Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen
POLITICS AND GOVERNANCE, pp. 41-48, 2018.
Assumptions are made by government and technology providers about the power relationships that shape the use of technological security controls and the norms under which technology usage occurs. We present a case study carried out in the North East of England that examined how a community might work together using a digital information sh...More
Full Text (Upload PDF)
PPT (Upload PPT)