Skip to main content

Consumerization of IT, Cyber-Democracy, and Cyber-Crime: The Inherent Challenges and Opportunities of Two Ends of a Continuum

  • Reference work entry
  • First Online:

Abstract

Consumerization of IT has introduced multidimensional social changes which require a mature security response that is risk-based and demands a high degree of sophistication. As technologies became democratized and societies got equipped with a plethora of high-potential technologies with which to access the Cyber-Space at any time, communication and action patterns would thoroughly change and alter our spheres of professional and private life, agenda setting, political participation, and behavioral patterns. While security issues are being put on the back burner, cyber-rebels and cyber-criminals grow in numbers. New risks and challenges ensue from this.

Therefore, this chapter assesses potential advantages and risks of the Cyber-Space in terms of Cyber-Democracy and Cyber-Crime, inclusive of the latest trend of Bring-Your-Own-Device (BYOD). It illustrates that cyber-democratic action and participation are wide concepts that extend beyond classical definitions of democratic participation and emphasizes the importance of bottom-up mobilization and agenda-setting. At the same time, it underlines how freedom of expression and Cyber-Crime interact by using the example of hacktivism and the hacker movement Anonymous.

Even if technological (device management) methods and strategies may help cope with these challenges, they are not an entirely technical issue. This is illustrated by the trend of Bring-Your-Own-Device, where issues at stake also concern legal questions as well as psychological ones (awareness, negligence, and willingness to face existing challenges). Therefore, this chapter also pays attention to the manifold legal issues which have been unsolved so far and urges for legal measures to fill the existing gaps and loopholes pointed to.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   489.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Aerospace Industries Association. (2011). Best practices for exploiting the consumerization of information technologies. Arlington.

    Google Scholar 

  • Andriole, S. J. (2012). Managing Technology in a 2.0 World. IT Professional, 14(1), 50–57.

    Article  Google Scholar 

  • Arning, M., Moos, F., & Becker, M. (2012). Vertragliche Absicherung von Bring Your Own Device. Computer und Recht, 28(9), 592.

    Article  Google Scholar 

  • Barber, B. R. (1999). Three scenarios for the future of technology and strong democracy. Political Science Quarterly, 113(4), 573–589.

    Article  Google Scholar 

  • Baron, N. S. (2008). Always on: Language in an online and mobile world. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Baskerville, R. (2011). Individual information systems as a research arena. European Journal of Information Systems, 20, 251–254.

    Article  Google Scholar 

  • Benton Foundation. (1998). Losing ground bit by bit: Low-income communities in the Information Age. Washington, D.C.: Benton Foundation and National Urban League. In. http://www.eric.ed.gov/PDFS/ED424333.pdf.

    Google Scholar 

  • Betriebsverfassungsgesetz. (2001). (BetrVG) as of 25 September Federal Gazette BGBl. I. pp. 2518. Last amendment as of 20 April 2013. Federal Gazette BGBl. I. pp. 868).

    Google Scholar 

  • Brandtzæg, P. B., & Heim, J. (2009). Why people use social network sites. In Online communities (pp. 143–152). Berlin: Springer.

    Google Scholar 

  • Bundesdatenschutzgesetz. (2003). (BDSG) as of 14 January Federal Gazette BGBl. I. pp. 66. Last amendment as of 14 August 2009. Federal Gazette BGBl. I. pp. 2814.

    Google Scholar 

  • Bundesrepublik Deutschland. (2004). Telekommunikationsgesetz (TKG) as of 22 June. Federal Gazette BGBl. I. pp. 1190. Last amendment as of 3 May 2012. Federal Gazette BGBl. I. pp. 958–1717.

    Google Scholar 

  • Bürgerliches Gesetzbuch. (2002). as of 2 January Federal Gazette BGBl. I. pp. 42, 2909. Last amendment as of 7 May 2013. Federal Gazette BGBl. I. pp. 1122.

    Google Scholar 

  • Campbell, D. F. J. (2014). Cyber-democracy. In E. G. Carayannis, D. F. J. Campbell, & M. P. Efthymiopoulos (Eds.), Cyber-development, cyber-democracy and cyber-defense. Challenges, opportunities and implications for theory, policy and practice (pp. 114–116). New York: Springer.

    Google Scholar 

  • Campbell, D. F. J., & Barth, T. D. (2009). Wie können Demokratie und Demokratiequalität gemessen werden? Modelle, Demokratie-Indices und Länderbeispiele im globalen Vergleich. SWS-Rundschau, 49(2), 208–233.

    Google Scholar 

  • Campbell, D. F. J., & Carayannis Elias, G. (2014). Explaining and comparing quality of democracy in quadruple helix structures: The quality of democracy in the United States and in Austria, challenges and opportunities for development epilogue on cyberdemocracy. In E. G. Carayannis, D. F. J. Campbell, & M. P. Efthymiopoulos (Eds.), Cyber-development, cyber-democracy and cyber-defense. Challenges, opportunities and implications for theory, policy and practice (pp. 118–146). New York: Springer.

    Google Scholar 

  • Campbell, D. F. J., Carayannis Elias, G., & Rehman, S. S. (2015). Quadruple Helix structures of quality of democracy in innovation systems: The USA, OECD countries, and EU member countries in global comparison. Journal of the Knowledge Economy, 6(3), 467–493.

    Article  Google Scholar 

  • Carayannis, E. G., & Campbell, D. F. J. (2009). “Mode 3” and “Quadruple Helix”: Toward a 21st century fractal innovation ecosystem. International Journal of Technology Management, 46(3/4), 201–234.

    Article  Google Scholar 

  • Carayannis, E. G., & Campbell, D. F. J. (2010). Triple Helix, Quadruple Helix and Quintuple Helix and how do knowledge, innovation and the environment relate to each other? A proposed framework for a trans-disciplinary analysis of sustainable development and social ecology. International Journal of Social Ecology and Sustainable Development, 1(1), 41–69. In: http://www.igi-global.com/bookstore/article.aspx?titleid=41959.

    Article  Google Scholar 

  • Carayannis, E. G., Barth, T. D., & Campbell, D. F. J. (2012). The Quintuple Helix innovation model: Global warming as a challenge and driver for innovation. Journal of Innovation and Entrepreneurship, 1(2). In: http://www.innovation-entrepreneurship.com/content/1/1/2.

    Article  Google Scholar 

  • Castells, M., & Cardoso, G. (2005). The network society. From knowledge to policy. Washington, DC: Johns Hopkins Center for Transatlantic Relations.

    Google Scholar 

  • Cavelty, M. D. (2012). Cyber(Un)Sicherheit: Grundlagen, Trends und Herausforderungen. Politische Bildung, 1, 66–87.

    Google Scholar 

  • Charter on the Fundamental Rights of the European Union. 2000/C 364/01.

    Google Scholar 

  • Chen, W., & Wellman, B. (2005). Minding the cyber-gap: The Internet and social inequality, The Blackwell companion to social inequalities. Oxford: Blackwell Publishing.

    Google Scholar 

  • Chiarella, D. J. G. (2013). Inside anonymous hacker group. A special report to the FBI Baltimore office. Lulu Press.

    Google Scholar 

  • Choucri, N. (2000). Introduction: CyberPolitics in international relations. International Political Science Review, 21(3), 243–263.

    Article  Google Scholar 

  • Clarke, J., Hidalgo, M. G., Lioy, A., Petkovic, M., Vishik, C. & Ward, J. (2012a). Consumerization of IT: Risk mitigation strategies, ENISA.

    Google Scholar 

  • Clarke, J., Hidalgo, M. G., Lioy, A., Petkovic, M., Vishik, C., & Ward, J. (2012b). Consumerization of IT: Top risks and opportunities. Responding to the Evolving Threat Environment, ENISA.

    Google Scholar 

  • Coleman, S., & Blumler, J. (2009). The Internet and democratic citizenship: Theory, practice and policy. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Collins, D. (2001). Carrier grade voice over IP. New York: McGraw-Hill.

    Google Scholar 

  • Coopers, P. W. (2011). The consumerization of IT - The next generation CIO. New York: Center for Technology and Innovation.

    Google Scholar 

  • Dahlgren, P. (2003). Reconfiguring civic culture in the new media milieu. Media and the restyling of politics: consumerism, celebrity, cynicism (pp. 151–170). London: Sage Publications.

    Google Scholar 

  • Digitales Österreich. (2012). Nationale IKT-Sicherheitsstrategie Österreich.

    Google Scholar 

  • DiMaggio, P. & Hargittai, E. (2001). From the ‘Digital Divide’ to ‘Digital Inequality’: Studying Internet use as penetration increases. Working Chapter 15, Summer 2001, Center for Arts and Cultural Policy Studies, Princeton University.

    Google Scholar 

  • DiMaggio, P., Hargittai, E., Celeste, C., & Shafer, S. (2004). Digital inequality: From unequal access to differentiated use. In Social inequality. New York: Russel Sage Foundation.

    Google Scholar 

  • Drury, A. & Absalom, R.. (2012). BYOD: An emerging market trend in more ways than one. White Chapter, Ovum, Logicalis Group.

    Google Scholar 

  • ENISA. (2009). Cloud Computing. Benefits, risks and recommendations for information security.

    Google Scholar 

  • ENISA. (2011). Survey and analysis of security parameters in cloud SLAs across the European public sector.

    Google Scholar 

  • ENISA. (2012). Critical Cloud Computing. A CIIP perspective on cloud computing services. Version 1,0.

    Google Scholar 

  • Entity Solutions. (2013). The workforce of the future embraces flexibility for knowledge workers. Blog, posted date: January 9, 2013. In: http://blog.entitysolutions.com.au/the-workforce-of-the-future-embraces-flexibility-for-knowledge-workers/.

  • Eriksson, J., & Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR) Relevant Theory? International Political Science Review/Revue internationale de science politique, 27(3), 221–244. Sage Publications.

    Google Scholar 

  • Etzkowitz, H., & Leydesdorff, L. (2000). The dynamics of innovation: From National Systems and “Mode 2” to a Triple Helix of university-industry-government relations. Research Policy, 29, 109–123.

    Article  Google Scholar 

  • European Commission. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. A Digital Agenda for Europe. COM/2010/0245.

    Google Scholar 

  • Eurostat. (2013). Haushalte, die Zugang zum Internet haben, nach Art der Verbindung.

    Google Scholar 

  • Friedman, T. L. (1999). The Lexus and the Olive Tree: Understanding globalization. New York: Random House.

    Google Scholar 

  • Gercke, M. (2008). Die Bekämpfung der Internetkriminalität als Herausforderung für die Strafverfolgungsbehörden, MMR , pp. 291–298.

    Google Scholar 

  • German Labor Court Ludwigshafen. (2009). Judgment of 30 October 2009. Case 6 TaBV 33/09.

    Google Scholar 

  • German Labor Court Nürnberg. (2011). Judgment of 24 March 2011. Case AZR 282/10.

    Google Scholar 

  • Gibbons, M., Limoges, C, Nowotny, H, Schwartzman, S, Scott, P, & Trow, M (1994). The new production of knowledge. The dynamics of science and research in contemporary societies. London: Sage.

    Google Scholar 

  • Gilbert, J. (2012). Tech Trends. Bring Your Own Device to Work. Lexicon Systems. In: http://www.lexicon-systems.com/pubs/itinsight/ITInsight1208.pdf; http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6017170&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6017170.

  • Goodrum, A., & Manion, M. (2000). Terrorism or civil disobedience: toward a hacktivist ethic. Computers and Society, 30(2), 14–19.

    Article  Google Scholar 

  • Goodrum, A., & Manion, M. (2007). Terrorism or civil disobedience: toward a hacktivist ethic. In K. E. Himma (Ed.), Internet security. Hacking, counterhacking, and society (1st ed., pp. 61–72). Jones and Bartlett Publishers.

    Google Scholar 

  • Grundgesetz für die Bundesrepublik Deutschland. (2012). Last amendment as of 11 July. Federal Gazette BGBl. I. pp. 1478ff.

    Google Scholar 

  • Hai-Jew, S.: Action potentials (2013). Extrapolating an ideology from the Anonymous Hacker Socio-Political Movement (A qualitative meta-analysis). Kansas State University, Manhattan, 2013, 51–107. In: Acricopoulou, Christina, Garipidis, Nicolaos: Digital democracy and the Impact of technology on governance and politics: New globalized practices., Information Science Reference, USA.

    Google Scholar 

  • Halavias, A. (2009). Search engine society. Cambridge: Polity.

    Google Scholar 

  • Hammond, A. L. (2001). Digitally empowered development. Council of Foreign Relations: Foreign Affairs.

    Google Scholar 

  • Hansen, M., & Meissner, S. (2007). Verkettung digitaler Identitäten (1st ed.). Schleswig-Holstein: Unabhängiges Landeszentrum für Datenschutz.

    Google Scholar 

  • Harris, J. G., Ives, B., & Jungla, I. (2011). The Genie Is Out of the Bottle: Managing the Infiltration of Consumer IT Into the Workforce. Accenture Institute for High Performance. In: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture-Managing-the-infiltration-of-Consumer-IT-into-the-workforce.pdf.

  • Heckmann, D. (2011). Open Government – Retooling Democracy for the 21st Century. 44th Hawai International Conference on Systems Sciences (HICSS).

    Google Scholar 

  • Himma, K. E. (2007). Hacking as a politically motivated digital civil disobediance. Is hacktivism morally justified? In K. E. Himma (Ed.), Internet security. Hacking, counterhacking, and society (1st ed., pp. 73–98). Jones and Bartlett Publishers.

    Google Scholar 

  • Infosecurity Magazine. (2012). Crystal ball time: Top 2013 risks include cyber war, cloud and BYOD.

    Google Scholar 

  • International Standards Organisation. (2011). ISO/IEC 27005.

    Google Scholar 

  • International Telecommunication Unions. (2008). Series X: Data networks, open system communications and security. Telecommunication security. Overview of. Recommendation ITU-T X.1205. 04/2008.

    Google Scholar 

  • Kaneshige, T. (2012). BYOD - Five hidden costs to a bring-your-own-device progamme. Computerworld UK – The Voice of IT Management.

    Google Scholar 

  • Karamagioli, E. (2013). Transparency in the open government era: Friends or foes. In C. Acricopoulou & N. Garipidis (Eds.), Digital democracy and the impact of technology on governance and politics: New globalized practices. Paris: Paris 8 University. Information Science Reference, USA.

    Google Scholar 

  • Klein, A., Vöhringer, B., Krcmar, H. (1999). Cyberdemocracy – Neue Chance für Demokratie? In: http://www.winfobase.de/lehrstuhl/publikat.nsf/intern01/076790EF7CDE06A84125686C002CCFCD/$FILE/99-19.pdf.

  • Klöpfer, M., & Neun, A. (2000). Rechtsfragen der europäischen Informationsgesellschaft, EuR 2000, 512ff.

    Google Scholar 

  • Kompetenzzentrum Internetgesellschaft. (2013). Geschäftsstelle Rundfunk und Telekom Regulierungs - GmbH, (ed.). Stand IKT in Österreich, 1. Bericht des Kompetenzzentrum Internetgesellschaft.

    Google Scholar 

  • Leigh, D. & Harding, L. (2011). WikiLeaks. Inside Julian Assange’s war on secrecy. The Guardian.

    Google Scholar 

  • Leiner, B. M., Cerf, V. G., Clark, D. D., Kahn, R. E., Kleinrock, L., Lynch, D. C., Postel, J., Roberts, L. G., & Wolff, S. (1997). A brief history of the Internet. Internet Society. In: http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet#Leiner.

  • Lennon, R. G. (2012). Bring your own device (BYOD) with Cloud 4 education. Letterkenny Institute of Technology. In Splash ’12: Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity. New York. pp. 171–180.

    Google Scholar 

  • Livingstone, S., Ólafsson, K., & Staksrud, E. (2011). Social networking, age and privacy. London: EU Kids Online. http://eprints.lse.ac.uk/35849/1/Social%20networking%2C%20age%20and%20privacy%20%28LSERO.pdf.

    Google Scholar 

  • Loader, B. D., & Mercea, D. (2011). INTRODUCTION NETWORKING DEMOCRACY? Social media innovations and participatory politics. Information, Communication & Society, 14(6), 757–769.

    Article  Google Scholar 

  • Maier, R., Thahmann, S., Bayer, F., Krüger, M., Nitz, H., & Sandow, A. (2008). Flexible office: Assignment of office space to enhance knowledge work productivity. Journal of Universal Computer Science, 14(4), 508–525.

    Google Scholar 

  • Markopoulou, A.P., Tobagi, F. A., & Karam, M. J. (2002). Assessment of VoIP quality over Internet backbones, 1, 150–159.

    Google Scholar 

  • Markopoulou, A. P., Tobagi, F. A., & Karam, M. J. (2003). A. P. (2003). Assessing the quality of voice communications over internet backbones. IEEEACM Transactions on Networking, 11(5), 747–760.

    Article  Google Scholar 

  • Martinez, E. & Rajlkashmi, S. (2012).Workplace 2030 Workplace 2030. People Matters. In: http://www.peoplematters.in/articles/focus-areas-13/what-is-hot/workplace-2030.

  • Mell, P. & Grance, T. (2011). The NIST Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology. U.S. Department of Commerce. In: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.

  • Mitterlehner, B. (2013). Daseinsvorsorge als europäischer Begriff. In: Der europäische Antagonismus – Binnenmarkt und Daseinsvorsorge. Schriftenreihe Daseinsvorsorge Vol 1. Public Social Responsibility Institut.

    Google Scholar 

  • Mitterlehner, B. (2014). Cyber-democracy and cybercrime: Two sides of the same coin. In E. G. Carayannis, D. F. J. Campbell, & M. P. Efthymiopoulos (Eds.), Cyber-development, cyber-democracy and cyber-defense. Challenges, opportunities and implications for theory, policy and practice (pp. 207–230). New York/Heidelberg/Dordrecht/London: Springer.

    Google Scholar 

  • Mitterlehner, B. & Barth, T. D. (2013). Daseinsvorsorge: Grundaufgabe und Begriff. In: Der europäische Antagonismus – Binnenmarkt und Daseinsvorsorge. Schriftenreihe Daseinsvorsorge Vol 1. Public Social Responsibility Institut.

    Google Scholar 

  • Moore, G. (2011). Systems of engagement and the future of enterprise IT- A sea change in enterprise IT. Silver Spring: AIIM.

    Google Scholar 

  • Moschella, D., Neal, D., Opperman, P., & Taylor, J. (2004). The “Consumerization” of Information Technology. El Segundo: CSC. http://www.smaele.nl/edocs/Taylor-Consumerization-2004.pdf.

    Google Scholar 

  • Murdoch, R., Harris, J. G. & Devore, G. (2010). Can Enterprise IT Survive the Meteor of Consumer Technology? Accenture Institute for High Performance. In: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Can_Enterprise_IT_Survive_the_Meteor.pdf

  • Niehaves, B., Köffer, S., Ortbach, K. & Katschewitz, S. (2012). Towards an IT Consumerization Theory - A Theory and Practice Review. In: Working Chapters, European Research Center for Information Systems No. 13. Eds.: Becker, J. et al. Münster. July 2012.

    Google Scholar 

  • Nye, J. S. (2010). Cyber power. Belfer Center for Science and International Affairs: Havard Kennedy School.

    Google Scholar 

  • Olsen, R. K. (2009). The DemoCratic Workplace. Empowering People (demos) to Rule (cratos) their own workplace. Organizing Individual and Group Decision Processes through Personal Competence-based Authority.

    Google Scholar 

  • Oppliger, R. (2011). Security and Privacy in an Online World. In: IEEE Computer. Vol 44, Issue 9.

    Article  Google Scholar 

  • Papacharissi, Z. (2010). A private sphere: Democracy in a digital age. Cambridge: Polity.

    Google Scholar 

  • Pollert, D. (2014). Arbeitnehmer-Smartphone als Betriebsmittel – ein kostensparendes Modell? NZA-Beilage , pp. 152–155.

    Google Scholar 

  • Poster, M. (1995). Cyber democracy: Internet and the public sphere. Irvine: University of California. http://www.hnet.uci.edu/mposter/writings/democ.html.

    Google Scholar 

  • Poster, M. (2001). What’s the Matter with the Internet, Electronic Mediations Vol. 3, Minnesota.

    Google Scholar 

  • Rettberg, J. W. (2008). Blogging. Cambridge: Polity Press.

    Google Scholar 

  • Rose, C. (2013). BYOD: An Examination of Bring Your Own Device in Business. Review of Business Information Systems – Second Quarter 2013. Vol 17 (2). The Clute Institute. In.

    Google Scholar 

  • Sambharya, R. B., Kumaraswamy, A., & Banerjee, S. (2005). Information technologies and the future of the multinational enterprise. Journal of International Management, 11(2), 143–161.

    Article  Google Scholar 

  • Schaffry, A. (2013). Security, Kosten und Verwaltung. Die größten Probleme bei BYOD. Munich: CIO, IDG Business Media GmbH.

    Google Scholar 

  • Squires, J. (1998). In different voices: Deliberative democracy and aestheticist politics. In The politics of postmodernity (pp. 126–146). Cambridge: Cambridge University Press.

    Chapter  Google Scholar 

  • Stork, J., Steup, S., & Satschek, P. (2012). Betrachtung sicherheitsrelevanter Aspekte zur Nutzung privater ITK im Rahmen des “Bring your own Device” Konzeptes. Hochschule für Oekonomie & Management. Duisburg. 13 July 2012.

    Google Scholar 

  • Telemediengesetz. (2007). (Telemedia Act) of 26 February . Federal Gazette I p. 179), last amendedment: 17 July 2015.

    Google Scholar 

  • Treaty on European Union. (2012). Consolidated version. Official Journal of 26 October 2012, C 326, pp 13ff.

    Google Scholar 

  • Treaty on the Functioning of the European Union. (2012). Consolidated version. Official Journal of 26 October 2012, C 326, pp 47ff.

    Google Scholar 

  • Voegeli-Wenzl, J. Internet Governance am Beispiel der Internet Corporation of Assigned Names and Numbers (ICANN), GRUR Int 2007. pp. 807–816.

    Google Scholar 

  • Williams, R. W. (2006). Democracy, cyberspace, and the body, 2006. http://clogic.eserver.org/2006/williams.html

  • Xavier, R. F., & Campbell, D. F. J. (2014). The effects of cyberdemocracy on the Middle East: Egypt and Iran. In E. G. Carayannis, D. F. J. Campbell, & M. P. Efthymiopoulos (Eds.), Cyber-development, cyber-democracy and cyber-defense. Challenges, opportunities and implications for theory, policy and practice (pp. 147–173). New York/Heidelberg/Dordrecht/London: Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Birgit Eigelsreiter .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Eigelsreiter, B. (2018). Consumerization of IT, Cyber-Democracy, and Cyber-Crime: The Inherent Challenges and Opportunities of Two Ends of a Continuum. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-09069-6_9

Download citation

Publish with us

Policies and ethics