65 Country Report: Information Network (Final Version)

Traditional:

  1. Title: “Finland Drafting New Legislation Following Cyber Attack on Psychotherapy Center” Author/Organization: Bitdefender Format/Type of source: Online blog article Access: https://www.bitdefender.com/blog/hotforsecurity/finland-drafting-new-legislation-following-cyber-attack-on-psychotherapy-center/ How the source is updated: Bitdefender is a cybersecurity company that maintains a blog with regular updates on cybersecurity news and trends. Type of information can be found through this source: News and updates on cybersecurity incidents and legislation in Finland, specifically related to the Law on Prevention of Phishing and Data Breaches. The source’s perspective: Cybersecurity perspective. Strengths of the source: Provides insights into the cyber attack on a psychotherapy center in Finland and the resulting impact on legislation, including the drafting of new laws related to cybersecurity. Weaknesses: May have a cybersecurity company’s bias towards promoting their products/services. Why you think this source is valuable for those wishing to learn more about your country: Provides recent news and insights on the impact of cybersecurity incidents on legislation in Finland, specifically related to the Law on Prevention of Phishing and Data Breaches, which is directly relevant to the topic of the essay.
  2. Title: “Finland to Investigate Suspected Nokia Chinese Data Breach” Author/Organization: SecurityWeek Format/Type of source: Online news article Access: https://www.securityweek.com/finland-investigate-suspected-nokia-chinese-data-breach How the source is updated: SecurityWeek is an online news platform that provides regular updates on cybersecurity news and trends. Type of information can be found through this source: News and updates on cybersecurity incidents, specifically related to a suspected data breach at Nokia in China and its investigation in Finland. The source’s perspective: Cybersecurity perspective. Strengths of the source: Provides recent news and updates on a suspected data breach at Nokia in China and the subsequent investigation by Finland, which is directly relevant to the topic of the essay. Offers insights into the legal and cybersecurity aspects of the incident. Weaknesses: May have a bias towards a cybersecurity perspective and may not provide a comprehensive view of all perspectives. Why you think this source is valuable for those wishing to learn more about your country: Provides recent and relevant news on a suspected data breach at a prominent Finnish company and the investigation by Finnish authorities, which highlights the importance of cybersecurity and data breach prevention laws in Finland, as well as the potential impact of such incidents on the legal framework.
  3. Title: “Data Breaches Increase 40 Percent in 2016” Author/Organization: PR Newswire Format/Type of source: Online news article Access: https://www.prnewswire.com/news-releases/data-breaches-increase-40-percent-in-2016-finds-new-report-from-identity-theft-resource-center-and-cyberscout-300393208.html How the source is updated: PR Newswire is a news distribution platform that provides regular updates on news and press releases related to various topics, including data breaches and cybersecurity. Type of information can be found through this source: News and statistics related to data breaches and cybersecurity incidents, specifically an increase in data breaches by 40% in 2016, as reported by the Identity Theft Resource Center and CyberScout. The source’s perspective: Cybersecurity and data breach statistics perspective. Strengths of the source: Provides statistical data and trends related to data breaches, which can be useful in supporting arguments or claims in the essay. Offers insights into the overall increase in data breaches, which may have implications for the topic being discussed. Weaknesses: May have a limited perspective focused solely on data breach statistics and may not provide in-depth analysis or multiple perspectives on the topic. Why you think this source is valuable for those wishing to learn more about your country: Provides statistical data on the increase in data breaches, which can be relevant in discussing the cybersecurity landscape and challenges faced by various countries, including Finland. Offers insights into the global trend of data breaches, which may have implications for the topic of the essay in terms of the broader context of data breaches worldwide.
  4. Title: “NCSC Finland Releases New Guide on Securing Microsoft Office 365 Against Credential Phishing and Data Breaches” Author/Organization: Cyware Format/Type of source: Online news article Access: https://cyware.com/news/ncsc-finland-releases-new-guide-on-securing-microsoft-office-365-against-credential-phishing-and-data-breaches-6b71b9a9 How the source is updated: Cyware is a cybersecurity platform that provides news, updates, and analysis on cybersecurity topics, including data breaches, phishing attacks, and other cybersecurity threats. The website is regularly updated with new articles and news related to the cybersecurity landscape. Type of information can be found through this source: Provides information on the newly released guide by the National Cyber Security Centre (NCSC) Finland, specifically focusing on securing Microsoft Office 365 against credential phishing and data breaches. The source’s perspective: Provides insights from the National Cyber Security Centre (NCSC) Finland’s perspective on securing Microsoft Office 365 against credential phishing and data breaches. Strengths of the source: Offers current and relevant information on a specific topic, which is securing Microsoft Office 365 against credential phishing and data breaches, from a trusted source like the National Cyber Security Centre (NCSC) Finland. Provides practical guidance on securing Office 365 against specific threats, which can be valuable for organizations and individuals interested in protecting their Microsoft Office 365 accounts. Weaknesses: Focuses specifically on Microsoft Office 365 and may not cover other platforms or software. The information provided may not be comprehensive and may not cover all possible scenarios or threats related to credential phishing and data breaches.

New Media:

  1. Title: “Finnish Government Tables Laws to Protect Data from Cyber Criminals” Author/Organization: Proteus Cyber Format/Type of source: Online news article Access: https://proteuscyber.com/bs/privacy-database/news/2945-finnish-government-tables-laws-to-protect-data-from-cyber-criminals How the source is updated: Proteus Cyber is a cybersecurity solutions provider that periodically updates its website with news articles and insights. Type of information can be found through this source: News and updates on data protection laws and cybersecurity in Finland, including the Law on Prevention of Phishing and Data Breaches. The source’s perspective: Cybersecurity and data protection perspective. Strengths of the source: Provides insights and analysis on the Finnish government’s efforts to protect data from cyber criminals, including the proposed laws related to the Law on Prevention of Phishing and Data Breaches. Weaknesses: May have a cybersecurity solutions provider’s bias toward promoting their products/services. Why you think this source is valuable for those wishing to learn more about your country: Provides recent news and insights on the Finnish government’s efforts to protect data from cyber criminals, including the proposed laws related to the Law on Prevention of Phishing and Data Breaches, which is directly relevant to the topic of the essay.
  2. Title: “Finnish Cyber Security Certification and Testing (CAST) Services” Author/Organization: VTT Technical Research Centre of Finland Ltd Format/Type of Source: Certification and Testing Services Access: https://www.vtt.fi/cast How the Source is Updated: Regularly updated by VTT Technical Research Centre of Finland Ltd Description: The Finnish Cyber Security Certification and Testing (CAST) Services offered by VTT Technical Research Centre of Finland Ltd provide cybersecurity certification and testing services for products, systems, and services. CAST Services focus on evaluating and certifying the security of digital solutions and technologies. The source provides insights from a certification and testing perspective, with a focus on cybersecurity evaluation, certification, and testing methodologies. Strengths of the source include specialized expertise in cybersecurity evaluation and certification, and weaknesses may include potential limitations in the coverage or specific scope of certification services. This source is valuable for those interested in understanding the cybersecurity certification and testing landscape in Finland.
  3. Title: “Finnish Cyber Security Cluster” Author/Organization: Finnish Cyber Security Cluster Format/Type of Source: Cybersecurity Cluster Organization Access: https://cybersecurity.fi/ How the Source is Updated: Regularly updated by the Finnish Cyber Security Cluster Description: The Finnish Cyber Security Cluster is a network of organizations and stakeholders in the cybersecurity field in Finland. The cluster provides resources, events, and collaborative opportunities for cybersecurity professionals and organizations in Finland. The source offers insights from a collaborative and industry perspective, strengths of the source include the collaborative nature of the organization and the opportunity for networking and knowledge sharing, and weaknesses may include potential biases or limitations in the coverage or perspective. This source is valuable for those interested in networking with cybersecurity professionals in Finland and accessing collaborative resources and events.

Social Media Sources:

  1. Title: Tweet by BigDataX Author / Organization: BigDataX (@BigDataXTech) Format/Type of source: Social media (Twitter) Access: https://twitter.com/BigDataXTech/status/1192267627332136960 Description: This tweet by BigDataX, a Twitter account with the handle @BigDataXTech, shares a quote from Richard Wingfield, Head of Legal at Global Partners Digital, regarding National Action Plans on Business and Human Rights. The quote highlights stronger protection for privacy and data protection in Finland. The tweet suggests that, in addition to legislation, National Action Plans on Business and Human Rights have been developed in Finland to enhance privacy and data protection.
  2. Title: Tweet by thisisFINLAND Author / Organization: thisisFINLAND (@thisisFINLAND) Format/Type of source: Social media (Twitter) Access: https://twitter.com/thisisFINLAND/status/1572792424519479296 Description: This tweet by thisisFINLAND, a Twitter account with the handle @thisisFINLAND, highlights Finland’s approach to digitalization and the balance between open data and user privacy. The tweet states that Finland is not afraid to tackle big questions related to digitalization, such as how to protect user privacy while promoting open data. It further mentions that Finland has been a leader in developing international technical and ethical standards.
  3. Title: The Finnish DPA Imposes Fine on Taksi Helsinki Oy for Violation of Data Protection Legislation Author / Organization: Zumbul Attorneys-at-Law Format/Type of source: Twitter post Access: https://lnkd.in/ecNJH2zDescription: The source is a tweet published by Zumbul Attorneys-at-Law, a law firm specializing in data protection and privacy matters. The tweet highlights a recent development where the Finnish Data Protection Authority (DPA) imposed a fine on Taksi Helsinki Oy for violating data protection legislation in Finland. The perspective of the source is focused on data protection and privacy, providing information from a legal standpoint. The strengths of this source include its timeliness and relevance to current data protection issues in Finland, as well as its concise and easily accessible format.

Data Sources:

  1. Title: “Guidelines 9/2022 on Personal Data Breach Notification” Author/Organization: European Data Protection Board (EDPB) Format/Type of source: Online publication (Guidelines) Access: https://edpb.europa.eu/our-work-tools/documents/public-consultations/2022/guidelines-92022-personal-data-breach_en How the source is updated: The European Data Protection Board (EDPB) is an independent European body responsible for ensuring consistent application of data protection rules across the European Union. The EDPB regularly updates its guidelines and publications to provide guidance on data protection matters, including personal data breach notification. Type of information can be found through this source: Guidelines on personal data breach notification, providing information on the legal requirements, best practices, and procedures for organizations to follow in the event of a personal data breach, as per the European General Data Protection Regulation (GDPR). The source’s perspective: European Union (EU) perspective on personal data breach notification and compliance with the GDPR. Strengths of the source: Provides authoritative guidance on personal data breach notification from the European Data Protection Board, which is responsible for interpreting and applying the GDPR within the EU. Offers in-depth information on legal requirements, best practices, and procedures for organizations to follow in the event of a personal data breach, which can be valuable in understanding the regulatory framework and expectations. Weaknesses: Focuses primarily on the EU perspective and may not provide insights into the data breach landscape or regulations in other countries outside the EU.
  2. Title: Leading Reasons for Not Reading Online Privacy Policies in Finland Author / Organization: Statista Format/Type of source: Website article Access: https://www.statista.com/statistics/603289/leading-reasons-for-not-reading-online-privacy-policies-in-finland/ Description: The source is an article published on the Statista website, which is a leading provider of statistics and data on various topics, including privacy and data protection. The article presents data on the leading reasons for not reading online privacy policies in Finland. The perspective of the source is statistical and data-driven, providing quantitative information on the reasons why people in Finland do not read online privacy policies. The source presents the findings of a survey or research conducted by Statista, providing data in the form of percentages or numerical figures. The strengths of this source include its use of data and statistics to support the information presented. The source is reputable and widely used for statistical data on various topics. It provides specific insights into the reasons why individuals in Finland may not read online privacy policies, which can be valuable for understanding the attitudes and behaviors of Finnish individuals towards privacy and data protection. One potential weakness of this source is that it may not provide qualitative insights or in-depth analysis of the reasons why people in Finland do not read online privacy policies. It may also lack context or information about the sample size, methodology, or other details of the research or survey conducted.
  3. Title: Number of Personal Data Breaches Reported in Finland Author / Organization: Statista Format/Type of source: Website article Access: https://www.statista.com/statistics/1204061/number-of-personal-data-breaches-reported-in-finland/ Description: The source is an article published on the Statista website, which is a leading provider of statistics and data on various topics, including data breaches and cybersecurity. The article presents data on the number of personal data breaches reported in Finland. The perspective of the source is statistical and data-driven, providing quantitative information on the trend of reported personal data breaches in Finland over time. The source presents the findings of a survey or research conducted by Statista, providing data in the form of numerical figures or graphical representations. The strengths of this source include its use of data and statistics to support the information presented. The source is reputable and widely used for statistical data on various topics. It provides specific insights into the trend of personal data breaches in Finland, which can be valuable for understanding the state of data privacy and cybersecurity in the country. One potential weakness of this source is that it may not provide qualitative insights or in-depth analysis of the causes or impacts of personal data breaches in Finland. It may also lack context or information about the methodology or other details of the research or survey conducted.

Visual and/or audio-based sources:

  1. Title: Share of Daily Social Media Users by Platform in Finland Author / Organization: Statista Format/Type of source: Website (Statistical data) Access: https://www.statista.com/statistics/560262/share-of-daily-social-media-users-by-platform-in-finland/Description: The source is a webpage published by Statista, a leading provider of statistical data and market research. The webpage presents data on the share of daily social media users by the platform in Finland. It provides statistical information on the usage of different social media platforms in Finland, indicating the percentage of daily users for each platform. The perspective of the source is objective and data-driven, providing statistical information without any particular bias or opinion. The strengths of this source include its reliability as a reputable source of statistical data and its relevance to understanding social media usage patterns in Finland. One potential weakness of this source is that it may not provide the most up-to-date information as the data may be based on a specific time period. Also, since it is a statistical source, it may not provide qualitative insights or in-depth analysis of the reasons behind social media usage patterns. This source is valuable for those wishing to learn about the usage of social media platforms in Finland, as it provides reliable statistical data that can help understand the popularity and trends of different social media platforms among daily users in Finland.
  2. Title: Finland Data Breaches Statistics Author / Organization: Statista Format/Type of source: Statistical data on a website Access: https://www.statista.com/statistics/1329763/finland-number-of-data-breaches/#:~:text=Nearly%2060.43%20thousand%20data%20breaches,between%20July%20and%20September%202022.Description: The source is a statistical data page published by Statista, a leading provider of market and consumer data. The page presents data on the number of data breaches in Finland, covering a specific time period. The perspective of the source is statistical and data-driven, providing quantitative information on the number of data breaches in Finland. The strengths of this source include its factual and reliable data, as well as its visual presentation in the form of charts and graphs for easy interpretation. One potential weakness of this source is that it may not provide a detailed analysis or context behind the data, such as the causes or impact of the data breaches. Additionally, as a statistical data page, it may not provide qualitative or subjective information on the data breaches in Finland.
  3. Title: Number of Malware Incidents per Quarter in Finland Author / Organization: Statista Format/Type of source: Website article Access: https://www.statista.com/statistics/733010/number-of-malware-incidents-per-quarter-in-finland/ Description: The source is an article published on the Statista website, which is a leading provider of statistics and data on various topics, including cybersecurity and malware incidents. The article presents data on the number of malware incidents per quarter in Finland. The perspective of the source is statistical and data-driven, providing quantitative information on the trend of malware incidents in Finland over time. The source presents the findings of a survey or research conducted by Statista, providing data in the form of numerical figures or graphical representations. The strengths of this source include its use of data and statistics to support the information presented. The source is reputable and widely used for statistical data on various topics. It provides specific insights into the trend of malware incidents in Finland, which can be valuable for understanding the cybersecurity landscape in the country. One potential weakness of this source is that it may not provide qualitative insights or in-depth analysis of the causes or impacts of malware incidents in Finland. It may also lack context or information about the methodology or other details of the research or survey conducted.

Additional Sources:

  1. Title: “Finnish Cyber Security Landscape Report” Author/Organization: National Emergency Supply Agency (NESA) Finland Format/Type of Source: Cybersecurity Report Access: https://www.nesa.fi/en/finnish-cyber-security-landscape-report/ How the Source is Updated: Regularly updated by the National Emergency Supply Agency (NESA) Finland Description: This cybersecurity report provides an overview of the current cybersecurity landscape in Finland, including threat trends, incidents, and vulnerabilities. The source offers valuable insights into the country’s cybersecurity landscape from the perspective of the National Emergency Supply Agency (NESA), strengths of the source include up-to-date information on the current state of cybersecurity in Finland, and weaknesses may include potential limitations in the scope or coverage of the report. This source is valuable for those interested in understanding the overall cybersecurity situation in Finland.
  2. Title: “Finnish Data Protection Authority’s Guidelines on Cybersecurity” Author/Organization: Finnish Data Protection Authority (FDPD) Format/Type of Source: Guidelines Access: https://tietosuoja.fi/en/home How the Source is Updated: Regularly updated by the Finnish Data Protection Authority (FDPD) Description: The Finnish Data Protection Authority (FDPD) publishes guidelines on cybersecurity, including data protection requirements, best practices, and recommendations for organizations. These guidelines provide insights into the regulatory perspective on cybersecurity and data protection in Finland, strengths of the source include the official regulatory perspective on data protection and cybersecurity, and weaknesses may include potential limitations in the coverage or applicability of the guidelines. This source is valuable for those interested in understanding the data protection and cybersecurity regulatory landscape in Finland.
  3. Title: Top Security Breaches in Finland Author / Organization: Cyberlands Format/Type of source: Website article Access: https://www.cyberlands.io/topsecuritybreachesfinland Description: The source is an article published on the website Cyberlands, which focuses on cybersecurity news and information. The article provides information about the top security breaches that have occurred in Finland. The perspective of the source is focused on cybersecurity and data breaches, providing details about specific security breaches that have taken place in Finland. The strengths of this source include its up-to-date information on recent security breaches, as well as its focus on cybersecurity-related topics. One potential weakness of this source is that it may not provide a comprehensive overview of all security breaches in Finland, as it may only highlight the “top” breaches based on the criteria set by the author or organization. Additionally, the source may not provide an in-depth analysis or context behind the security breaches, such as the impact or repercussions of the breaches.

License

INTSTDS 4850: Understanding the Global Information Society (Spring 2023) Copyright © 2023 by larson581. All Rights Reserved.

Share This Book