The Invisible Hand? Critical Information Infrastructures, Commercialisation and National Security

Autor: Johan Eriksson, Lindy Newlove-Eriksson, Giampiero Giacomello
Přispěvatelé: Newlove-Eriksson, Lindy, Giacomello, Giampiero, Eriksson, Johan
Rok vydání: 2018
Předmět:
National security
PPP
privatisation
Studier av offentlig förvaltning
0211 other engineering and technologies
02 engineering and technology
Public administration
remote management
OPS
PFI
IBM
Outsourcing
Information och Kommunikation Teknologier
Swedish ICT scandal
IT-skandal
050602 political science & public administration
privatisering
offentlig-privat samverkan
kritisk infrastruktur
Remote management
Other Social Sciences
Information and Communication technologies
Sweden
critical infrastructures
utkontraktering
021110 strategic
defence & security studies

Transport Agency
Public Administration Studies
business.industry
05 social sciences
computer netwroks
Svensk IKT-skandal
0506 political science
public-private partnership
Public–private partnership
Invisible hand
private finance initiative
Political Science and International Relations
Critical information infrastructure
Annan samhällsvetenskap
computer networks
Business
Transportstyrelsen
Critical infrastructures
public-private partnership
privatisation
computer networks
outsourcing
remote management
Swedish ICT scandal
Zdroj: The International Spectator. 53:124-140
ISSN: 1751-9721
0393-2729
DOI: 10.1080/03932729.2018.1458445
Popis: Corporatisation of critical information infrastructure (CII) is rooted inthe ‘privatisation wave’ of the 1980s-90s, when the ground was laidfor outsourcing public utilities. Despite well-known risks relating toreliability, resilience, and accountability, commitment to efficiencyimperatives have driven governments to outsource key publicservices and infrastructures. A recent illustrative case with enormousimplications is the 2017 Swedish ICT scandal, where outsourcing ofCII caused major security breaches. With the transfer of the SwedishTransport Agency’s ICT system to IBM and subcontractors, classifieddata and protected identities were made accessible to non-vettedforeign private employees – sensitive data could thus now be inanyone’s hands. This case clearly demonstrates accountability gapsthat can arise in public-private governance of CII. QC 20220228
Databáze: OpenAIRE