SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "AMNE:(SAMHÄLLSVETENSKAP Statsvetenskap) ;lar1:(his)"

Sökning: AMNE:(SAMHÄLLSVETENSKAP Statsvetenskap) > Högskolan i Skövde

  • Resultat 1-10 av 40
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Andersson, Erik, 1979- (författare)
  • Situational political socialization : a normative approach to young people’s adoption and acquisition of political preferences and skills
  • 2015
  • Ingår i: Journal of Youth Studies. - : Routledge. - 1367-6261 .- 1469-9680. ; 18:8, s. 967-983
  • Tidskriftsartikel (refereegranskat)abstract
    • Research on young people’s political socialization has had an adult-centered top–down bias in which young people are considered incomplete and in need of the right upbringing. The article attempts to balance this bias. The aim is to introduce and argue for another normative approach – situational political socialization. Four theoretical elements constitute its basis: (1) the political, (2) contingency (the principle of the public sphere), (3) space and place, and (4) situation. In the contingent western digital media society marked by cultural dissemination, individualism, and the erosion of traditional institutions, situational political socialization represents a normative basis for a research approach which is open, action-oriented and contextualized, viewing young people as political actors in their own right.
  •  
2.
  • Cregård, Anna, 1971, et al. (författare)
  • Perceptions of trust in physician-managers
  • 2015
  • Ingår i: Leadership in Health Services. - : Emerald Group Publishing Limited. - 1751-1879 .- 1751-1887 .- 0952-6862. ; 28:4, s. 281-297
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose – The purpose of this paper is to explore the dual role of physician-managers through an examination of perceptions of trust and distrust in physician-managers. The healthcare sector needs physicians to lead. Physicians in part-time managerial positions who continue their medical practice are called part-time physician-managers. This paper explores this dual role through an examination of perceptions of trust and distrust in physician-managers. Design/methodology/approach – The study takes a qualitative research approach in which interviews and focus group discussions with physician-managers and nurse-managers provide the empirical data. An analytical model, with the three elements of ability, benevolence and integrity, was used in the analysis of trust and distrust in physician-managers. Findings – The respondents (physician-managers and nurse-managers) perceived both an increase and a decrease in physicians’ trust in the physician-managers. Because elements of distrust were more numerous and more severe than elements of trust, the physician-managers received negative perceptions of their role. Research limitations/implications – This paper’s findings are based on perceptions of perceptions. The physicians were not interviewed on their trust and distrust of physician-managers. Practical implications – The healthcare sector must pay attention to the diverse expectations of the physician-manager role that is based on both managerial and medical logics. Hospital management should provide proper support to physician-managers in their dual role to ensure their willingness to continue to assume managerial responsibilities. Originality/value – The paper takes an original approach in its research into the dual role of physician-managers who work under two conflicting logics: the medical logic and the managerial logic. The focus on perceived trust and distrust in physician-managers is a new perspective on this complicated role.
  •  
3.
  • Ávila-Zúñiga Nordfjeld, Adriana, 1977-, et al. (författare)
  • Proposing a Mathematical Dynamic Model to Develop a National Maritime Security Assessment and Build a National Maritime Security Plan
  • 2023
  • Ingår i: Journal of Maritime Research. - : Universidad de Cantabria. - 1697-4840 .- 1697-9133. ; 20:3, s. 123-132
  • Tidskriftsartikel (refereegranskat)abstract
    • A proper assessment of maritime security risks at the national level is crucial to a national maritime security plan (NMSP) in order to secure the concerned country’s ports, vessels and territorial sea. Thus, the importance of implementing a national maritime security assessment (NMSA) to counter security threats and ensure the continuity of national and international trade. The most important set of international regulations concerning maritime security is the International Ship and Port Facility Security (ISPS) Code, which includes revision, approval and control of compliance of the Port Facility Security Plan (PFSP), which shall be based upon the Port Facility Security Assessment (PFSA). This paper proposes a mathematical dynamic model that calculates in real time the residual risk for the whole country and each of its ports by adapting and expanding the formula and procedures established in the Code, which since it has already been implemented around the world, gives the opportunity to take advantage of this quantitative solution to administrate maritime security risks on a nation-wide basis and create an effective national maritime security plan, which would allow the concerned authorities to improve situational awareness and adapt to security changes through a better planning of human, economic and material resources to deter security threats. The model was tested with the use of five encoded categories as countries, each of them with three ports, which encompassed three port facilities. The results indicate that this methodology is easy to implement and widespread use of that model could strength robustness in national security.
  •  
4.
  • Huskaj, Gazmend, et al. (författare)
  • An anticipatory ethical analysis of offensive cyberspace operations
  • 2020
  • Ingår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020. - Reading : Academic Conferences and Publishing International Limited. - 9781912764525 - 9781912764532 - 1912764539 ; , s. 512-520
  • Konferensbidrag (refereegranskat)abstract
    • This article presents the ethical issues using offensive cyberspace operations. Previously enshrouded in secrecy, and now becoming the new norm, countries are using offensive cyberspace operations to achieve their strategic interests. Russia has conducted multiple offensive operations targeting Estonia, Georgia and the Ukraine; Hamas has targeted Israeli targets; and Iran has been targeting U.S. targets. The response to these operations has varied; Estonia and Georgia struggled with the attacks and were unable to respond while Ukraine tried to respond but the response was inefficient. Israel's response on Hamas offensive operations was an air strike on a building with Hamas Cyber-operatives. Iran shot down a U.S. Drone over the Strait of Hormuz, and the U.S. initially intended to respond with kinetic capabilities in the form of missile strikes. However, in the last minute, the U.S. chose to respond with offensive cyberspace operations targeting the Iranian missile systems. This last-minute change of response choosing between kinetic or cyber capabilities shows a need to further investigate how offensive cyberspace operations can be used against which targets from an ethical perspective. This article applies anticipatory ethical analysis on U.S. offensive operations in the “Global Hawk”-case when Iran shot down a U.S. drone over the Strait of Hormuz. Anticipatory ethical analysis looks at emerging technologies and their potential consequences. Offensive cyberspace operations present a range of possibilities, which include lowering the risk of harm to cyber operatives' lives belonging to the responding nation. However, a response can also be kinetic. Therefore, the analysis of the “Global Hawk”-case is compared with the Israeli-air strike of the building of Hamas Cyber-operatives. The authors argue that applying anticipatory ethical analysis on offensive operations and kinetic operations assist decision makers in choosing response actions to re-establish deterrence through the use of offensive cyberspace operations. 
  •  
5.
  • Huskaj, Gazmend, et al. (författare)
  • Anticipatory ethics for vulnerability disclosure
  • 2020
  • Ingår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020. - Reading : Academic Conferences and Publishing International Limited. - 9781912764525 - 1912764539 - 9781912764532 ; , s. 254-261
  • Konferensbidrag (refereegranskat)abstract
    • This article presents the ethical dilemma related to under what circumstances vulnerabilities should be disclosed. Vulnerabilities exist in hardware and software, and can be as a consequence of programming errors or design flaws. Threat actors can exploit these vulnerabilities to gain otherwise unintended access to information systems, resources and/or stored information. In other words, they can be used to impact the confidentiality, integrity and availability of information in information systems. As a result, various types of vulnerabilities are highly sought after since they enable this type of access. The most highly sought are so-called “zero-day”-vulnerabilities. These are vulnerabilities that exist but are unknown, and when exploited, enable one way of entry into a system that is not thought possible. This is also why zero-day vulnerabilities are very popular among criminal organizations, states and state-sponsored advanced persistent threats. The other side of the coin is when a state identifies a zero-day, and ends up in the ethical dilemma of whether to release the news and inform the vendor to patch it, i.e. close the vulnerability, or to use it for offensive or intelligence purposes. This article employs these distinctions to apply anticipatory ethics in the Stuxnet-case. Stuxnet was a computer software that was allegedly developed by the U.S. together with Israel to disrupt Iran's development of uranium for their nuclear program. More exactly, it was developed to disable the uranium centrifuges used to enrich uranium. To achieve this, Stuxnet exploited four zero-day vulnerabilities and, according to some experts, managed to delay Iran's nuclear program by one to two-years, forcing them to the negotiation table. Using vulnerabilities like zero-days presents opportunities but also risks. The results of the application of anticipatory ethics to the Stuxnet case are then compared with the “Osirak”-case and the “al-Kibar”-case. Osirak was the nuclear reactor in Iraq and was bombed in 1981; al-Kibar was the nuclear reactor being built up in Syria, also bombed in 2007. 
  •  
6.
  • Huskaj, Gazmend, et al. (författare)
  • Designing attack infrastructure for offensive cyberspace operations
  • 2020
  • Ingår i: Proceedings of the 19th European Conference on Cyber Warfare and Security. - Reading, UK : Academic Conferences and Publishing International Limited. - 9781912764617 - 9781912764624 ; , s. 473-482
  • Konferensbidrag (refereegranskat)abstract
    • This article addresses the question ‘what considerations should be taken by cyber commands when designing attack infrastructure for offensive operations?’. Nation-states are investing in equipping units tasked to conduct offensive cyberspace operations. Generating ‘deny, degrade, disrupt, destroy or deceive’ effects on adversary targets requires to move from own (‘green’), through neutral (‘grey’), to adversary (‘red’) cyberspace. The movement is supported by attack infrastructure for offensive cyberspace operations. In this paper, we review the professional and scientific literature identifying the requirements for designing an attack infrastructure. Next, we develop and define the concepts for attack infrastructure. Finally, we explain and describe the considerations for designing attack infrastructure. The research question is answered by proposing a framework for designing attack infrastructure. This framework is vital for military and civilian commands designing attack infrastructure for offensive cyberspace operations. 
  •  
7.
  • Huskaj, Gazmend, et al. (författare)
  • Toward an ambidextrous framework for offensive cyberspace operations : A theory, policy and practice perspective
  • 2020
  • Ingår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020. - Reading, UK : Academic Conferences and Publishing International Limited. - 9781912764525 - 9781912764532 - 1912764539 ; , s. 243-253
  • Konferensbidrag (refereegranskat)abstract
    • This article addresses the rise in state-sponsored cyber attacks over the past three decades and proposes a new ambidextrous framework for offensive cyberspace operations. Since 1982, nation states have embarked in a fierce race to develop both clandestine and covert offensive cyber capabilities. Their intended targets range from foreign militaries and terrorist organizations to civilian populations and the critical infrastructures that they rely upon. Advancements in cyber security have, however, contributed to the discovery and attribution of offensive cyber operations, such as state-sponsored ransomware attacks, where state-built cyber capabilities have been used to attack governments, industries, academia and citizens of adversary nations. The financial and psychological costs of these ransomware attacks are today a threat to any state's national security. This article draws from academic research, the cyber military doctrines of four countries-a total of eight models from the Netherlands, Sweden, the U.S., and the U.K.-and the authors' operational experience to propose a new ambidextrous framework for offensive cyberspace operations. This ambidextrous framework for offensive cyberspace operations and the associated Cyberspace Operations Canvas are needed today in order to increase the resilience of national critical infrastructures against attacks from state-developed tools. We use the WannaCry-case to illustrate how the implementation of the ambidextrous framework for offensive cyberspace operations would result in increased awareness and understanding of the prospective cyber threats, their intended target(s), the likelihood of cascading effects and the options available by nation states to minimize them. 
  •  
8.
  • Huskaj, Gazmend (författare)
  • What is a Substantial Contribution to a Research Project in Offensive Cyberspace Operations that Merits Co-Authorship?
  • 2022
  • Ingår i: Proceedings of the 17th International Conference on Cyber Warfare and Security. - Reading, UK : ACI Academic Conferences International. - 9781914587276 - 9781914587269 ; , s. 385-394
  • Konferensbidrag (refereegranskat)abstract
    • This article reviews the question what is a substantial contribution to a research project in offensive cyberspace operations that merits co-authorship? Frustrations and conflicts may develop during research projects when researchers with different backgrounds, cultures, research fields and expertise decide to conduct research and produce and publish those results. The focus of this paper is a research project in cyberspace operations while taking into account the power-dynamics inherent in the academic system and how these can affect the co-authorship of research products. First, the purpose with doing research is presented. Next, three models of the research process are reviewed, describing their differences and similarities. Then, linguistic analysis is applied on a set of terms in guidelines for co-authorship described in some different universities in Sweden. The results present a model for a research project in offensive cyberspace operations and based on the output of the linguistic analysis, the model is used to quantify and describe what a substantial contribution is in three scenarios that merits co-authorship. 
  •  
9.
  • Kävrestad, Joakim, 1989-, et al. (författare)
  • How the Civilian Sector in Sweden Perceive Threats from Offensive Cyberspace Operations
  • 2021
  • Ingår i: Proceedings of the 20th European Conference on Cyber Warfare and Security. - Reading : ACI Academic Conferences International. - 9781912764433 - 9781912764990 ; , s. 499-506
  • Konferensbidrag (refereegranskat)abstract
    • The presence of state-sponsored actors executing offensive cyberspace operations (OCO) has been made evident in recent years. The term offensive cyberspace operations encompass a range of different actions, including cyberespionage, disinformation campaigns, spread of malware and more. Based on an analysis of past events, it is evident that state-sponsored actors are causing harm to the civilian sector using OCO. However, the degree to which civilian organizations understand the threat from state-sponsored actors is currently unknown. This research seeks to provide new a better understanding of OCO and their impact on civilian organizations. To highlight this domain, the case of the threat actor Advanced Persistent Threat 1 (APT1) is presented, and its impact on three civilian organizations discussed. Semi-structured interviews were used to research how the threats from OCO and state-sponsored actors are perceived by civilian organizations. First, a computational literature review was used to get an overview of related work and establish question themes. Next, the question themes were used to develop questions for the interview guide, followed by separate interviews with five security professionals working in civilian organizations. The interviews were analysed using thematic coding and the identified themes summarized as the result of this research. The results show that all respondents are aware of the threat from OCO, but they perceive it in different ways. While all respondents acknowledge state-sponsored actors at a threat agent executing OCO, some respondent’s argue that state-sponsored actors are actively seeking footholds in systems for future use while others state that the main goal of state-sponsored actors is to steal information. This suggests that the understanding of the threat imposed by OCO is limited, or at least inconsistent, among civilian security experts. As an interview study, the generalisability of this research is limited. However, it does demonstrate that the civilian society does not share a common view of the threat from state-sponsored actors and OCO. As such, it demonstrates a need for future research in this domain and can serve as a starting point for such projects.
  •  
10.
  • Andersson, Erik, 1979-, et al. (författare)
  • Delaktighet som pedagogik och demokratiskt värde för fullföljandet av studier – kunskapsbidrag från ett utvecklingsprojekt
  • 2015
  • Ingår i: Utbildning och Lärande / Education and Learning. - Skövde : Högskolan i Skövde. - 2001-4554. ; 9:1, s. 80-100
  • Tidskriftsartikel (refereegranskat)abstract
    • Participation as a pedagogy and democratic value turns out to be a critical element in students’ completion of school. Completed education is a regional development project in which a survey has been conducted in order to identify successful strategies to promote completed education in school. In an analysis, in the context of the survey, with an emphasis on school and participation as a pedagogy and democratic value, several findings are shown. It turns out that the importance of participation manifests itself through an emphasis on the societal and democratic mission of school; school ethos; the value praxis of school; pedagogical approach; and viewing the pupil as capable. It is, in more detail, shown that it is particularly crucial to understand the completion of school as a pedagogical problem; create sustainable institutional structures not bound to one person; and to make sure that students are participants in their own studies.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 40
Typ av publikation
tidskriftsartikel (17)
konferensbidrag (15)
bokkapitel (4)
doktorsavhandling (2)
samlingsverk (redaktörskap) (1)
rapport (1)
visa fler...
visa färre...
Typ av innehåll
refereegranskat (33)
övrigt vetenskapligt/konstnärligt (7)
Författare/redaktör
Andersson, Thomas, 1 ... (8)
Gadolin, Christian, ... (6)
Eriksson, Erik, 1977 ... (6)
Huskaj, Gazmend (6)
Olson, Maria, 1969- (3)
Andersson, Erik, 197 ... (3)
visa fler...
Hellström, Andreas, ... (3)
Cregård, Anna, 1971- (3)
Bernhard, Iréne, 195 ... (2)
Gellerstedt, Martin, ... (2)
Thörnqvist, Christer ... (2)
Tengblad, Stefan, 19 ... (2)
Eriksson, Nomie, 195 ... (2)
Eriksson, Nomie (2)
Berntson, Erik (2)
Gråsjö, Urban, 1962- (2)
Gamalielsson, Jonas (2)
Lundell, Björn (2)
Lifvergren, Svante, ... (2)
Rose, Jeremy (1)
Backlund, Per (1)
Söderström, Eva (1)
van Laere, Joeri (1)
Maurin Söderholm, Ha ... (1)
Brorström, Björn, Pr ... (1)
Andersson, Thomas (1)
Kävrestad, Joakim, 1 ... (1)
Sandgren, Susanne (1)
Norström, Livia, 197 ... (1)
Liff, Roy, 1951 (1)
Hellström, Anders (1)
Lundh Snis, Ulrika, ... (1)
Ávila-Zúñiga Nordfje ... (1)
Dalaklis, Dimitrios (1)
Liwång, Hans, Docent ... (1)
Dansarie, Marcus, do ... (1)
Mejia, Maximo Q. (1)
Mejía Jr., Max (1)
Bank, Sakarias Einar ... (1)
Kellar, Ian (1)
McEachan, Rosemary (1)
Marsden, Greg (1)
O'Connor, Darryl (1)
Coventry, Pete (1)
Bergström, Erik, 197 ... (1)
Åhlfeldt, Rose-Mhari ... (1)
Anteryd, Fredrik (1)
Lifvergren, Svante (1)
Woolfson, Charles (1)
Circa, Cristina (1)
visa färre...
Lärosäte
Örebro universitet (5)
Högskolan i Borås (5)
Försvarshögskolan (5)
Linköpings universitet (4)
Göteborgs universitet (3)
visa fler...
Stockholms universitet (2)
Högskolan Väst (2)
Jönköping University (2)
Chalmers tekniska högskola (2)
Kungliga Tekniska Högskolan (1)
Högskolan Dalarna (1)
visa färre...
Språk
Engelska (33)
Svenska (7)
Forskningsämne (UKÄ/SCB)
Samhällsvetenskap (40)
Naturvetenskap (11)
Teknik (3)
Medicin och hälsovetenskap (3)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy