Eneken Tikk

Eneken Tikk
Tallinn University of Technology | TTU · Department of Computer Systems

About

11
Publications
766
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
35
Citations

Publications

Publications (11)
Chapter
Focusing on the interrelationship between international peace and stability, and ways of achieving both in the context of ICTs, we will offer a model of stability of cyberspace. We begin by examining the concepts of ‘stability’ and ‘strategic stability’ as understood with regard to international security. This conceptual analysis is followed a pres...
Book
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are in...
Article
Rejecting the inflationary use of the term “war” – which apart from anything else plays down the horrors of an actual war – Eneken Tikk and Mika Kerttunen advocate a definition of war that clearly follows Clausewitz. Neither current nor anticipated future cyber activities are subsumed by this concept, because – then as now, and most likely in the f...
Research
This research applies a normative reading to 106 national cybersecurity strategies, most of them adopted after the cyberattacks against Estonia in 2007, an event that marked a strong shift toward securitisation of the use of information and communication technologies (ICTs). The paper identifies and discusses countries’ qualifications of afforded a...
Research
Detailed account of the published national cyber or information security strategies on three factors or aspects: objectives and issues; principles; norms.
Chapter
Cybersecurity has, without doubt, become a global issue. There is hardly a State that has not experienced a cyberattack, disruption of national or corporate networks, loss of data, or various forms of cybercrime. Moreover, with the deepening and widening penetration of information and communication technologies (ICTs) penetrating in the society, th...
Article
Full-text available
In the era of information, administration of personal data protection mingles with expectations of access to information as well as the overall sense of cyber (in)security. A failure to appropriately consider the system of data processing relationships easily reduces personal data protection to assurances in letter. The complexity of contemporary d...

Network

Cited By