Abstract
Consumerization of IT has introduced multidimensional social changes which require a mature security response that is risk-based and demands a high degree of sophistication. As technologies became democratized and societies got equipped with a plethora of high-potential technologies with which to access the Cyber-Space at any time, communication and action patterns would thoroughly change and alter our spheres of professional and private life, agenda setting, political participation, and behavioral patterns. While security issues are being put on the back burner, cyber-rebels and cyber-criminals grow in numbers. New risks and challenges ensue from this.
Therefore, this chapter assesses potential advantages and risks of the Cyber-Space in terms of Cyber-Democracy and Cyber-Crime, inclusive of the latest trend of Bring-Your-Own-Device (BYOD). It illustrates that cyber-democratic action and participation are wide concepts that extend beyond classical definitions of democratic participation and emphasizes the importance of bottom-up mobilization and agenda-setting. At the same time, it underlines how freedom of expression and Cyber-Crime interact by using the example of hacktivism and the hacker movement Anonymous.
Even if technological (device management) methods and strategies may help cope with these challenges, they are not an entirely technical issue. This is illustrated by the trend of Bring-Your-Own-Device, where issues at stake also concern legal questions as well as psychological ones (awareness, negligence, and willingness to face existing challenges). Therefore, this chapter also pays attention to the manifold legal issues which have been unsolved so far and urges for legal measures to fill the existing gaps and loopholes pointed to.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Aerospace Industries Association. (2011). Best practices for exploiting the consumerization of information technologies. Arlington.
Andriole, S. J. (2012). Managing Technology in a 2.0 World. IT Professional, 14(1), 50–57.
Arning, M., Moos, F., & Becker, M. (2012). Vertragliche Absicherung von Bring Your Own Device. Computer und Recht, 28(9), 592.
Barber, B. R. (1999). Three scenarios for the future of technology and strong democracy. Political Science Quarterly, 113(4), 573–589.
Baron, N. S. (2008). Always on: Language in an online and mobile world. Oxford: Oxford University Press.
Baskerville, R. (2011). Individual information systems as a research arena. European Journal of Information Systems, 20, 251–254.
Benton Foundation. (1998). Losing ground bit by bit: Low-income communities in the Information Age. Washington, D.C.: Benton Foundation and National Urban League. In. http://www.eric.ed.gov/PDFS/ED424333.pdf.
Betriebsverfassungsgesetz. (2001). (BetrVG) as of 25 September Federal Gazette BGBl. I. pp. 2518. Last amendment as of 20 April 2013. Federal Gazette BGBl. I. pp. 868).
Brandtzæg, P. B., & Heim, J. (2009). Why people use social network sites. In Online communities (pp. 143–152). Berlin: Springer.
Bundesdatenschutzgesetz. (2003). (BDSG) as of 14 January Federal Gazette BGBl. I. pp. 66. Last amendment as of 14 August 2009. Federal Gazette BGBl. I. pp. 2814.
Bundesrepublik Deutschland. (2004). Telekommunikationsgesetz (TKG) as of 22 June. Federal Gazette BGBl. I. pp. 1190. Last amendment as of 3 May 2012. Federal Gazette BGBl. I. pp. 958–1717.
Bürgerliches Gesetzbuch. (2002). as of 2 January Federal Gazette BGBl. I. pp. 42, 2909. Last amendment as of 7 May 2013. Federal Gazette BGBl. I. pp. 1122.
Campbell, D. F. J. (2014). Cyber-democracy. In E. G. Carayannis, D. F. J. Campbell, & M. P. Efthymiopoulos (Eds.), Cyber-development, cyber-democracy and cyber-defense. Challenges, opportunities and implications for theory, policy and practice (pp. 114–116). New York: Springer.
Campbell, D. F. J., & Barth, T. D. (2009). Wie können Demokratie und Demokratiequalität gemessen werden? Modelle, Demokratie-Indices und Länderbeispiele im globalen Vergleich. SWS-Rundschau, 49(2), 208–233.
Campbell, D. F. J., & Carayannis Elias, G. (2014). Explaining and comparing quality of democracy in quadruple helix structures: The quality of democracy in the United States and in Austria, challenges and opportunities for development epilogue on cyberdemocracy. In E. G. Carayannis, D. F. J. Campbell, & M. P. Efthymiopoulos (Eds.), Cyber-development, cyber-democracy and cyber-defense. Challenges, opportunities and implications for theory, policy and practice (pp. 118–146). New York: Springer.
Campbell, D. F. J., Carayannis Elias, G., & Rehman, S. S. (2015). Quadruple Helix structures of quality of democracy in innovation systems: The USA, OECD countries, and EU member countries in global comparison. Journal of the Knowledge Economy, 6(3), 467–493.
Carayannis, E. G., & Campbell, D. F. J. (2009). “Mode 3” and “Quadruple Helix”: Toward a 21st century fractal innovation ecosystem. International Journal of Technology Management, 46(3/4), 201–234.
Carayannis, E. G., & Campbell, D. F. J. (2010). Triple Helix, Quadruple Helix and Quintuple Helix and how do knowledge, innovation and the environment relate to each other? A proposed framework for a trans-disciplinary analysis of sustainable development and social ecology. International Journal of Social Ecology and Sustainable Development, 1(1), 41–69. In: http://www.igi-global.com/bookstore/article.aspx?titleid=41959.
Carayannis, E. G., Barth, T. D., & Campbell, D. F. J. (2012). The Quintuple Helix innovation model: Global warming as a challenge and driver for innovation. Journal of Innovation and Entrepreneurship, 1(2). In: http://www.innovation-entrepreneurship.com/content/1/1/2.
Castells, M., & Cardoso, G. (2005). The network society. From knowledge to policy. Washington, DC: Johns Hopkins Center for Transatlantic Relations.
Cavelty, M. D. (2012). Cyber(Un)Sicherheit: Grundlagen, Trends und Herausforderungen. Politische Bildung, 1, 66–87.
Charter on the Fundamental Rights of the European Union. 2000/C 364/01.
Chen, W., & Wellman, B. (2005). Minding the cyber-gap: The Internet and social inequality, The Blackwell companion to social inequalities. Oxford: Blackwell Publishing.
Chiarella, D. J. G. (2013). Inside anonymous hacker group. A special report to the FBI Baltimore office. Lulu Press.
Choucri, N. (2000). Introduction: CyberPolitics in international relations. International Political Science Review, 21(3), 243–263.
Clarke, J., Hidalgo, M. G., Lioy, A., Petkovic, M., Vishik, C. & Ward, J. (2012a). Consumerization of IT: Risk mitigation strategies, ENISA.
Clarke, J., Hidalgo, M. G., Lioy, A., Petkovic, M., Vishik, C., & Ward, J. (2012b). Consumerization of IT: Top risks and opportunities. Responding to the Evolving Threat Environment, ENISA.
Coleman, S., & Blumler, J. (2009). The Internet and democratic citizenship: Theory, practice and policy. Cambridge: Cambridge University Press.
Collins, D. (2001). Carrier grade voice over IP. New York: McGraw-Hill.
Coopers, P. W. (2011). The consumerization of IT - The next generation CIO. New York: Center for Technology and Innovation.
Dahlgren, P. (2003). Reconfiguring civic culture in the new media milieu. Media and the restyling of politics: consumerism, celebrity, cynicism (pp. 151–170). London: Sage Publications.
Digitales Österreich. (2012). Nationale IKT-Sicherheitsstrategie Österreich.
DiMaggio, P. & Hargittai, E. (2001). From the ‘Digital Divide’ to ‘Digital Inequality’: Studying Internet use as penetration increases. Working Chapter 15, Summer 2001, Center for Arts and Cultural Policy Studies, Princeton University.
DiMaggio, P., Hargittai, E., Celeste, C., & Shafer, S. (2004). Digital inequality: From unequal access to differentiated use. In Social inequality. New York: Russel Sage Foundation.
Drury, A. & Absalom, R.. (2012). BYOD: An emerging market trend in more ways than one. White Chapter, Ovum, Logicalis Group.
ENISA. (2009). Cloud Computing. Benefits, risks and recommendations for information security.
ENISA. (2011). Survey and analysis of security parameters in cloud SLAs across the European public sector.
ENISA. (2012). Critical Cloud Computing. A CIIP perspective on cloud computing services. Version 1,0.
Entity Solutions. (2013). The workforce of the future embraces flexibility for knowledge workers. Blog, posted date: January 9, 2013. In: http://blog.entitysolutions.com.au/the-workforce-of-the-future-embraces-flexibility-for-knowledge-workers/.
Eriksson, J., & Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR) Relevant Theory? International Political Science Review/Revue internationale de science politique, 27(3), 221–244. Sage Publications.
Etzkowitz, H., & Leydesdorff, L. (2000). The dynamics of innovation: From National Systems and “Mode 2” to a Triple Helix of university-industry-government relations. Research Policy, 29, 109–123.
European Commission. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. A Digital Agenda for Europe. COM/2010/0245.
Eurostat. (2013). Haushalte, die Zugang zum Internet haben, nach Art der Verbindung.
Friedman, T. L. (1999). The Lexus and the Olive Tree: Understanding globalization. New York: Random House.
Gercke, M. (2008). Die Bekämpfung der Internetkriminalität als Herausforderung für die Strafverfolgungsbehörden, MMR , pp. 291–298.
German Labor Court Ludwigshafen. (2009). Judgment of 30 October 2009. Case 6 TaBV 33/09.
German Labor Court Nürnberg. (2011). Judgment of 24 March 2011. Case AZR 282/10.
Gibbons, M., Limoges, C, Nowotny, H, Schwartzman, S, Scott, P, & Trow, M (1994). The new production of knowledge. The dynamics of science and research in contemporary societies. London: Sage.
Gilbert, J. (2012). Tech Trends. Bring Your Own Device to Work. Lexicon Systems. In: http://www.lexicon-systems.com/pubs/itinsight/ITInsight1208.pdf; http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6017170&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6017170.
Goodrum, A., & Manion, M. (2000). Terrorism or civil disobedience: toward a hacktivist ethic. Computers and Society, 30(2), 14–19.
Goodrum, A., & Manion, M. (2007). Terrorism or civil disobedience: toward a hacktivist ethic. In K. E. Himma (Ed.), Internet security. Hacking, counterhacking, and society (1st ed., pp. 61–72). Jones and Bartlett Publishers.
Grundgesetz für die Bundesrepublik Deutschland. (2012). Last amendment as of 11 July. Federal Gazette BGBl. I. pp. 1478ff.
Hai-Jew, S.: Action potentials (2013). Extrapolating an ideology from the Anonymous Hacker Socio-Political Movement (A qualitative meta-analysis). Kansas State University, Manhattan, 2013, 51–107. In: Acricopoulou, Christina, Garipidis, Nicolaos: Digital democracy and the Impact of technology on governance and politics: New globalized practices., Information Science Reference, USA.
Halavias, A. (2009). Search engine society. Cambridge: Polity.
Hammond, A. L. (2001). Digitally empowered development. Council of Foreign Relations: Foreign Affairs.
Hansen, M., & Meissner, S. (2007). Verkettung digitaler Identitäten (1st ed.). Schleswig-Holstein: Unabhängiges Landeszentrum für Datenschutz.
Harris, J. G., Ives, B., & Jungla, I. (2011). The Genie Is Out of the Bottle: Managing the Infiltration of Consumer IT Into the Workforce. Accenture Institute for High Performance. In: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture-Managing-the-infiltration-of-Consumer-IT-into-the-workforce.pdf.
Heckmann, D. (2011). Open Government – Retooling Democracy for the 21st Century. 44th Hawai International Conference on Systems Sciences (HICSS).
Himma, K. E. (2007). Hacking as a politically motivated digital civil disobediance. Is hacktivism morally justified? In K. E. Himma (Ed.), Internet security. Hacking, counterhacking, and society (1st ed., pp. 73–98). Jones and Bartlett Publishers.
Infosecurity Magazine. (2012). Crystal ball time: Top 2013 risks include cyber war, cloud and BYOD.
International Standards Organisation. (2011). ISO/IEC 27005.
International Telecommunication Unions. (2008). Series X: Data networks, open system communications and security. Telecommunication security. Overview of. Recommendation ITU-T X.1205. 04/2008.
Kaneshige, T. (2012). BYOD - Five hidden costs to a bring-your-own-device progamme. Computerworld UK – The Voice of IT Management.
Karamagioli, E. (2013). Transparency in the open government era: Friends or foes. In C. Acricopoulou & N. Garipidis (Eds.), Digital democracy and the impact of technology on governance and politics: New globalized practices. Paris: Paris 8 University. Information Science Reference, USA.
Klein, A., Vöhringer, B., Krcmar, H. (1999). Cyberdemocracy – Neue Chance für Demokratie? In: http://www.winfobase.de/lehrstuhl/publikat.nsf/intern01/076790EF7CDE06A84125686C002CCFCD/$FILE/99-19.pdf.
Klöpfer, M., & Neun, A. (2000). Rechtsfragen der europäischen Informationsgesellschaft, EuR 2000, 512ff.
Kompetenzzentrum Internetgesellschaft. (2013). Geschäftsstelle Rundfunk und Telekom Regulierungs - GmbH, (ed.). Stand IKT in Österreich, 1. Bericht des Kompetenzzentrum Internetgesellschaft.
Leigh, D. & Harding, L. (2011). WikiLeaks. Inside Julian Assange’s war on secrecy. The Guardian.
Leiner, B. M., Cerf, V. G., Clark, D. D., Kahn, R. E., Kleinrock, L., Lynch, D. C., Postel, J., Roberts, L. G., & Wolff, S. (1997). A brief history of the Internet. Internet Society. In: http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet#Leiner.
Lennon, R. G. (2012). Bring your own device (BYOD) with Cloud 4 education. Letterkenny Institute of Technology. In Splash ’12: Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity. New York. pp. 171–180.
Livingstone, S., Ólafsson, K., & Staksrud, E. (2011). Social networking, age and privacy. London: EU Kids Online. http://eprints.lse.ac.uk/35849/1/Social%20networking%2C%20age%20and%20privacy%20%28LSERO.pdf.
Loader, B. D., & Mercea, D. (2011). INTRODUCTION NETWORKING DEMOCRACY? Social media innovations and participatory politics. Information, Communication & Society, 14(6), 757–769.
Maier, R., Thahmann, S., Bayer, F., Krüger, M., Nitz, H., & Sandow, A. (2008). Flexible office: Assignment of office space to enhance knowledge work productivity. Journal of Universal Computer Science, 14(4), 508–525.
Markopoulou, A.P., Tobagi, F. A., & Karam, M. J. (2002). Assessment of VoIP quality over Internet backbones, 1, 150–159.
Markopoulou, A. P., Tobagi, F. A., & Karam, M. J. (2003). A. P. (2003). Assessing the quality of voice communications over internet backbones. IEEEACM Transactions on Networking, 11(5), 747–760.
Martinez, E. & Rajlkashmi, S. (2012).Workplace 2030 Workplace 2030. People Matters. In: http://www.peoplematters.in/articles/focus-areas-13/what-is-hot/workplace-2030.
Mell, P. & Grance, T. (2011). The NIST Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology. U.S. Department of Commerce. In: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
Mitterlehner, B. (2013). Daseinsvorsorge als europäischer Begriff. In: Der europäische Antagonismus – Binnenmarkt und Daseinsvorsorge. Schriftenreihe Daseinsvorsorge Vol 1. Public Social Responsibility Institut.
Mitterlehner, B. (2014). Cyber-democracy and cybercrime: Two sides of the same coin. In E. G. Carayannis, D. F. J. Campbell, & M. P. Efthymiopoulos (Eds.), Cyber-development, cyber-democracy and cyber-defense. Challenges, opportunities and implications for theory, policy and practice (pp. 207–230). New York/Heidelberg/Dordrecht/London: Springer.
Mitterlehner, B. & Barth, T. D. (2013). Daseinsvorsorge: Grundaufgabe und Begriff. In: Der europäische Antagonismus – Binnenmarkt und Daseinsvorsorge. Schriftenreihe Daseinsvorsorge Vol 1. Public Social Responsibility Institut.
Moore, G. (2011). Systems of engagement and the future of enterprise IT- A sea change in enterprise IT. Silver Spring: AIIM.
Moschella, D., Neal, D., Opperman, P., & Taylor, J. (2004). The “Consumerization” of Information Technology. El Segundo: CSC. http://www.smaele.nl/edocs/Taylor-Consumerization-2004.pdf.
Murdoch, R., Harris, J. G. & Devore, G. (2010). Can Enterprise IT Survive the Meteor of Consumer Technology? Accenture Institute for High Performance. In: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Can_Enterprise_IT_Survive_the_Meteor.pdf
Niehaves, B., Köffer, S., Ortbach, K. & Katschewitz, S. (2012). Towards an IT Consumerization Theory - A Theory and Practice Review. In: Working Chapters, European Research Center for Information Systems No. 13. Eds.: Becker, J. et al. Münster. July 2012.
Nye, J. S. (2010). Cyber power. Belfer Center for Science and International Affairs: Havard Kennedy School.
Olsen, R. K. (2009). The DemoCratic Workplace. Empowering People (demos) to Rule (cratos) their own workplace. Organizing Individual and Group Decision Processes through Personal Competence-based Authority.
Oppliger, R. (2011). Security and Privacy in an Online World. In: IEEE Computer. Vol 44, Issue 9.
Papacharissi, Z. (2010). A private sphere: Democracy in a digital age. Cambridge: Polity.
Pollert, D. (2014). Arbeitnehmer-Smartphone als Betriebsmittel – ein kostensparendes Modell? NZA-Beilage , pp. 152–155.
Poster, M. (1995). Cyber democracy: Internet and the public sphere. Irvine: University of California. http://www.hnet.uci.edu/mposter/writings/democ.html.
Poster, M. (2001). What’s the Matter with the Internet, Electronic Mediations Vol. 3, Minnesota.
Rettberg, J. W. (2008). Blogging. Cambridge: Polity Press.
Rose, C. (2013). BYOD: An Examination of Bring Your Own Device in Business. Review of Business Information Systems – Second Quarter 2013. Vol 17 (2). The Clute Institute. In.
Sambharya, R. B., Kumaraswamy, A., & Banerjee, S. (2005). Information technologies and the future of the multinational enterprise. Journal of International Management, 11(2), 143–161.
Schaffry, A. (2013). Security, Kosten und Verwaltung. Die größten Probleme bei BYOD. Munich: CIO, IDG Business Media GmbH.
Squires, J. (1998). In different voices: Deliberative democracy and aestheticist politics. In The politics of postmodernity (pp. 126–146). Cambridge: Cambridge University Press.
Stork, J., Steup, S., & Satschek, P. (2012). Betrachtung sicherheitsrelevanter Aspekte zur Nutzung privater ITK im Rahmen des “Bring your own Device” Konzeptes. Hochschule für Oekonomie & Management. Duisburg. 13 July 2012.
Telemediengesetz. (2007). (Telemedia Act) of 26 February . Federal Gazette I p. 179), last amendedment: 17 July 2015.
Treaty on European Union. (2012). Consolidated version. Official Journal of 26 October 2012, C 326, pp 13ff.
Treaty on the Functioning of the European Union. (2012). Consolidated version. Official Journal of 26 October 2012, C 326, pp 47ff.
Voegeli-Wenzl, J. Internet Governance am Beispiel der Internet Corporation of Assigned Names and Numbers (ICANN), GRUR Int 2007. pp. 807–816.
Williams, R. W. (2006). Democracy, cyberspace, and the body, 2006. http://clogic.eserver.org/2006/williams.html
Xavier, R. F., & Campbell, D. F. J. (2014). The effects of cyberdemocracy on the Middle East: Egypt and Iran. In E. G. Carayannis, D. F. J. Campbell, & M. P. Efthymiopoulos (Eds.), Cyber-development, cyber-democracy and cyber-defense. Challenges, opportunities and implications for theory, policy and practice (pp. 147–173). New York/Heidelberg/Dordrecht/London: Springer.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this entry
Cite this entry
Eigelsreiter, B. (2018). Consumerization of IT, Cyber-Democracy, and Cyber-Crime: The Inherent Challenges and Opportunities of Two Ends of a Continuum. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-09069-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-09069-6_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09068-9
Online ISBN: 978-3-319-09069-6
eBook Packages: Economics and FinanceReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences