Mika Kerttunen

Mika Kerttunen
Cyber Policy Institute

About

11
Publications
1,236
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17
Citations
Citations since 2016
8 Research Items
16 Citations
201620172018201920202021202201234567
201620172018201920202021202201234567
201620172018201920202021202201234567
201620172018201920202021202201234567

Publications

Publications (11)
Chapter
Focusing on the interrelationship between international peace and stability, and ways of achieving both in the context of ICTs, we will offer a model of stability of cyberspace. We begin by examining the concepts of ‘stability’ and ‘strategic stability’ as understood with regard to international security. This conceptual analysis is followed a pres...
Book
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are in...
Article
Rejecting the inflationary use of the term “war” – which apart from anything else plays down the horrors of an actual war – Eneken Tikk and Mika Kerttunen advocate a definition of war that clearly follows Clausewitz. Neither current nor anticipated future cyber activities are subsumed by this concept, because – then as now, and most likely in the f...
Research
This research applies a normative reading to 106 national cybersecurity strategies, most of them adopted after the cyberattacks against Estonia in 2007, an event that marked a strong shift toward securitisation of the use of information and communication technologies (ICTs). The paper identifies and discusses countries’ qualifications of afforded a...
Research
Detailed account of the published national cyber or information security strategies on three factors or aspects: objectives and issues; principles; norms.
Article
Full-text available
This research questions the value of empiricism and historical case studies in higher level officer education. It will instead emphasize the need and importance of a rationalist approach to knowledge. It will outline a tentative example of an abstract approach to case studies. By doing this the author seeks to enhance the education of abstract thin...
Article
This paper examines the insurgency in Nepal (1996–2008) from a military theoretical point of view. It looks at the insurgency from André Beaufre's exterior/interior framework, which is modified to match postmodern conflicts. Simultaneously the importance of the political is underlined. The author critically examines the relevance of the Maoist labe...
Article
This thesis examines the interrelationship and dynamics between the Indian United Progressive Alliance government’s foreign policy and its nuclear weapons policy. The purpose of the study is to situate nuclear policy within a foreign policy framework, and the fundamental research problem is thus how does the Indian nuclear policy reflect and respon...

Network

Cited By