SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "AMNE:(SOCIAL SCIENCES Political Science) ;lar1:(his)"

Sökning: AMNE:(SOCIAL SCIENCES Political Science) > Högskolan i Skövde

  • Resultat 1-10 av 45
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Olson, Maria, 1969- (författare)
  • The 'freedom of choice challenge' on equivalence - and the Swedish schools' assignment to bring up democratic citizens
  • 2005
  • Ingår i: A Nordic Dimension in Education and Research - Myth or Reality?.
  • Konferensbidrag (refereegranskat)abstract
    • Among the different meanings of equivalence in Swedish Education policy in the 1990ies, one can be related to the concept of -freedom of choice-. Even though this relation doesn't contribute to a replacement of the historically more unambiguous meaning of equivalence, it coexists with it and represents a constant tension to it. This tension can be described in terms of a -freedom of choice challenge- on equivalence. In this text I aim to highlight this tension in relation to the Swedish schools-assignment to bring up democratic citizens in the early 1990ies. The question I try to answer is how can the freedom of choice challenge be considered to stand out in the political understanding of the schools- up bringing of democratic citizens in Sweden in the early 1990ies? I take my point of departure in some nationally encompassing Education policy texts.
  •  
2.
  • Olson, Maria, 1969- (författare)
  • Equivalence and the challenge of 'freedom of choice' - Consequences of a changed Policy on a Democratic Citizenship in Sweden
  • 2006
  • Ingår i: Enacting equity in education. - Helsinki : Research Centre for Social Studies Education, University of Helsinki. - 9521031964 - 9521031999 - 9789521031960 ; , s. 156-175
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Equivalence is regarded as a central concept in contemporary Swedish education policy.  One important aspect in the education policy is to describe and determine the Swedish schools' assignment to bring up democratic citizens. The concept of equivalence, hence, plays an important role in this policy-making practice. In the 1990s equivalence is challenged by another concept: 'freedom of choice'. Here some possible outcomes of a changed conceptual framework in the education policy are tried out, regarding the political understanding of a democratic citizenship. Three questions are pulled forth in order to carry out this aim. The challenge of 'freedom of choice' on equivalence contributes to a change in the political understanding of a democratic citizenship in Swedish education policy. A phenomenon that occurs in at least three aspects: the political participation (from co-acting to re-acting), the political activity (from directing to voting) and the political role of the citizen in society (from being a designer to a consumer).
  •  
3.
  • Olson, Maria, 1969- (författare)
  • Existential Democracy - A Way to nurture Hope for Global Democratic Education?
  • 2009
  • Ingår i: Disciplined Inquiry.
  • Konferensbidrag (refereegranskat)abstract
    • We live in times of search for an education that can transcend national, ethnical, religious and cultural borders. As it seems, contemporary education is to be found in despair. Or at least found to be unsatisfactory in relation to new challenges in the contemporary world. The aim of this text is to deepen the prospect of the potential of education, regarding what might seem almost like a visionary educational objective - to provide for a global democratic citizenship. The core issue in the text is to surface what appears as insufficiencies in present democratic citizenship education. The urge is to draw upon some feasible features of an alternative to these insufficiencies. Drawing on Stanley Cavell-s notion of voicing and language, I will suggest an altered understanding of democracy and of a democratic citizenship that may direct the mission of democratic education in another way. What is needed for a compelling democratic education, I will argue, is an existential orientation. In order to make my argument, I will use Swedish Education policy as a case in point.
  •  
4.
  • Jansson, Magnus, et al. (författare)
  • Outsourcing and backsourcing in a time of crisis – experiences of double opportunism
  • 2024
  • Ingår i: International Review of Public Administration. - : Taylor & Francis Group. - 1229-4659 .- 2331-7795. ; 29:2, s. 102-122
  • Tidskriftsartikel (refereegranskat)abstract
    • This article addresses the question of how public organizations with limited capacity manage to handle large scale crises. The case analyzed in this article is the sourcing of accommodation during the migration crisis in Sweden of 2015–2016. The event was a game-changer in Swedish migration policy following a more hesitant policy than before, even though new and substantial migration crisis have followed since then. Results show how the legal framework for procurements was not adapted for extraordinary events. The Swedish state was forced to pay exaggerated prices as private contractors took advantage of the acute demand. The study develops our theoretical understanding of the sourcing process during crises and show how the short-term perspective and uncertainties that characterize crises encourage both suppliers and procurers of services to act opportunistically. 
  •  
5.
  • Huskaj, Gazmend (författare)
  • What is a Substantial Contribution to a Research Project in Offensive Cyberspace Operations that Merits Co-Authorship?
  • 2022
  • Ingår i: Proceedings of the 17th International Conference on Cyber Warfare and Security. - Reading, UK : ACI Academic Conferences International. - 9781914587276 - 9781914587269 ; , s. 385-394
  • Konferensbidrag (refereegranskat)abstract
    • This article reviews the question what is a substantial contribution to a research project in offensive cyberspace operations that merits co-authorship? Frustrations and conflicts may develop during research projects when researchers with different backgrounds, cultures, research fields and expertise decide to conduct research and produce and publish those results. The focus of this paper is a research project in cyberspace operations while taking into account the power-dynamics inherent in the academic system and how these can affect the co-authorship of research products. First, the purpose with doing research is presented. Next, three models of the research process are reviewed, describing their differences and similarities. Then, linguistic analysis is applied on a set of terms in guidelines for co-authorship described in some different universities in Sweden. The results present a model for a research project in offensive cyberspace operations and based on the output of the linguistic analysis, the model is used to quantify and describe what a substantial contribution is in three scenarios that merits co-authorship. 
  •  
6.
  • Huskaj, Gazmend, et al. (författare)
  • An anticipatory ethical analysis of offensive cyberspace operations
  • 2020
  • Ingår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020. - Reading : Academic Conferences and Publishing International Limited. - 9781912764525 - 9781912764532 - 1912764539 ; , s. 512-520
  • Konferensbidrag (refereegranskat)abstract
    • This article presents the ethical issues using offensive cyberspace operations. Previously enshrouded in secrecy, and now becoming the new norm, countries are using offensive cyberspace operations to achieve their strategic interests. Russia has conducted multiple offensive operations targeting Estonia, Georgia and the Ukraine; Hamas has targeted Israeli targets; and Iran has been targeting U.S. targets. The response to these operations has varied; Estonia and Georgia struggled with the attacks and were unable to respond while Ukraine tried to respond but the response was inefficient. Israel's response on Hamas offensive operations was an air strike on a building with Hamas Cyber-operatives. Iran shot down a U.S. Drone over the Strait of Hormuz, and the U.S. initially intended to respond with kinetic capabilities in the form of missile strikes. However, in the last minute, the U.S. chose to respond with offensive cyberspace operations targeting the Iranian missile systems. This last-minute change of response choosing between kinetic or cyber capabilities shows a need to further investigate how offensive cyberspace operations can be used against which targets from an ethical perspective. This article applies anticipatory ethical analysis on U.S. offensive operations in the “Global Hawk”-case when Iran shot down a U.S. drone over the Strait of Hormuz. Anticipatory ethical analysis looks at emerging technologies and their potential consequences. Offensive cyberspace operations present a range of possibilities, which include lowering the risk of harm to cyber operatives' lives belonging to the responding nation. However, a response can also be kinetic. Therefore, the analysis of the “Global Hawk”-case is compared with the Israeli-air strike of the building of Hamas Cyber-operatives. The authors argue that applying anticipatory ethical analysis on offensive operations and kinetic operations assist decision makers in choosing response actions to re-establish deterrence through the use of offensive cyberspace operations. 
  •  
7.
  • Andersson, Erik, 1979-, et al. (författare)
  • Delaktighet som pedagogik och demokratiskt värde för fullföljandet av studier – kunskapsbidrag från ett utvecklingsprojekt
  • 2015
  • Ingår i: Utbildning och Lärande / Education and Learning. - Skövde : Högskolan i Skövde. - 2001-4554. ; 9:1, s. 80-100
  • Tidskriftsartikel (refereegranskat)abstract
    • Participation as a pedagogy and democratic value turns out to be a critical element in students’ completion of school. Completed education is a regional development project in which a survey has been conducted in order to identify successful strategies to promote completed education in school. In an analysis, in the context of the survey, with an emphasis on school and participation as a pedagogy and democratic value, several findings are shown. It turns out that the importance of participation manifests itself through an emphasis on the societal and democratic mission of school; school ethos; the value praxis of school; pedagogical approach; and viewing the pupil as capable. It is, in more detail, shown that it is particularly crucial to understand the completion of school as a pedagogical problem; create sustainable institutional structures not bound to one person; and to make sure that students are participants in their own studies.
  •  
8.
  • Huskaj, Gazmend, et al. (författare)
  • Anticipatory ethics for vulnerability disclosure
  • 2020
  • Ingår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020. - Reading : Academic Conferences and Publishing International Limited. - 9781912764525 - 1912764539 - 9781912764532 ; , s. 254-261
  • Konferensbidrag (refereegranskat)abstract
    • This article presents the ethical dilemma related to under what circumstances vulnerabilities should be disclosed. Vulnerabilities exist in hardware and software, and can be as a consequence of programming errors or design flaws. Threat actors can exploit these vulnerabilities to gain otherwise unintended access to information systems, resources and/or stored information. In other words, they can be used to impact the confidentiality, integrity and availability of information in information systems. As a result, various types of vulnerabilities are highly sought after since they enable this type of access. The most highly sought are so-called “zero-day”-vulnerabilities. These are vulnerabilities that exist but are unknown, and when exploited, enable one way of entry into a system that is not thought possible. This is also why zero-day vulnerabilities are very popular among criminal organizations, states and state-sponsored advanced persistent threats. The other side of the coin is when a state identifies a zero-day, and ends up in the ethical dilemma of whether to release the news and inform the vendor to patch it, i.e. close the vulnerability, or to use it for offensive or intelligence purposes. This article employs these distinctions to apply anticipatory ethics in the Stuxnet-case. Stuxnet was a computer software that was allegedly developed by the U.S. together with Israel to disrupt Iran's development of uranium for their nuclear program. More exactly, it was developed to disable the uranium centrifuges used to enrich uranium. To achieve this, Stuxnet exploited four zero-day vulnerabilities and, according to some experts, managed to delay Iran's nuclear program by one to two-years, forcing them to the negotiation table. Using vulnerabilities like zero-days presents opportunities but also risks. The results of the application of anticipatory ethics to the Stuxnet case are then compared with the “Osirak”-case and the “al-Kibar”-case. Osirak was the nuclear reactor in Iraq and was bombed in 1981; al-Kibar was the nuclear reactor being built up in Syria, also bombed in 2007. 
  •  
9.
  • Huskaj, Gazmend, et al. (författare)
  • Designing attack infrastructure for offensive cyberspace operations
  • 2020
  • Ingår i: Proceedings of the 19th European Conference on Cyber Warfare and Security. - Reading, UK : Academic Conferences and Publishing International Limited. - 9781912764617 - 9781912764624 ; , s. 473-482
  • Konferensbidrag (refereegranskat)abstract
    • This article addresses the question ‘what considerations should be taken by cyber commands when designing attack infrastructure for offensive operations?’. Nation-states are investing in equipping units tasked to conduct offensive cyberspace operations. Generating ‘deny, degrade, disrupt, destroy or deceive’ effects on adversary targets requires to move from own (‘green’), through neutral (‘grey’), to adversary (‘red’) cyberspace. The movement is supported by attack infrastructure for offensive cyberspace operations. In this paper, we review the professional and scientific literature identifying the requirements for designing an attack infrastructure. Next, we develop and define the concepts for attack infrastructure. Finally, we explain and describe the considerations for designing attack infrastructure. The research question is answered by proposing a framework for designing attack infrastructure. This framework is vital for military and civilian commands designing attack infrastructure for offensive cyberspace operations. 
  •  
10.
  • Huskaj, Gazmend, et al. (författare)
  • Toward an ambidextrous framework for offensive cyberspace operations : A theory, policy and practice perspective
  • 2020
  • Ingår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020. - Reading, UK : Academic Conferences and Publishing International Limited. - 9781912764525 - 9781912764532 - 1912764539 ; , s. 243-253
  • Konferensbidrag (refereegranskat)abstract
    • This article addresses the rise in state-sponsored cyber attacks over the past three decades and proposes a new ambidextrous framework for offensive cyberspace operations. Since 1982, nation states have embarked in a fierce race to develop both clandestine and covert offensive cyber capabilities. Their intended targets range from foreign militaries and terrorist organizations to civilian populations and the critical infrastructures that they rely upon. Advancements in cyber security have, however, contributed to the discovery and attribution of offensive cyber operations, such as state-sponsored ransomware attacks, where state-built cyber capabilities have been used to attack governments, industries, academia and citizens of adversary nations. The financial and psychological costs of these ransomware attacks are today a threat to any state's national security. This article draws from academic research, the cyber military doctrines of four countries-a total of eight models from the Netherlands, Sweden, the U.S., and the U.K.-and the authors' operational experience to propose a new ambidextrous framework for offensive cyberspace operations. This ambidextrous framework for offensive cyberspace operations and the associated Cyberspace Operations Canvas are needed today in order to increase the resilience of national critical infrastructures against attacks from state-developed tools. We use the WannaCry-case to illustrate how the implementation of the ambidextrous framework for offensive cyberspace operations would result in increased awareness and understanding of the prospective cyber threats, their intended target(s), the likelihood of cascading effects and the options available by nation states to minimize them. 
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 45
Typ av publikation
tidskriftsartikel (21)
konferensbidrag (15)
bokkapitel (5)
doktorsavhandling (2)
samlingsverk (redaktörskap) (1)
rapport (1)
visa fler...
visa färre...
Typ av innehåll
refereegranskat (37)
övrigt vetenskapligt/konstnärligt (8)
Författare/redaktör
Andersson, Thomas, 1 ... (8)
Gadolin, Christian, ... (6)
Eriksson, Erik, 1977 ... (6)
Andersson, Erik, 197 ... (4)
Cregård, Anna, 1971- (4)
Olson, Maria, 1969- (3)
visa fler...
Tengblad, Stefan, 19 ... (3)
Hellström, Andreas, ... (3)
Berntson, Erik (3)
Gamalielsson, Jonas (3)
Lundell, Björn (3)
Bernhard, Iréne, 195 ... (2)
Gellerstedt, Martin, ... (2)
Thörnqvist, Christer ... (2)
Eriksson, Nomie, 195 ... (2)
Eriksson, Nomie (2)
Gråsjö, Urban, 1962- (2)
Carlström, Eric, 195 ... (1)
Lundh Snis, Ulrika, ... (1)
Rose, Jeremy (1)
Backlund, Per (1)
Söderström, Eva (1)
van Laere, Joeri (1)
Persson, Tomas (1)
Kävrestad, Joakim, 1 ... (1)
Maurin Söderholm, Ha ... (1)
Jansson, Magnus (1)
Brorström, Björn, Pr ... (1)
Gustavsson, Tomas (1)
Andersson, Thomas (1)
Berlin, Johan, 1975- (1)
Sandgren, Susanne (1)
Norström, Livia, 197 ... (1)
Andersson, Pia, 1968 (1)
Lindgren, Hans, 1950 (1)
Liff, Roy, 1951 (1)
Hellström, Anders (1)
Dahlberg, Karin (1)
Brax, Christoffer (1)
Ávila-Zúñiga Nordfje ... (1)
Dalaklis, Dimitrios (1)
Liwång, Hans, Docent ... (1)
Dansarie, Marcus, do ... (1)
Mejia, Maximo Q. (1)
Mejía Jr., Max (1)
Bank, Sakarias Einar ... (1)
Kellar, Ian (1)
McEachan, Rosemary (1)
Marsden, Greg (1)
O'Connor, Darryl (1)
visa färre...
Lärosäte
Örebro universitet (7)
Högskolan i Borås (7)
Försvarshögskolan (7)
Göteborgs universitet (6)
Stockholms universitet (4)
visa fler...
Högskolan Väst (4)
Linköpings universitet (4)
Chalmers tekniska högskola (4)
Högskolan Dalarna (4)
Högskolan i Halmstad (3)
Jönköping University (2)
Kungliga Tekniska Högskolan (1)
Mälardalens universitet (1)
Linnéuniversitetet (1)
visa färre...
Språk
Engelska (37)
Svenska (8)
Forskningsämne (UKÄ/SCB)
Samhällsvetenskap (45)
Naturvetenskap (12)
Medicin och hälsovetenskap (4)
Teknik (3)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy