SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Eriksson Johan) ;mspu:(chapter)"

Sökning: WFRF:(Eriksson Johan) > Bokkapitel

  • Resultat 1-10 av 71
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Eriksson, Daniel, et al. (författare)
  • Tic-Tac-Textiles: A waiting game
  • 2010. - 11
  • Ingår i: IT+Textiles. - (2010 reprint) Borås, Sweden: Centre for Textile Research. (2005 first edition) Helsinki: IT Press/Edita : .. - 9518267936 ; , s. 66-75
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • In light of the imminent arrival of ambient intelligence and smart textiles, the design of computational and textile things are rapidly converging. Substantial attention is directed towards the new technical possibilities of these new materials, but less effort seems to be put into the challenging task of re-thinking the use of textiles and computational technology as design materials on the basis of the complex mixture of traditions, perspectives, concepts and methods that result from such convergence. These challenges and opportunities inspired the IT+Textiles design research program. Trying to dissolve the distinction between technologies and design materials, we have combined textile and interaction design, textile and electrical engineering, philosophy and the behavioural sciences to find new approaches to issues of use and context, form and aesthetics, practice and theory. In this book, we describe the collection of materials, examples, methods and concepts we have developed in our investigation of this emerging design space.
  •  
2.
  • Eriksson, Johan, Professor, 1967-, et al. (författare)
  • Cyber security in Sweden and China : Going on the Attack?
  • 2016
  • Ingår i: Conflict in Cyberspace. - London : Routledge. - 9781138947788 - 9781315669878 ; , s. 83-94
  • Bokkapitel (refereegranskat)abstract
    • Introduction In recent years Western pundits and politicians have played up the specter of a new digital divide, between opposing democratic and authoritarian information orders, by at times even labeled an Internet cold war 2.0. The term digital divide originally explained unequal access to the Internet and digital information resources inside and between countries (Norris 2001). The new digital divide was not about unequal access to the Internet and digital information resources. It was political in nature due to different conceptions of liberties, freedom of expression, and how information flows should be governed nationally and internationally. Most notably, former US Secretary of State, Hillary Clinton, in her by now well-known talk in Washington DC on January 21, 2010, emphasized that an “information curtain” had descended between free and closed nations of the world (Clinton 2010). Clinton, invoked and echoed Winston Churchill’s famous words on the iron curtain that came to divide Europe for more than fifty years when she in Washington DC said: “an information curtain now separates the free from the unfree.” Two years later, the International Telecommunication Union’s (ITU) World Conference on International Communications (WCIT-12) meeting, which negotiated a revision to the 1988 international telecommunications regulations (ITR), broke down on vague wordings on Internet governance in the final resolution on December 14, 2012. Subsequently, The Economist magazine ran the headline “A digital cold war?” (Dubai 2012). However, the leaks by Edward Snowden in June 2013 radically changed the nature of the debate on Internet freedom and Internet security, although black-and-white dichotomies between the “free world” and the “unfree world” remain remarkably persistent, even after Snowden, a former employee with a contractor of the National Security Agency of the United States, revealed the enormous extent of surveillance and monitoring of individual citizens worldwide and in the USA. As statements by US congressmen about Chinese spyware infiltrating the mobile phones of Hong Kong activists illustrate, hypocrisy and myth making about “good” and “evil” surveillance is very much alive (Farrell and Finnemore 2013). Internet governance issues, however, are not black-and-white uncomplicated issues on either side of the imagined cyber curtain separating the free from the unfree (cf. Stalla-Bourdin et al. 2014). Russia, China and Iran are autocratic but not totalitarian countries. They showcase complex authoritarian-capitalist settings, which in the cases of Russia and Iran entail constrained but, nevertheless, electoral politics. Unlike totalitarian North Korea, these countries are not isolated from the rest of the world, but are deeply involved in social and economic globalization. And in China, interestingly, the state cannot fully trust private commercial companies to fully comply with the party-state’s intent to censor and monitor citizens’ communication over social networks. The remainder of this chapter discusses Swedish and Chinese cyber-security strategy, focusing on threat perceptions, cyber-security methods and organization. Why compare Sweden and China? The main reason is that while both have relatively advanced information societies and cyber-security measures, they represent on the one hand a parliamentary democracy, and on the other an autocratic political system. While many other democracies and autocracies could have been chosen, Sweden and China are particularly interesting given their difference in size and position in the global system. Also, while the USA is a leading cyber power, and thus in a sense a major geopolitical counterpart of China, we are not here analyzing the balance of cyber power, but are mainly interested in differences and similarities between democracy and autocracy concerning cyber security. And while US cyber-security policies have been extensively discussed elsewhere (Mueller and Kuehn 2013; Dunn Cavelty 2008), there is hardly any studies on Swedish cyber security (for exceptions, see Eriksson 2001a, 2001b, 2004). Moreover, our particular expertise on Swedish and Chinese cyber politics is a pragmatic reason for studying these rather than any other countries. It should also be made clear that we conceive of cyber security in a broad sense. Cyber security, as we understand it, includes defensive measures against cyber attacks such as firewalls and CERT (Computer Emergency Response Team) functions, offensive measures such as computer hacking and denial of service attacks, and cyber surveillance and cyber espionage (Andreasson 2012; Dunn Cavelty 2008).
  •  
3.
  •  
4.
  •  
5.
  • Newlove-Eriksson, Lindy, et al. (författare)
  • Technological Megashift and the EU : Threats, Vulnerabilities, and Fragmented Responsibilities
  • 2021. - 1
  • Ingår i: The European Union and the Technological Shift. - Cham : Palgrave Macmillan. - 9783030636715 - 9783030636722 ; , s. 27-55
  • Bokkapitel (refereegranskat)abstract
    • This chapter addresses the technological megashift and implications for security and accountability within the EU. Digitalised interconnectivity of increasingly ‘embedded’ systems, infrastructures and societal functions are megashift features. Although the EU hardly lacks technological strategies, accountability structures beg improvement, and there are multiple expert groups with insufficient coordination and societal focus. The EU suffers from techno-optimism—coupled to powerful objectives of fuelling economic growth—which can lead to broadly conceived and represented security issues falling in shadow and struggles between interests being inadequately addressed. This chapter analyses how the EU deals with the megashift with respect to threats, surveillance systems, infrastructural vulnerability and public-private accountability. It is suggested that the EU take (i) a holistic grip on the megashift and implications, (ii) abandon optimistic techno-determinism for nuanced and contextual understanding and (iii) avoid outsourcing management of sensitive data and critical infrastructures.
  •  
6.
  • Alvehus, Johan, et al. (författare)
  • Critical theories
  • 2020
  • Ingår i: Theories and perspectives in business administration. - 9789144127088 ; , s. 325-350
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
7.
  •  
8.
  •  
9.
  • Bengtsson-Palme, Johan, 1985, et al. (författare)
  • Metaxa, overview
  • 2013
  • Ingår i: Encyclopedia of Metagenomics. - Berlin : Springer.
  • Bokkapitel (refereegranskat)abstract
    • Metaxa is a software tool for extracting full-length and partial ribosomal small subunit (SSU; 16S/18S/12S) sequences from metagenomic datasets, and for classifying the extracted sequences to taxonomic domains and organelle of origin. Metaxa is freely available from http://microbiology.se/software/metaxa
  •  
10.
  • Dittrich, Yvonne, et al. (författare)
  • End User Development and Infrastructuring : Sustaining Organizational Innovation Capabilities
  • 2017
  • Ingår i: New Perspectives in End-User Development. - Cham : Springer. - 9783319602905 - 9783319602912 ; , s. 165-206
  • Bokkapitel (refereegranskat)abstract
    • Today, both businesses and public organizations need to be able to innovate and continuously develop their services and processes along with the underpinning IT infrastructure. We argue that End-User Development (EUD) becomes a necessary part of the innovation capability that underpins such service and process innovation. The book chapter presents a meta-analysis of two case studies. The analysis shows how the need for change in both cases brought about an organizationally established sustainable practice of EUD, where empowered employees cooperated with IT professionals in the development and evolution of an IT infrastructure based on flexible technologies. The chapter further discusses how such practices are supported by (participatory) organizational IT management structures and processes. Finally, it discusses how EUD in this way contributes to the innovation capability of the organization. The conclusion points to transferability of the insights gained and provides suggestions for future research.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 71
Typ av publikation
Typ av innehåll
refereegranskat (36)
övrigt vetenskapligt/konstnärligt (33)
populärvet., debatt m.m. (2)
Författare/redaktör
Eriksson, Johan (18)
Eriksson, Lena (1)
Noreen, Erik (1)
Jäntti, Markus (1)
Eriksson, Daniel (1)
Johansson, Erik (1)
visa fler...
Hansson, Magnus (1)
Edman, Johan (1)
Bengtsson-Palme, Joh ... (1)
Nilsson, R. Henrik, ... (1)
Trygg, Johan (1)
Nilsson, Fredrik (1)
Langel, Ülo (1)
Eriksson, Kristina M ... (1)
Hansson, Ola (1)
Reuter, Marta (1)
Karlsson, Mikael (1)
Söderholm, Patrik (1)
Lund, Emma (1)
Pettersson, Fredrik (1)
Hornborg, Alf (1)
Bonnedahl, Karl Joha ... (1)
Madison, Guy, 1961- (1)
Glimskär, Anders (1)
Ekvall, Tomas, 1963 (1)
Finnveden, Göran (1)
Eriksson, Samuel (1)
Östman, Sofi (1)
Engelmark, Roger (1)
Wallin, Jan-Erik (1)
Eriksson, Charli (1)
Eriksson, Linnea (1)
Eriksson, Lars, 1970 ... (1)
Bäckman, Johan (1)
Svensson, Johan (1)
Eriksson Sollenberg, ... (1)
Buckland, Philip I., ... (1)
Linderholm, Johan, 1 ... (1)
Lagerkvist, Johan (1)
Gilek, Michael (1)
Alvehus, Johan (1)
Bay, Charlotta (1)
Eriksson-Zetterquist ... (1)
Sandberg, Andreas (1)
Ljunggren Söderman, ... (1)
Worbin, Linda (1)
Eriksson, Johan G. (1)
Eriksson, Ola (1)
Lane, Paul, 1957- (1)
Robinson, John K. (1)
visa färre...
Lärosäte
Södertörns högskola (28)
Uppsala universitet (20)
Umeå universitet (5)
Kungliga Tekniska Högskolan (4)
Lunds universitet (4)
Stockholms universitet (3)
visa fler...
Försvarshögskolan (3)
Örebro universitet (2)
Chalmers tekniska högskola (2)
RISE (2)
Sveriges Lantbruksuniversitet (2)
Göteborgs universitet (1)
Luleå tekniska universitet (1)
Högskolan Väst (1)
Linköpings universitet (1)
Malmö universitet (1)
Högskolan Dalarna (1)
Kungl. Musikhögskolan (1)
visa färre...
Språk
Engelska (50)
Svenska (20)
Odefinierat språk (1)
Forskningsämne (UKÄ/SCB)
Samhällsvetenskap (36)
Humaniora (17)
Naturvetenskap (8)
Teknik (4)
Medicin och hälsovetenskap (3)
Lantbruksvetenskap (2)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy