Received:
2018-10-18 | Accepted:
2019-01-20 | Published:
2019-03-30
Title
Industry 4.0 and national security: the phenomenon of disruptive technology
Abstract
Fourth Industrial Revolution, based on digital platforms is characterized by a convergence of technologies that is blurring the lines between the physical, digital, and biological spheres. These phenomeon disrupts patterns of development and opens new paths to development. (WEFORUM. 2018) Digital technology development presuppose methodological challenges not only to business or individual interest, but holistic approach to national security issues. Hybrid threats, economic crises, social inequalities, and labor migration are among the main challenges of global security. What are possible manifestations of disruptive technology in national security interest in the broader sense? Is it possible timely to identify and react to threats to competitivness, "job killer" or law system? Critical infrastructure are parameter, which identifies assets or system as element of security. Topic reveal interaction between disruptive technology and critical infrastructure in the context of national security. Authors argued, that the theoretical insights, obtained by document analysis, classification, critical analysis, abstraction methods will be useful in practical use, to provide expert knowledge and a deeper understanding manifestations of disruptive technology in security issues at all levels.
Keywords
critical infrastructure, disruptive technology, fourth industrial revolution, national security
JEL classifications
O33
URI
http://jssidoi.org/jesi/article/302
DOI
Pages
1528-1535
This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License
Journal title
Entrepreneurship and Sustainability Issues
Volume
6
Number
3
Issue date
March 2019
Issue DOI
ISSN
ISSN 2345-0282 (online)
Publisher
VšĮ Entrepreneurship and Sustainability Center, Vilnius, Lithuania
Cited

Article views & downloads
HTML views: 4730 | PDF downloads: 1686
References
Bank of Lithuania (2018), Lithuania’s Central Bank to Issue the World’s First Digital Collector Coin, [online]. [cit.2018-09-22]. Available at: https://www.lb.lt/en/news/lithuania-s-central-bank-to-issue-the-world-s-first-digital-collector-coin
Search via ReFindit
Birkinshaw, J., Visnjic, I., Best, S. (2018). Responding to a potentially disruptive technology: How big pharma embraced biotechnology. California Management Review, 60(4), 74-100. https://doi.org/10.1177/0008125618778852
Search via ReFindit
Christensen, C. M., Bower, J. L. (1996). Customer power, strategic investment, and the failure of leading firms. Strategic management journal, 17(3), 197-218. https://doi.org/10.1002/(sici)1097-0266(199603)17:3<197::aid-smj804>3.0.co;2-u
Search via ReFindit
Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection, Official Journal of the European Union, L345/75. Communication from the Commission on a European Programme for Critical Infrastructure Protection COM/2006/0786 final.
Search via ReFindit
Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. Avaible at: https://eur-lex.europa.eu/legal-content/EN/TXT/?toc=OJ:L:2016:194:TOC&uri=uriserv:OJ.L_.2016.194.01.0001.01.ENG
Search via ReFindit
Kroger, W. (2008). Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools. Reliability Engineering & System Safety, 93(12), 1781–1787. https://doi.org/10.1016/j.ress.2008.03.005
Search via ReFindit
Law on Cyber Security of the Republic of Lithuania. Available at: https://www.e-tar.lt/portal/lt/legalAct/5468a25089ef11e4a98a9f2247652cf4
Search via ReFindit
Li, M., Porter, A.L., Suominen A. (2018). Insights into relationships between disruptive technology/innovation and emerging technology: A bibliometric perspective. Technological Forecasting and Social Change, pp. 285-296, https://doi.org/10.1016/j.techfore.2017.09.032
Search via ReFindit
Limba, T., Plėta, T., Agafonov K., Damkus, M. (2017). Cyber security management model for critical infrastructure. Entrepreneurship and Sustainability Issues, 4(4), 559-573. https://doi.org/10.9770/jesi.2017.4.4(12)
Search via ReFindit
Narodowy Bank Polski (NBP) and the Polish Financial Supervision Authority (KNF) (2017). “Virtual Currencies”. https://www.knf.gov.pl/knf/en/komponenty/img/Statement_by_NBP_and_KNF_on_virtual_currencies_7_07_2017_57364.pdf
Search via ReFindit
Novikovas, A., Novikovienė, L., Shapoval, R., Solntseva, K. (2017). The peculiarities of motivation and organization of civil defence service in Lithuania and Ukraine. Journal of Security and Sustainability Issues, 7(2), 369-380. https://doi.org/10.9770/jssi.2017.7.2(16)
Search via ReFindit
OECD. 2008. Protection of ‘critical infrastructure’ and the role of investment policies relating to national security. Available at: https://www.oecd.org/daf/inv/investment-policy/40700392.pdf
Search via ReFindit
Schuelke, L. (2018). A model for understanding the orders of magnitude of disruptive technologies. Technological Forecasting and Social Change, pp: 261-274. https://doi.org/10.1016/j.techfore.2017.09.033
Search via ReFindit
Schwab, K. (2016). The Fourth Industrial Revolution. Geneva: World Economic Forum. ISBN 1944835008 77p.
Search via ReFindit
Stankevičius, A., Lukšaitė, A. (2016). Transparent lobbying for sustainability: case of Lithuania. Entrepreneurship and Sustainability Issues, 4(2), 220-227. https://doi.org/10.9770/jesi.2016.4.2(9)
Search via ReFindit
The Global Competitiveness Report (2016–2017) Avaible at: http://www3.weforum.org/docs/GCR20
Search via ReFindit
The National Cyber Security Centre under the Ministry of National Defence of Lithuania. Information bulletin on investigation of the "yandex. Taxi" application and recommendations for applications safe usage (2018), Available at: https://www.nksc.lt/doc/en/analysis/2018-08-09%20Yandex%20Taxi%20application%20analysis.pdf
Search via ReFindit
The Slovak Spectator (2018), Finance Minister Plans to Start Taxing Bitcoin, Avaible at: , archived at https://perma.cc/NN5W-JEJY https://spectator.sme.sk/c/20733083/financial-minister-plans-to-start-taxing-bitcoin.html
Search via ReFindit
Treaty on the Functioning of the European Union, Article 3. Official Journal of the European Union C 202. Available at: https://www.ecb.europa.eu/
Search via ReFindit
Tvaronavičienė, M. (2016). Start-ups across the EU: if particular tendencies could be traced. Entrepreneurship and Sustainability Issues, 3(3), 290-298. https://doi.org/10.9770/jesi.2016.3.3(6)
Search via ReFindit
Tvaronavičienė, M. (2018). Towards internationally tuned approach towards critical infrastructure protection. Journal of Security and Sustainability Issues, 8(2), 143-150. https://doi.org/10.9770/jssi.2018.8.2(2)
Search via ReFindit
Wilson, J. Q., Kelling, G. L. (1982). Broken Windows: The Police and Neighborhood Safety, The Atlantic, 29(31), 29–38. Available at: https://www.theatlantic.com/magazine/archive/1982/03/broken-windows/304465/
Search via ReFindit