Digital/sovereignty and European security integration: an introduction
نویسندگان
چکیده
The notion of digital sovereignty, also often referred to as technological has been gaining momentum in the European Union’s (EU) political and policy discourses over recent years. Digital sovereignty come supplement an already substantial engagement EU with across various security domains. goal this article overall Special Issue is explore how discourse practices redefine integration. Our core argument that both direct indirect implications for attempts develop control infrastructures (sovereignty digital), well use tools governance through digital). It thus essential further terms policies a re-articulation sovereign power technologies – what we suggest calling digital/sovereignty.
منابع مشابه
Introduction: National Security and Intelligence Integration
Introduction................................................................................................................................. 1 Integration – The Need and the Opportunity .............................................................................. 1 Overcoming Impediments to Integration .................................................................................... 7 Secu...
متن کاملAn introduction to motivic integration
By associating a ‘motivic integral’ to every complex projective variety X with at worst canonical, Gorenstein singularities, Kontsevich [Kon95] proved that, when there exists a crepant resolution of singularities φ : Y → X, the Hodge numbers of Y do not depend upon the choice of the resolution. In this article we provide an elementary introduction to the theory of motivic integration, leading t...
متن کاملCryptography - an introduction to computer security
Want to get experience? Want to get any ideas to create new things in your life? Read cryptography an introduction to computer security now! By reading this book as soon as possible, you can renew the situation to get the inspirations. Yeah, this way will lead you to always think more and more. In this case, this book will be always right for you. When you can observe more about the book, you w...
متن کاملAn Introduction to Security in Distributed Systems
This article considers the security threats that may arise when the computing facilities of an organisation are distributed and highlight ways in which such threats may be countered. Relevant international standards are indicated. The article is intended to be understood by the non-specialist reader.
متن کاملIT security in industrial plants - an introduction
topic of IT security is becoming increasingly relevant in modern automated industrial plants. Modern automation systems provide high levels of inter-connectivity. Implementations are based on commercial IT platforms , many of which are known to be vulnerable to electronic attacks. This article is part 1 of a three part tutorial on IT security for industrial systems. Security objectives are expl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: European Security
سال: 2022
ISSN: ['0966-2839', '1746-1545']
DOI: https://doi.org/10.1080/09662839.2022.2101887