Skip to main content

Technological Megashift and the EU: Threats, Vulnerabilities and Fragmented Responsibilities

  • Chapter
  • First Online:
The European Union and the Technology Shift

Abstract

This chapter addresses the technological megashift and implications for security and accountability within the EU. Digitalised interconnectivity of increasingly ‘embedded’ systems, infrastructures and societal functions are megashift features. Although the EU hardly lacks technological strategies, accountability structures beg improvement, and there are multiple expert groups with insufficient coordination and societal focus. The EU suffers from techno-optimism—coupled to powerful objectives of fuelling economic growth—which can lead to broadly conceived and represented security issues falling in shadow and struggles between interests being inadequately addressed. This chapter analyses how the EU deals with the megashift with respect to threats, surveillance systems, infrastructural vulnerability and public-private accountability. It is suggested that the EU take (i) a holistic grip on the megashift and implications, (ii) abandon optimistic techno-determinism for nuanced and contextual understanding and (iii) avoid outsourcing management of sensitive data and critical infrastructures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Akaev, A., & Pantin, V. (2014). Technological Innovations and Future Shifts in International Politics. International Studies Quarterly, 58(4), 867–872.

    Article  Google Scholar 

  • Beck, U. (1992). From Industrial Society to the Risk Society: Questions of Survival, Social Structure and Ecological Enlightenment. Theory, Culture & Society, 9(1), 97–123.

    Article  Google Scholar 

  • Brouwers, E. (2016). Data Surveillance and Border Control in the EU: Balancing Efficiency and Legal Protection. In T. Balzacq & S. Carrera (Eds.), Security Versus Freedom? A Challenge for Europe’s Future (pp. 137–154). London: Routledge.

    Google Scholar 

  • Castells, M. (1996). The Information Society. Oxford: Oxford University Press.

    Google Scholar 

  • Council of the European Union. (2015). Council Conclusions on the Renewed European Union Internal Security Strategy 2015–2020. 10 June 2015. 9798/15.

    Google Scholar 

  • Dubberly, H., & Pangaro, P. (2015). Cybernetics and Design: Conversations for Action. Cybernetics and Human Knowing, 22(2–3), 73–82.

    Google Scholar 

  • EEAS. (2016). A Global Strategy for the European Union’s Foreign and Security Policy. Retrieved 20 September 2020 from https://eeas.europa.eu/sites/eeas/files/eugs_review_web_0.pdf

  • EEAS. (2019). The European Union’s Global Strategy – Three Years On, Looking Forward. Retrieved 20 September 2020 from https://eeas.europa.eu/sites/eeas/files/eu_global_strategy_2019.pdf

  • Eltantawy, N., & Wiest, J. B. (2011). The Arab Spring: Social Media in the Egyptian Revolution: Reconsidering Resource Mobilization Theory. International Journal of Communication, 5(18), 1207–1224.

    Google Scholar 

  • Eriksson, J., & Giacomello, G. (2009). Who Controls the Internet? International Studies Review (The Forum), 11, 205–230.

    Article  Google Scholar 

  • Eriksson, J., & Lagerkvist, J. (2016). Cyber Security in Sweden and China: Going on the Attack? In K. Friis & J. Ringsmose (Eds.), Conflict in Cyber Space (pp. 99–110). New York: Routledge.

    Google Scholar 

  • European Commission. (2010). The EU Internal Security Strategy in Action – Five Steps Towards a More Secure Europe, 22 November 2010. COM(2010) 673 Final.

    Google Scholar 

  • European Commission. (2015a). The European Agenda on Security, 28 April 2015, COM(2015) 185 Final.

    Google Scholar 

  • European Commission. (2015b). A Digital Single Market Strategy for Europe, 6 May 2015. COM/2015/0192 Final.

    Google Scholar 

  • European Commission. (2020). H2020 Programme: Guidelines for the Classification of Information in Research Projects. Retrieved 20 September 2020, from https://ec.europa.eu/research/participants/data/ref/h2020/other/hi/secur/h2020-hi-guide-classif_en.pdf

  • Foucault, M. (1979). Discipline and Punish: The Birth of the Prison. New York: Vintage Books.

    Google Scholar 

  • Fukuyama, F. (1989). The End of History? The National Interest, 16, 3–18.

    Google Scholar 

  • Haraway, D. (1991). Simians, Cyborgs and Women: The Reinvention of Nature. New York: Routledge.

    Google Scholar 

  • Hudson, V. M. (Ed.). (1991). Artificial Intelligence and International Politics. Reprinted in 2018. London: Routledge.

    Google Scholar 

  • Kranzberg, M. (1986). Technology and History: Kranzberg’s Laws. Technology and Culture, 27(3), 544–560.

    Article  Google Scholar 

  • Lasswell, H. D. (1936). Politics: Who Gets What, When, How. New York: McGraw-Hill.

    Google Scholar 

  • McCarthy, D. R. (Ed.). (2018). Technology and World Politics. London: Routledge.

    Google Scholar 

  • Morozov, E. (2012). The Net Delusion: The Dark Side of Internet Freedom. New York: PublicAffairs.

    Google Scholar 

  • Newlove-Eriksson, L. (2020). Accountability and Patchwork Governance in Urban Rail Interchanges: Junctions of London Crossrail and Stockholm City Line Compared. Public Works, Management & Policy, 25(2), 105–131.

    Article  Google Scholar 

  • Newlove-Eriksson, L., & Eriksson, J. (2013). Governance Beyond the Global: Who Controls the Extraterrestrial? Globalizations, 10(2), 277–292.

    Article  Google Scholar 

  • Newlove-Eriksson, L., Giacomello, G., & Eriksson, J. (2018). The Invisible Hand? Critical Information Infrastructures, Commercialisation and National Security. The International Spectator, 53(2), 124–140.

    Article  Google Scholar 

  • Keohane, R. O., &Nye, J. S. (Eds.). (1971). Transnational Relations and World Politics. Cambridge: Harvard University Press.

    Google Scholar 

  • Perrow, C. (1999). Normal Accidents: Living with High-Risk Technologies (Rev. ed.). Princeton: Princeton University Press.

    Google Scholar 

  • Rosenau, J. N., & Singh, J. P. (Eds.). (2002). Information Technologies and Global Politics: The Changing Scope of Power and Governance. New York: SUNY Press.

    Google Scholar 

  • Schwab, K. (2017). The Fourth Industrial Revolution. New York: Crown Business.

    Google Scholar 

  • SOU. (1996). SOU 1996:181. In S. Öman (Ed.), Megabyte. Stockholm: Ungdomens IT-råd.

    Google Scholar 

  • Vermeulejn, G., & Lievens, E. (Eds.). (2018). Data Protection and Privacy Under Pressure. Antwerp: Maklu.

    Google Scholar 

  • Wolfsfeld, G., Segev, E., & Sheafer, T. (2013). Social Media and the Arab Spring: Politics Comes First. The International Journal of Press/Politics, 18(2), 115–137.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lindy M. Newlove-Eriksson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Newlove-Eriksson, L.M., Eriksson, J. (2021). Technological Megashift and the EU: Threats, Vulnerabilities and Fragmented Responsibilities. In: Bakardjieva Engelbrekt, A., Leijon, K., Michalski, A., Oxelheim, L. (eds) The European Union and the Technology Shift. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-63672-2_2

Download citation

Publish with us

Policies and ethics