Logo: to the web site of the Swedish Defence University

fhs.se
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
New threats - Old Routines: bureaucratic adaptability in the security policy environment
Swedish National Defence College, Department of Security, Strategy and Leadership (ISSL), CATS (Center for Asymmetric Threat Studies). Åbo Akademi University.ORCID iD: 0000-0001-8904-6045
2015 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [sv]

Huvudfokus för denna avhandling är området byråkratisk förändringsbenägenhet i förhållande till omvärldsutveckling på det säkerhetsrelaterade området. Den forskningsfråga som står i centrum är: Hur kan man tidsmässigt förkorta processen från upptäckten av nya hotförutsättningar till att nödvändiga skyddsåtgärder implementerats, och var finns flaskhalsarna? Syftet är att från olika infallsvinklar studera samspelet och kopplingarna mellan de statliga institutioner som har att uppmärksamma och varna för olika former av antagonistiska hot, och de strukturer som har att planera för samhällsberedskapen genom att snabbt och smidigt omsätta dessa signaler till styrande inriktningar med motsvarande resursallokeringar till utsatta sektorer. Kravet på ökad snabbhet i denna process har ökat radikalt i och med informationssamhällets utveckling och där gårdagens rutiner inte är anpassade till dagens nya hot och sårbarheter. Därför är studier av de mekanismer som kan påverka snabbheten i högsta grad policyrelevant. En viktig hypotes som prövas i avhandlingsupplägget är att ökad pluralism – både på hot- och planeringssidan – medför ökad förändringsbenägenhet beträffande att implementera föranledda åtgärder och förändra förvaltningsstrukturer. Det kan handla om såväl olika militära försvarssystem som civila kritiska informationsinfrastrukturer kopplat till el- och telesystem. Ett särskilt förhållande här är att dessa processer till övervägande del äger rum i slutna system med kunskapsmonopol där externa inflytelser (”peer review”, marknadsmekanismer etc.) är närmast obefintliga. Hur påverkas dessa och utvecklas dessa strukturer för ”Hot” respektive ”Planering” av omvärldsutvecklingen? Finns det en ”Missing Link” här i kedjan ”hotupptäckt-policyformuleringsprocess-byråkratisk implementering”? Vad hindrar denna process från att proaktivt och linjärt antecipera nya förutsättningar?

Place, publisher, year, edition, pages
Åbo: Åbo Akademi University Press, 2015. , p. 196
National Category
Political Science
Research subject
Statsvetenskap med inriktning mot strategi och säkerhetspolitik
Identifiers
URN: urn:nbn:se:fhs:diva-5630ISBN: 978-952-12-3283-1 (print)OAI: oai:DiVA.org:fhs-5630DiVA, id: diva2:869018
Public defence
2015-11-27, Auditorium Bruhn, Academill, Strandgatan 2, Vasa, 12:00
Opponent
Supervisors
Available from: 2015-11-16 Created: 2015-11-12 Last updated: 2016-06-16Bibliographically approved
List of papers
1. Shielding the net: understanding the issue of vulnerability and threat to the information society
Open this publication in new window or tab >>Shielding the net: understanding the issue of vulnerability and threat to the information society
2010 (English)In: Policy Studies, ISSN 0144-2872, E-ISSN 1470-1006, Vol. 31, no 3, p. 283-300Article in journal (Refereed) Published
Abstract [en]

There are a number of vulnerabilities, which are increasing in potential effects, as society grows increasingly digitised and increasingly interconnected. Critical information infrastructure (CII) is one of these vulnerabilities, which is vital for the functioning of society. Often these resources are taken for granted and can be overlooked. The period under consideration in this article and consequently its primary focus is from 1995 until 2002. Beginning with a description of the physical stakes that are at risk, the article evaluates the policy processes underpinning CII in a variety of different countries as it relates to CII protection. These processes are tracked, revealing differences and similarities in the time and path taken to secure a national policy. It is argued that a country's ability to successfully navigate the various identified phases of the critical information infrastructure protection programme implementation process is determined by a number of observable factors: constitutional structure; the character of the state bureaucracy; real and perceived threats; and effective top-down policy coordination.

Place, publisher, year, edition, pages
Routledge, 2010
Keywords
comparison, critical information infrastructure, policy analysis, policy learning, risk
National Category
Social Sciences
Research subject
Statsvetenskap med inriktning mot krishantering och internationell samverkan
Identifiers
urn:nbn:se:fhs:diva-1016 (URN)10.1080/01442871003615935 (DOI)000291002400001 ()
Available from: 2010-12-21 Created: 2010-12-21 Last updated: 2018-06-28Bibliographically approved
2. Understanding intelligence community innovation in the post-9/11 world
Open this publication in new window or tab >>Understanding intelligence community innovation in the post-9/11 world
2011 (English)In: The international journal of intelligenca and counter intelligence, ISSN 0885-0607, E-ISSN 1521-0561, Vol. 24, no 3, p. 534-568Article in journal (Refereed) Published
Place, publisher, year, edition, pages
London: Routledge, 2011
National Category
Social Sciences
Research subject
Statsvetenskap med inriktning mot strategi och säkerhetspolitik
Identifiers
urn:nbn:se:fhs:diva-2055 (URN)
Available from: 2011-09-02 Created: 2011-09-02 Last updated: 2017-12-08Bibliographically approved
3. Information Terrorism: When and by Whom?
Open this publication in new window or tab >>Information Terrorism: When and by Whom?
2007 (English)In: Defense Intelligence Journal, ISSN 1061-6845, Vol. 16, no 2, p. 139-154Article in journal (Refereed) Published
Keywords
Terrorism, cyber security
National Category
Political Science (excluding Public Administration Studies and Globalisation Studies)
Research subject
Statsvetenskap med inriktning mot krishantering och internationell samverkan
Identifiers
urn:nbn:se:fhs:diva-5635 (URN)
Available from: 2015-11-17 Created: 2015-11-17 Last updated: 2018-01-10Bibliographically approved
4. The Trojan Horse in the Information Age
Open this publication in new window or tab >>The Trojan Horse in the Information Age
2006 (English)In: Countering Terrorism and WMD: Creating a Global Counter-Terrorism Network (Political Violence), Routledge, 2006, p. 87-98Chapter in book (Refereed)
Place, publisher, year, edition, pages
Routledge, 2006
National Category
Political Science
Identifiers
urn:nbn:se:fhs:diva-5636 (URN)978-0415384995 (ISBN)
Available from: 2015-11-17 Created: 2015-11-17 Last updated: 2016-01-07Bibliographically approved
5. The Role of Think Tanks in the U.S. Security Policy Environment
Open this publication in new window or tab >>The Role of Think Tanks in the U.S. Security Policy Environment
2015 (English)In: The international journal of intelligenca and counter intelligence, ISSN 0885-0607, E-ISSN 1521-0561, Vol. 28, no 3, p. 480-501Article in journal (Refereed) Published
Place, publisher, year, edition, pages
London: , 2015
Keywords
Threat, Security Policy, Policy Planning, Intelligence, Bureaucracy, Think Tanks
National Category
Political Science (excluding Public Administration Studies and Globalisation Studies)
Research subject
Statsvetenskap med inriktning mot strategi och säkerhetspolitik
Identifiers
urn:nbn:se:fhs:diva-5413 (URN)10.1080/08850607.2015.1022462 (DOI)000210648400004 ()
Available from: 2015-06-05 Created: 2015-06-05 Last updated: 2018-06-29Bibliographically approved
6. The recipe for think tank success: the perspective of insiders
Open this publication in new window or tab >>The recipe for think tank success: the perspective of insiders
2016 (English)In: The international journal of intelligenca and counter intelligence, ISSN 0885-0607, E-ISSN 1521-0561, Vol. 29, no 4, p. 738-759Article in journal (Refereed) Published
Abstract [en]

On why and how the main five US Think Tanks fill a gap in the national security environment and stay succesful, maintain status, impact and reputation for integrity

Place, publisher, year, edition, pages
Taylor & Francis, 2016
Keywords
Security Policy, Think Tanks, Department of Defense, Intelligence
National Category
Political Science Political Science (excluding Public Administration Studies and Globalisation Studies)
Research subject
Statsvetenskap med inriktning mot strategi och säkerhetspolitik
Identifiers
urn:nbn:se:fhs:diva-6166 (URN)10.1080/08850607.2016.1177397 (DOI)000384359700005 ()
Available from: 2016-06-16 Created: 2016-06-16 Last updated: 2018-06-29Bibliographically approved

Open Access in DiVA

fulltext(1145 kB)826 downloads
File information
File name FULLTEXT02.pdfFile size 1145 kBChecksum SHA-512
9e23a9daa19e2437e4db579185b986869782921be73d7e27210094156b088afa2d09c2094abb950d46ead5436667d0f3815bd89a70dc1c78d06b899e3a6d2f6b
Type fulltextMimetype application/pdf

Authority records

Nicander, Lars

Search in DiVA

By author/editor
Nicander, Lars
By organisation
CATS (Center for Asymmetric Threat Studies)
Political Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 921 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 7306 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf