects of humanity development and enhanced environment protection, however, it has been shown that socio-technical systems and ecosystem has become more vulnerable to cyber-threats, and especially this problem is particularly important to critical infrastructure in the energy sector [1] as any system malfunctioning may cause severe impact on all aspects of human living. The resilience of the any energy company to cyber security threats is a critical issue in provision of its safe and sustainable functioning.…”
Section: Introductionmentioning
confidence: 99%
“…To assess the accuracy of the analysis models, the authors chose the dataset provided within the VAST Challenge 2016 as the solutions to the challenge could be used as a ground proof to the detected anomalies. According to the answer sheet provided, there are 4 types of the anomalies: (1) visiting typical zone in the atypical daytime (weekends or midnight), (2) forgetting using card at the end of the work day, (3) multiple card issues and (4) simultaneous usage of cards linked to one employee. The authors also manually analyzed the dataset, and discovered some minor deviations in the employee' routes connected with the atypical duration of staying in the typical controlled zones, forgetting using a card during the work day.…”
mentioning
confidence: 99%