{"title":"国防在国家网络安全中的作用","authors":"Mika Kerttunen","doi":"10.1093/oxfordhb/9780198800682.013.27","DOIUrl":null,"url":null,"abstract":"Essential to states organizing and regulating civil-military relations, the author analyses the actual and potential role and tasks that the defence sector and armed forces can take up in national cybersecurity policy and strategy. After identifying competences and capabilities that the defence sector could employ for national cybersecurity, the chapter identifies generic roles, from being an independent actor to being another integrated stakeholder, for the defence sector and the armed forces. The author notices how inclusion of the defence sector into national cybersecurity updates the concerns of the ‘military-industrial complex’ influencing not only cybersecurity policy but also how information and communication technologies are to be used in a society. Therefore, the chapter ultimately encourages states to implement strong political control in order to avoid unnecessary securitization and militarization of information technology and cyber development policies, misuse of public mandate and funds, and, ultimately, abuses of power by any elite.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Role of Defence in National Cybersecurity\",\"authors\":\"Mika Kerttunen\",\"doi\":\"10.1093/oxfordhb/9780198800682.013.27\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Essential to states organizing and regulating civil-military relations, the author analyses the actual and potential role and tasks that the defence sector and armed forces can take up in national cybersecurity policy and strategy. After identifying competences and capabilities that the defence sector could employ for national cybersecurity, the chapter identifies generic roles, from being an independent actor to being another integrated stakeholder, for the defence sector and the armed forces. The author notices how inclusion of the defence sector into national cybersecurity updates the concerns of the ‘military-industrial complex’ influencing not only cybersecurity policy but also how information and communication technologies are to be used in a society. Therefore, the chapter ultimately encourages states to implement strong political control in order to avoid unnecessary securitization and militarization of information technology and cyber development policies, misuse of public mandate and funds, and, ultimately, abuses of power by any elite.\",\"PeriodicalId\":336846,\"journal\":{\"name\":\"The Oxford Handbook of Cyber Security\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Oxford Handbook of Cyber Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/oxfordhb/9780198800682.013.27\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Oxford Handbook of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oxfordhb/9780198800682.013.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Essential to states organizing and regulating civil-military relations, the author analyses the actual and potential role and tasks that the defence sector and armed forces can take up in national cybersecurity policy and strategy. After identifying competences and capabilities that the defence sector could employ for national cybersecurity, the chapter identifies generic roles, from being an independent actor to being another integrated stakeholder, for the defence sector and the armed forces. The author notices how inclusion of the defence sector into national cybersecurity updates the concerns of the ‘military-industrial complex’ influencing not only cybersecurity policy but also how information and communication technologies are to be used in a society. Therefore, the chapter ultimately encourages states to implement strong political control in order to avoid unnecessary securitization and militarization of information technology and cyber development policies, misuse of public mandate and funds, and, ultimately, abuses of power by any elite.