Preparing for Digital Disruption.
| Main Author: | |
|---|---|
| Other Authors: | , |
| Format: | eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing AG,
2021.
|
| Edition: | 1st ed. |
| Series: | Research for Policy Series
|
| Subjects: | |
| Online Access: | Click to View |
Table of Contents:
- Intro
- Persons Consulted
- Contents
- Abbreviations
- Chapter 1: Fighting Digital Fires
- 1.1 Incidents - Large and Small - Are a Fact of Life
- 1.2 Disruptions at the Heart of Society
- 1.3 There Is No Such Thing as 100% Security - But Are We Sufficiently Prepared for Disruption?
- 1.4 Structure of This Report
- References
- Chapter 2: Societal Disruption
- 2.1 Introduction
- 2.2 Societal Disruption
- 2.2.1 A Disruption of Everyday Life
- 2.2.2 'Serious' Disruption: Failure of Core Processes
- 2.2.3 Perceived Disruption
- 2.2.4 Duration of Disruption
- 2.3 Critical Infrastructure and Critical Processes
- 2.3.1 Critical Processes
- 2.4 Digital Disruption
- 2.5 Conclusion
- References
- Chapter 3: Digitization and Societal Disruption
- 3.1 Introduction
- 3.2 Our Growing Dependence on Digital Technology
- 3.2.1 Datafication
- 3.2.2 Computing Power
- 3.2.3 Connectivity
- 3.3 Chains, Networks and Complexity Transcending Borders
- 3.3.1 Chains and Networks16
- 3.3.2 Beyond National Boundaries
- 3.3.3 Complexity
- 3.4 Geopolitics
- 3.4.1 Dependence on Large Foreign Providers
- 3.4.2 Malicious States
- 3.4.3 The Perfect Weapon
- 3.5 Conclusion
- References
- Chapter 4: Preparing for Digital Disruption
- 4.1 Introduction
- 4.2 Preparedness
- 4.2.1 Fall-Back Options
- 4.2.2 Isolation
- 4.2.3 Cyber Security Exercises
- 4.2.4 Provision of Information
- 4.3 Detection and Early-Warning Systems
- 4.3.1 Organizing the Exchange of Information
- 4.3.2 Strategic Information
- 4.3.3 Responsibilities
- 4.4 Responding to Incidents
- 4.4.1 Legal Powers
- 4.4.2 Combating Cross-Border Crises
- 4.4.3 Setting Priorities
- 4.5 Recovery &
- Reconstruction
- 4.5.1 Evaluating and Learning Lessons
- 4.5.2 Compensation
- 4.6 Conclusion
- References
- Chapter 5: Conclusions and Recommendations
- 5.1 Introduction.
- 5.2 New Types of Disruption
- 5.3 Centralized Setting of Standards and Coordination by Government
- 5.4 Focusing on Preparedness
- 5.5 Detection: A Clearer Picture of Dependencies
- 5.5.1 Insight into Dependencies
- 5.5.2 A New Approach to the Identification of Critical Infrastructure
- 5.5.3 Digital Triage
- 5.6 Mitigation: More Powers, Better Categorization of Incidents and Better European Coordination
- 5.6.1 Legal Powers and Competencies
- 5.6.2 Towards a Categorization of Incidents
- 5.6.3 European Coordination
- 5.7 Recovery &
- Reconstruction: Examine the Possibility of a Cyber Pool and Make Better Use of Data on Incidents
- 5.7.1 Cyber Pool
- 5.7.2 Make Better Use of Data on Incidents
- 5.8 Closing Words
- References.


