Abstract
Today’s ongoing coronavirus pandemic has shown that our overall public security mechanism in Finland requires a more coherent system that combines different types of sensors with artificial intelligence-based systems. Various states may have a crucial task: creating a common early warning system with a cyber dimension. But first, the decision-making process for public safety administration must be enhanced at the national level. COVID-19 has demonstrated the difficulty of predicting the progression of a pandemic, and nearly every country on earth has faced remarkable challenges from the spread of disinformation. False information has been shared around many public health and safety-related issues—such as how the virus is spread, the usefulness of self-protection, and the side effects of vaccines. Effective early warning tools are needed to prevent the domino effect of misinformation and to ensure the vital functions of society. This research will demonstrate the need for a common emergency response model for Europe to ensure national public safety—along with a technical platform at least for the interface between the countries. Hybrid-influenced incidents require a hybrid response.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ATP (2012) Open-source intelligence. Army Techniques Publication No. 2–22.9, Department of the Army, Washington, DC
Bröring A, Echterhoff J, Jirka S, Simonis I, Everding T, Stasch C, Liang S, Lemmens R (2011) New generation sensor web enablement. Sensors 11(3):2652–2699
Buranyi S (2020) The WHO v coronavirus: Why it can´t handle the pandemic. The Guardian, https://www.theguardian.com/news/2020/apr/10/world-health-organization-who-v-coronavirus-why-it-cant-handle-pandemic. Accessed 10 Dec 2020
CSPC (2014) Securing the U.S. electrical grid. Center for the Study of the Presidency & Congress
Chong C, Kumar S (2003) Sensor networks: Evolution, opportunities, and challenges. Proc IEEE 91(8):1247–1256
Colson E (2019) What AI-driven decision making looks like. Harvard Business Review, https://hbr.org/2019/07/what-ai-driven-decision-making-looks-like. Accessed 10 Dec 2020
DHS (2013) NIPP 2013: Partnering for critical infrastructure security and resilience. U.S. Department of Homeland Security, https://www.cisa.gov/publication/nipp-2013-partnering-criticalinfrastructure-security-and-resilience
DigiFinland (2020) Welcome to take care of your health and well-being in Omaolo. DigiFinland Oy, https://www.omaolo.fi/. Accessed 10 Dec 2020
EC (2018) Artificial intelligence for Europe. Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions, COM(2018) 237, European Commission
EC (2020) Coronavirus: commission delivers first batch of 1.5 million masks from 10 million purchased to support EU healthcare workers. Press release, European Commission
ElecTech (2016) Internet of Things (IOT) and its applications. Electrical Technology, http://www.electricaltechnology.org/2016/07/internet-of-things-iot-and-its-applications-inelectrical-power-industry.html. Accessed 8 Nov 2016
Endsley MR (1988) Design and evaluation for situation awareness enhancement. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 32(2):97–101
Finlex (2011) Emergency powers act 1552/2011. Finnish Ministry of Justice
Franke U, Brynielsson J (2014) Cyber situational awareness: A systematic review of the literature. Comput Secur 46:18–31
GPMB (2019) A world at risk: Annual report on global preparedness for health emergencies. Global Preparedness Monitoring Board
Gervasi O (2010) Encryption scheme for secured communication of web-based control systems. Journal of Security Engineering 7(6):609–618
Glassman M, Kang MJ (2012) Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT). Comput Hum Behav 28(2):673–682
Harjumaa M (2020) HUSin Järvinen purkaisi koronarajoituksia: ”Pitäisi yrittää saada sitä väestönosaa sairastamaan, jolle tauti ei todennäköisimmin ole vaarallinen”. Yle, https://yle.fi/uutiset/3-11318716. Accessed 10 Dec 2020
Hautanen S (2020) IS: Yksi mies vastaa 260 sote-yrityksen tietoturvan valvonnasta. Verkkouutiset, https://www.verkkouutiset.fi/is-yksi-mies-vastaa-260-sote-yrityksen-tietoturvan-valvonnasta/#2fb860b4. Accessed 10 Dec 2020
Hemmilä I, Salminen V (2020) Oikeuskansleri moittii ministeriöiden yhteistyötä kevään suojavarustehankinnoissa—STM:ssä epäselvyyttä myös ministerien työnjaosta. Suomenmaa, https://www.suomenmaa.fi/uutiset/oikeuskansleri-moittii-ministerioiden-yhteistyota-kevaansuojavarustehankinnoissa-stmssa-epaselvyytta-myos-ministerien-tyonjaosta-2/. Accessed 4 Dec 2020
Henley J (2020) Sweden’s Covid-19 strategist under fire over herd immunity emails. The Guardian, https://www.theguardian.com/world/2020/aug/17/swedens-covid-19-strategist-under-fireover-herd-immunity-emails. Accessed 10 Dec 2020
Hevner A, Chatterjee S (2010) Design research in information systems: theory and practice. Springer
HkiTimes (2020) Finland to close borders to non-essential travel at 12 am on Thursday. Helsinki Times, https://www.helsinkitimes.fi/finland/finland-news/domestic/17450-finland-to-closeborders-to-non-essential-travel-at-12am-on-thursday.html. Accessed 10 Dec 2020
ISO (2012) ISO/IEC 27032:2012: Information technology, security techniques, guidelines for cybersecurity. International Organization for Standardization (ISO), https://www.iso.org/standard/44375.html
ISO (2015) ISO 9001:2015: Quality management systems, requirements. International Organization for Standardization (ISO), https://www.iso.org/standard/62085.html
ISO (2016) ISO 27799:2016 Health informatics, information security management in health using ISO/IEC 27002. International Organization for Standardization (ISO), https://www.iso.org/standard/62777.html
ISO (2017) ISO/IEC 27001: Information security management systems. International Organization for Standardization (ISO), https://www.iso.org/isoiec-27001-information-security.html
Jaskari K (2020) Ministeriö ei aio jatkossakaan suositella kangasmaskien käyttöä julkisilla paikoilla. Yle, https://yle.fi/uutiset/3-11305744. Accessed 10 Dec 2020
Johnson C, Badger L, Waltermire D, Snyder J, Skorupka C (2016) Guide to cyber threat information sharing. NIST Special Publication 800–150, National Institute of Standards and Technology (NIST)
Kela (2020) Tekniset liittymismallit Kanta-palveluihin. Ohje, Kanta-palvelut, Kela, https://www.kanta.fi/documents/20143/106828/Tekniset+liittymismallit+Kanta-palveluihin.pdf/a057c34a-f822-71fd-b2df-097245d582ee
Lakka P (2020) IS selvitti Pekosen ja Kiurun ministeriön kaaosta—ainakin nämä 5 syytä vaikuttivat taustalla: ”Suksi lipsunut koko matkan”. Ilta-Sanomat, https://www.is.fi/politiikka/art2000006482234.html. Accessed 10 Dec 2020
Lehto M, Limnéll J, Innola E, Pöyhönen J, Rusi T, Salminen M (2017) Suomen kyberturvallisuuden nykytila, tavoitetila ja tarvittavat toimenpiteet tavoitetilan saavuttamiseksi. Valtioneuvoston selvitys- ja tutkimustoiminnan julkaisusarja 30/2017, Valtioneuvoston kanslia
Lyngaas S (2020) Why the extortion of Vastaamo matters far beyond Finland—and how cyber pros are responding. CyberScoop, https://www.cyberscoop.com/finland-vastaamo-hack-response/. Accessed 10 Dec 2020
Mediuutiset (2020) Lääkäri: Aletaan tartuttaa koronaa hallitusti hoitohenkilökuntaan immuniteetin saamiseksi. Mediuutiset, https://www.mediuutiset.fi/debatti/laakari-aletaan-tartuttaa-koronaa-hallitusti-hoitohenkilokuntaan-immuniteetin-saamiseksi/dfbc96a4-c757-44e9-988d38cf093a7e8b. Accessed 5 May 2020
Mäntymaa E, Mäntymaa J (2020) Sairaalat saivat varmuusvarastoista vuosia sitten vanhentuneita hengityssuojaimia—”Ihan kuranttia ei kaikki tavara ole ollut”, sanoo HUS-johtaja. Yle, https://yle.fi/uutiset/3-11286164. Accessed 10 Dec 2020
NASA (2010) Risk-informed decision making handbook (NASA/SP-2010-576). Technical report, NASA. https://ntrs.nasa.gov/api/citations/20100021361/downloads/20100021361.pdf. Accessed 10 Dec 2021
NIST (2010) Guidelines for smart grid cybersecurity. In: Privacy and the smart grid, vol 2. NISTIR 7628, National Institute of Standards and Technology (NIST)
NIST (2018) Framework for improving critical infrastructure cybersecurity. Version 1.1, National Institute of Standards and Technology (NIST)
Natri S (2020) THL:n pääjohtaja kehottaa suomalaisia pukemaan kangasmaskin julkisilla paikoilla—”Näin oireeton tartuttaja suojelee muita”. Yle, https://yle.fi/uutiset/3-11305102. Accessed 10 Dec 2020
NewsNowFin (2020) Maria Ohisalo: Vastaamo cyber attack and blackmail demands “serious, outrageous and cowardly”. News Now Finland, https://newsnowfinland.fi/crime/mariaohisalo-vastaamo-cyber-attack-and-blackmail-demands-serious-outrageous-and-cowardly. Accessed 10 Dec 2020
NewsNowFin (2020) Vastaamo hacking and blackmail: 25,000 police reports filed. News Now Finland, https://newsnowfinland.fi/crime/vastaamo-hacking-and-blackmail-25000-police-reports-filed. Accessed 10 Nov 2020
Nunamaker J Jr, Chen M, Purdin T (1990) Systems development in information systems research. J Manag Inf Syst 7(3):89–106
Nurmi P (2015) OSINT: Avointen lähteiden internet-tiedustelu. Kehitysprojektin raportti, Aaltoyliopisto
Ollila A (2020) Lääkintöneuvos Pälve tyrmää Kirsi Varhilan näkemykset maskien käytön esteistä. Uusi Suomi, https://puheenvuoro.uusisuomi.fi/aveollila1-2/laakintoneuvos-palve-tyrmaakirsi-varhilan-nakemykset-maskien-kayton-esteista/. Accessed 10 Dec 2020
PM (2010) Yhteiskunnan turvallisuusstrategia: Valtioneuvoston periaatepäätös 16.12.2010. Puolustusministeriö, Helsinki
PPD (2013) Critical infrastructure security and resilience. Presidential Policy Directive PPD-21, U.S. White House Office
dos Passos DS (2016) Big Data, data science and their contributions to the development of the use of open source intelligence. Electronic Journal of Management & System 11(4):392–396
Ranta E (2020) Tällainen yritys on tietomurron kohteeksi joutunut Vastaamo. Ilta-Sanomat, https://www.is.fi/taloussanomat/art-2000006699437.html. Accessed 30 Nov 2020
Robles RJ, Kim T (2010) Communication security for SCADA in smart grid environment. In: DNCOCO’10: proceedings of the 9th WSEAS international conference on data networks, communications, computers, pp 36–40. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, WI
SecComm (2017) Security Strategy for Society. Government resolution, Security Committee, Helsinki
Simola J (2020) Privacy issues and critical infrastructure protection. In: Benson V, Mcalaney J (eds) Emerging Cyber Threats and Cognitive Vulnerabilities. Academic Press, pp 197–226
Simola J, Rajamäki J (2017) Hybrid emergency response model: improving cyber situational awareness. In: Scanlon M, Le-Khac N (eds) ECCWS 2017—proceedings of the 16th European conference on cyber warfare and security. Academic Conferences and Publishing International, pp 442–451
Simola J, Rajamäki J (2018) Improving cyber situational awareness in maritime surveillance. In: Josang A (ed) ECCWS 2018—proceedings of the 17th European conference on cyber warfare and security, pp 480–488. Academic Conferences and Publishing International
Solita (2020) The Finnish Covid-19 app Koronavilkku has been downloaded a million times already! Solita, https://www.solita.fi/en/the-finnish-covid-19app-koronavilkku-has-been-downloaded-million-times/. Accessed 10 Dec 2020
Trottier D (2015) Open source intelligence, social media and law enforcement: Visions, constraints and critiques. Eur J Cult Stud 18(4–5):530–547
Uosukainen R, de Fresnes T (2020) Poliitikot tulevat ja menevät, virkamiehet pysyvät—käynnissä on kamppailu siitä kenellä valta on. Yle, https://yle.fi/uutiset/3-11186910. Accessed 10 Dec 2020
Valvira (2020) Organizational structure. Valvira, https://www.valvira.fi/web/en/valvira/organisational_structure. Accessed 20 Oct 2020
Wooldridge M (2009) An introduction to multiagent systems, 2nd ed. Wiley
Yin RK (2017) Case study research and applications: design and methods, 6th ed. SAGE, Thousand Oaks, CA
Yle (2020) Daily: Gov’t not planning to extend Uusimaa border closure. Yle, https://yle.fi/uutiset/osasto/news/daily_govt_not_planning_to_extend_uusimaa_border_closure/11303010. Accessed 10 Dec 2020
Yle (2020) Finland: Chinese face masks fail tests. Yle, https://yle.fi/uutiset/osasto/news/finland_chinese_face_masks_fail_tests/11298914. Accessed 10 Dec 2020
Yle (2020) Finland’s first coronavirus case confirmed in Lapland. Yle, https://yle.fi/uutiset/osasto/news/finlands_first_coronavirus_case_confirmed_in_lapland/11182855. Accessed 10 Dec 2020
Yle (2020) Friday's paper: problem with corona alert app, more countries on restricted list, drugs in the countryside. Yle, https://yle.fi/uutiset/osasto/news/fridays_papers_problem_with_corona_alert_app_more_countries_on_restricted_list_drugs_in_the_countryside/11586606. Accessed 10 Dec 2020
Yle (2020) President Niinistö defends role in coronavirus crisis. Yle, https://yle.fi/uutiset/osasto/news/president_niinisto_defends_role_in_coronavirus_crisis/11303872. Accessed 12 Dec 2020
Yle (2020) Two possible coronavirus cases in northern Finland. Yle, https://yle.fi/uutiset/osasto/news/two_possible_coronavirus_cases_in_northern_finland/11173752. Accessed 10 Dec 2020
Zio E, Pedroni N (2012) Risk-informed decision-making processes: an overview. Foundation for an Industrial Safety Culture, Touloise, https://www.foncsi.org/fr/publications/cahiers-securite-industrielle/overview-of-risk-informed-decision-making-processes/CSI-RIDM.pdf. Accessed 15 Dec 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Simola, J. (2022). Saving Lives in a Health Crisis Through the National Cyber Threat Prevention Mechanism Case COVID-19. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security. Computational Methods in Applied Sciences, vol 56. Springer, Cham. https://doi.org/10.1007/978-3-030-91293-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-91293-2_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91292-5
Online ISBN: 978-3-030-91293-2
eBook Packages: Computer ScienceComputer Science (R0)