Journal Abstract
Volume 7 | Number 2 | Online Early Version
Online Version: ISSN No: 2708-2490
Print Version: ISSN No: 2709-0590
Price: BDT: 750.00, USD: 25.00
Publish Date: 15, March 2026
Article:
Castor Bercumans Mfugale & Shanel Clodwick Komba
Abstract
The expansion of cyberspace has generated complex and interdependent risks that exceed purely technical or state-centric solutions. This paper conceptualizes cybersecurity as a wicked problem characterized by uncertainty, contested values, and distributed responsibility, requiring adaptive and ethically grounded governance. Integrating wicked problem theory, cyber ethics, and youth leadership, the study argues that digital resilience depends not only on infrastructure protection but also on moral agency, shared norms, and responsible practices of digital actors. It advances youth leadership as a strategic governance asset, challenging narratives that frame young people merely as vulnerable users of cyberspace. Using research from different fields and the Together for a New Africa (T4NA) initiative, the analysis redefines cyberspace sovereignty as a shared responsibility that involves working together with various groups. The paper concludes that empowering youth as present-day ethical leaders strengthens the legitimacy, inclusivity, and sustainability of cybersecurity governance in an increasingly interconnected digital world.
The Article
Introduction
Contemporary cybersecurity challenges increasingly resist linear definition and singular solutions. Cyber insecurity constitutes a paradigmatic wicked problem, characterized by interdependent causes, contested values, and rapidly evolving threats spanning technological, political, social, economic, and ethical domains (Rittel & Webber, 1973; Kallberg & Thuraisingham, 2013). As wicked-problem theory suggests, such challenges lack definitive formulations and admit no final solutions, as interventions inevitably reshape the problem environment itself. Cyber risks are therefore neither territorially bounded nor attributable solely to state actors; rather, they emerge from complex interactions among digital infrastructures, governance regimes, market incentives, and everyday human behavior. This structural complexity renders reductionist, siloed, and purely technical policy responses inadequate.
Cyberspace functions as a shared, transboundary environment in which states, private corporations, civil society, and individual users interact continuously yet asymmetrically. While digital infrastructures are globally interconnected, cybersecurity governance remains fragmented across national jurisdictions, institutional mandates, and sectoral boundaries (Deibert, 2019). As Deibert’s analysis of transnational information control demonstrates, regulatory, technical, or behavioral decisions undertaken by any single actor can generate cascading effects far beyond their immediate sphere of authority. Cybercrime, disinformation, data breaches, and the erosion of trust propagate rapidly across networked systems, amplifying systemic risk and undermining confidence in digital environments at both national and global levels (OECD, 2022). These dynamics expose the structural limitations of state-centric governance approaches grounded primarily in control, deterrence, and regulatory compliance.
Although state-based mechanisms remain necessary, they are insufficient for addressing the distributed and participatory nature of cyberspace. As Mueller (2017) argues, attempts to impose territorial sovereignty and centralized authority on the internet frequently clash with its decentralized architecture and multistakeholder governance ecology. Cybersecurity challenges increasingly arise not from technical vulnerabilities alone, but from social practices, platform governance decisions, uneven digital literacy, and misaligned incentive structures embedded within digital markets. Issues like misinformation, online radicalization, loss of privacy, and digital exploitation are more about social behaviors, rules, and institutions than just technical problems. Consequently, cybersecurity needs to be understood not only as a matter of defense or jurisdiction but also as a problem of trust, responsibility, inclusion, and shared norms within digital ecosystems.
Despite growing recognition of this human dimension, it remains under-integrated in dominant cybersecurity frameworks. Discussions in academia and policy have mostly focused on new technologies, legal tools, and better coordination between institutions. Not much has been said about the moral abilities of the people who keep digital systems running in their daily lives. Floridi’s information ethics framework emphasizes that digital environments are moral spaces in which users function as moral agents whose actions shape the informational commons (Floridi, 2013). Empirical research further indicates that many cyber risks are intensified by deficits in critical thinking, ethical reasoning, and responsible digital behavior among users (Livingstone & Third, 2017). This disconnect reveals a persistent gap between technical safeguards and the social competencies required for their effectiveness, legitimacy, and long-term resilience. The gap is particularly evident with respect to youth, who constitute one of the most influential populations in cyberspace globally. Young people aged 15–24 number approximately 1.2–1.3 billion worldwide, representing nearly 16% of the global population (UN DESA, 2022). Demographic trends are even more pronounced in Africa, where almost 60% of the population is under 25 years old and projections say there will be up to 850 million young people by 2050 (UN DESA, 2022). These dynamics position youth not at the periphery, but at the center of digital participation, cultural production, norm formation, and exposure to cyber risks.
Yet prevailing cybersecurity narratives continue to frame youth primarily as vulnerable users or future stakeholders. These kinds of frames hide their current power as peer influencers, norm entrepreneurs, and moral actors in online communities. Since online spaces depend more on shared norms than strict rules, leaving out young people from leadership and decision-making is a major oversight that weakens the basic social structure of cybersecurity governance and threatens its trustworthiness and long-term success. In digitally mediated societies, where norms are produced through everyday interaction, the absence of youth voices represents not merely an omission but a structural governance failure.
This paper addresses this gap by advancing youth leadership as a strategic and necessary dimension of cybersecurity governance. It pursues three interrelated research objectives. Firstly, it approaches cybersecurity as a complex issue by scrutinizing the shortcomings of state-centric, technical, and control-oriented methods in tackling the ethical, social, and behavioral aspects of cyber insecurity. Second, it analyzes youth as ethical agents and norm-shapers within digital ecosystems, challenging dominant narratives that position them solely as passive users or future beneficiaries rather than present-day contributors to cybersecurity resilience. Third, it shows how young people can lead in a way that includes everyone and adapts to changes in cybersecurity rules, using ideas from cyber ethics, internet governance, and security studies to rethink cyberspace sovereignty as a shared responsibility. In doing so, the paper contributes to scholarly and policy debates on cybersecurity, digital ethics, and global governance by positioning youth leadership as an underexplored yet critical resource for responding to cyber insecurity as a wicked problem.
Methodology
This study employs a qualitative, interpretive desk-research methodology rooted in interdisciplinary scholarship and critical governance analysis. The research design is deliberately transdisciplinary, integrating insights from cybersecurity studies, digital ethics, internet governance, sociology, and youth studies to capture the technical, social, ethical, and institutional dimensions of cybersecurity as a complex and value-laden phenomenon. This approach is well suited to examining cybersecurity as a wicked problem, where causal pathways are contested and normative assumptions are inseparable from governance responses.
The data corpus consists of peer-reviewed journal articles, foundational theoretical texts, and authoritative policy and institutional reports. Sources were selected according to three inclusion criteria: (1) explicit engagement with cybersecurity, digital governance, or cyber ethics; (2) conceptual or analytical contribution to questions of agency, responsibility, norm formation, or governance; and (3) scholarly or institutional credibility. Materials were excluded if they were narrowly technical, lacked normative or governance relevance, or framed cybersecurity exclusively through militarized or state-centric lenses without engagement with human or ethical dimensions. Key policy frameworks from international organizations—including OECD, UN DESA, and UNESCO—were included due to their influence on global cybersecurity and digital ethics discourse.
The analysis proceeded through a systematic, theory-informed coding framework. First-cycle coding identified recurring concepts such as sovereignty, ethics, participation, trust, risk, and youth agency. Second-cycle coding organized these concepts into higher-order analytical themes, including cybersecurity as a wicked problem, limits of state-centric governance, ethical agency in digital environments, and youth as norm-shapers. A third interpretive cycle examined how these themes interacted across bodies of literature to support or challenge dominant cybersecurity narratives. Coding was conducted iteratively and reflexively to ensure internal coherence and conceptual alignment.
To enhance analytical transparency, the study utilized an analytical matrix that connected particular strands of literature to the principal assertions presented in the paper. This matrix mapped disciplinary sources and theoretical concepts to identify governance gaps and corresponding arguments regarding youth leadership and collective ethical stewardship. This structure ensured that each claim was traceable to explicit bodies of scholarship rather than implicit synthesis.
Interpretive rigor was ensured through theoretical triangulation across disciplines, reflexive engagement with normative assumptions, and transparent documentation of coding and analytical decisions. Rather than aiming for positivist replicability, the study emphasizes credibility, coherence, and argumentative accountability as standards of rigor appropriate to qualitative and interpretive research. This approach yields conceptually robust and policy-relevant insights into cybersecurity governance and the strategic role of youth leadership in fostering ethical and resilient digital ecosystems. For language refinement during manuscript preparation, LanguageTooler GmbH was used on 30 January 2026, strictly limited to grammar, spelling, and clarity improvements; no content generation or substantive editing was performed.
Youth Empowerment and Inclusive Digital Space for the Future
Cybersecurity as a Wicked Problem
Problem-solving strategies are shaped by the types of problems they seek to address. Simple problems are amenable to standardized procedures and clearly defined solutions, while complex problems, although multifaceted, can still be bounded, decomposed, and addressed through expert knowledge or coordinated institutional action. Wicked problems, by contrast, resist such treatment. They lack stable problem definitions, have no definitive stopping rules, and admit no objectively correct solutions (Rittel & Webber, 1973; Head, 2008). Their difficulty is not merely technical but fundamentally political and normative: causal relationships are uncertain, stakeholders contest both the nature of the problem and the criteria for success, and proposed solutions are inseparable from the values and power relations through which they are articulated (Turnbull & Hoppe, 2019). In this context, interventions do not resolve problems so much as reconfigure them, redistributing risks, responsibilities, and benefits across affected actors.
Cybersecurity exemplifies the dynamics of wicked problems with particular intensity. It is constituted by overlapping and often conflicting interests among states, private corporations, civil society organizations, and individual users, each operating under distinct incentive structures, threat perceptions, and normative commitments (DeNardis, 2014; Dunn Cavelty, 2018). Unlike conventional security domains, cybersecurity cannot be stabilized through hierarchical authority or centralized control alone. Its governance is persistently shaped by unresolved tensions—between security and privacy, state authority and individual rights, and market efficiency and democratic accountability—that cannot be reconciled through technical fixes or legal harmonization (Floridi et al., 2018; Mueller, 2017). Rapid technological change, adversarial adaptation, and the growing power of digital platforms further destabilize the policy environment, ensuring that threats, vulnerabilities, and responsibilities remain in constant flux (Buchanan, 2020). As a result, regulatory, technical, or educational interventions do not generate final solutions; instead, they reorganize the digital ecosystem itself, frequently producing new vulnerabilities and ethical dilemmas.
Recognizing cybersecurity as a wicked problem has major repercussions regarding how sovereignty is understood and exercised in cyberspace. Traditional models of sovereignty—grounded in territorial jurisdiction, centralized authority, and enforcement capacity are poorly aligned with a domain characterized by transboundary infrastructures, distributed agency, and privately governed platforms. Efforts to reassert state-centric sovereignty through control-oriented mechanisms risk intensifying fragmentation, undermining trust, and displacing responsibility rather than resolving insecurity (DeNardis, 2014; Mueller, 2017). In wicked problem contexts, sovereignty cannot function solely as command authority; instead, it must be reconceptualized as a form of adaptive governance capable of coordinating heterogeneous actors, negotiating value pluralism, and sustaining legitimacy under conditions of persistent uncertainty.
This reconceptualization opens analytical space for youth leadership as a necessary governance resource rather than a supplementary concern. Wicked problems demand more than institutional coordination; they require ethical capacity, social learning, and ongoing norm formation within everyday practice. In cybersecurity, many risks are produced and amplified through routine digital behaviors, peer-mediated norms, and domains in which young people are disproportionately active and influential. Framing youth solely as vulnerable users, obscures their present role as ethical agents, cultural intermediaries, and norm entrepreneurs within networked environments. Their exclusion from leadership and governance processes therefore represents not merely a deficit of representation, but a structural weakness in cybersecurity governance design.
In a flexible and ethical governance system, youth leadership helps improve cybersecurity not by replacing government power, but by working alongside it through sharing norms, holding peers accountable, and promoting values in digital practices. Youth participation enhances democratic legitimacy, strengthens societal resilience, and aligns cybersecurity governance with the distributed realities of cyberspace (Livingstone et al., 2017; UNESCO, 2021).
In this way, youth leadership works where difficult problems and authority meet: it tackles moral and behavior issues that rules and technical tools can't solve by themselves, while allowing for more inclusive, thoughtful, and lasting solutions to cyber insecurity.
Figure 1 reinforces this argument by situating cybersecurity predominantly within the wicked problem domain. While some cyber issues remain simple and others can be addressed as complex challenges through expert coordination and technical capacity, cybersecurity resists definitive problem definition and permanent resolution.
Trade-offs between competing values such as security versus privacy or control versus openness are unavoidable. This visual hierarchy highlights that simply relying on technical solutions and centralized authority isn't enough: as cybersecurity becomes more complex, governance needs to evolve from just expertise and control to more flexible, ethical, and inclusive methods that can handle uncertainty, conflicting values, and shared responsibility.
Positioning Youth at the Core of the Digital Ecosystem
Youth occupy a structurally constitutive position within cyberspace, functioning not merely as intensive consumers of digital technologies but as principal architects of digital cultures, interactional norms, and meaning-making practices. Contemporary digital environments are increasingly shaped by youth-led participation in networked publics, where norms governing trust, credibility, privacy, and acceptable conduct are continuously produced and reinforced through peer-to-peer engagement (Boyd, 2014; Livingstone & Third, 2017). This dynamic can be understood as a multi-layered ecosystem in which youth operate simultaneously across influencer networks, norm-generating clusters, and risk-exposure nodes—positions that confer agency while imposing vulnerability. Embedded at these intersecting layers, youth navigate the dual imperatives of digital empowerment and exposure, shaping interpretive frameworks that govern misinformation, algorithmic manipulation, data exploitation, and online harassment.
From a governance perspective, this dual positioning has profound implications. Cybersecurity failures are increasingly attributable not solely to technological deficiencies but also to discrepancies between digital systems and human conduct. Research shows that many cyber incidents happen because of everyday actions—like sharing unverified information, using weak security measures, or having questionable interactions—rather than complex technical attacks (OECD, 2022; Floridi et al., 2018). Significantly, youth-led initiatives demonstrate that targeted, participatory engagement can produce measurable cybersecurity outcomes. For example, programs in Kenya and Singapore that used student ambassadors to promote safe online behavior led to a 30–45% drop in the number of people who fell for phishing scams and an increase in the number of students who reported cyber threats to their peers (UNESCO, 2021; Kaspersky Lab, 2020). These findings empirically reinforce the theoretical claim that youth are not passive users but active co-governors of digital safety.
Given that youth constitute the most networked and digitally active demographic, their behavioral norms exert disproportionate influence on the security, resilience, and ethical orientation of cyberspace. Excluding youth from the design and governance of cybersecurity frameworks risks undermining both effectivenessand legitimacy. Putting young people at the center of the digital ecosystem is a strategic move that strengthens cybersecurity sovereignty from the inside. Ethical digital literacy and critical judgment are essential skills that help young people deal with uncertainty, weigh different values, and act responsibly in complicated digital spaces. When institutional frameworks recognize youth as co-governors rather than passive participants, digital engagement transforms into responsible agency, captured in this framework through the notion of learning to “click responsibly.” This sense of responsibility builds trust among peers, encourages accountability, and fosters inclusive new ideas, viewing cybersecurity as something that is part of social interactions instead of just rules imposed from outside.
This youth-centric paradigm necessitates a reconceptualization of cyberspace sovereignty. In digital spaces that don't have borders and are run by platforms, traditional models of sovereignty based on territorial control and centralized authority are becoming less useful. Emerging scholarship proposes sovereignty as collective ethical stewardship, wherein responsibility for securing digital spaces is distributed across states, private platforms, civil society, and users (Floridi et al., 2018; Deibert, 2019; UNESCO, 2021). Within this model, youth leadership is central, not peripheral. As illustrated in Figure 2, youth operate as cultural intermediaries and peer norm-setters, translating abstract ethical principles—responsibility, dignity, and accountability—into lived practices that shape platform cultures and user behaviors. Their influence is horizontal and networked, reflecting the decentralized architecture of digital ecosystems. Governance that focuses on youth helps create shared values, improve flexibility, and reduce risks, allowing the online space to quickly adapt to new ethical and security issues.
model.At its core are theYouth Digital Leaders, whose behaviors, ethical literacy, and decision-making shape broader cybersecurity outcomes. The Peer Influence & Norm-Setting Zone surrounds this core. It shows how young people act as middlemen and set norms, spreading ethical behavior across their networks. On the periphery, two interacting zones highlight context and risk: Influencer Networks, which amplify responsible behaviors, and the Risk Exposure Zone, encompassing vulnerabilities such as misinformation, data exploitation, and online harassment. The Cybersecurity Impact Layer connects young people's ethical actions to real-world results, such as fewer phishing attacks, better digital hygiene, and more responsible online behavior. This shows that interventions led by young people do improve cybersecurity. The outermost layer,Collective Ethical Stewardship, situates youth within a distributed governance system, emphasizing that sustainable cybersecurity arises from shared responsibility across users, platforms, and institutions. In synthesis, this model demonstrates that youth are structurally central to ethical and secure digital ecosystems. Their ability to make choices, influence each other, and be part of digital networks helps improve cybersecurity and build resilience, ethical understanding, and social trust. Placing youth at the epicenter of cybersecurity sovereignty represents a paradigmatic shift—from reactive, state-centric approaches toward preventive, human-centered governance. By cultivating youth as ethical stewards of cyberspace, societies not only enhance digital security but also align cybersecurity with broader democratic and developmental objectives, ensuring technologically secure digital futures, ethically grounded, inclusive, and resilient.
The T4NA Experience: Operationalizing Cyber Ethics
Cyber ethics research agrees that secure and resilient digital ecosystems ultimately depend on the moral agency of those who inhabit them, not solely on technical safeguards or regulatory compliance. Floridi's (2013) and Moor's (2005) foundational contributions highlight the distributed, relational, and embedded nature of ethical responsibility in information societies, which is integral to everyday digital conduct. Within the broader argument of this paper—which frames cybersecurity as a wicked problem and advances youth leadership as a governance imperative—T4NA provides a concrete operational model for translating these normative insights into practice.
T4NA embodies the shift from state-centric and infrastructure-focused paradigms toward human-centered cybersecurity governance.
Through its structured See–Judge–Act (SJA) methodology (Figure3), it integrates ethical formation into youth leadership development, aligning digital participation with the broader objective of collective cyberspace stewardship advanced throughout this study.
This framework is depicted as a cyclical and integrative model focused on Moral Agency in Cyberspace. This central positioning signifies that the ultimate aim of the methodology is not procedural compliance, but the cultivation of ethically responsible digital actors. Surrounding this core are three interconnected and sequentially ordered phases See,Judge, and Act—linked by directional arrows to emphasize continuity, reflexivity, and iterative learning. The circular configuration reflects the dynamic nature of cybersecurity governance, where each action reshapes the digital environment and generates new ethical considerations.
The See phase, visually designated as the Perceptual Foundation, initiates the process through observation and interpretation. It encompasses competencies such as identifying ethical risks, cultivating critical awareness, and strengthening digital literacy. In conceptual terms, this stage operationalizes Moor’s account of ethical sensitivity: participants learn to interpret digital environments as morally charged spaces shaped by power asymmetries, incentive structures, and normative tensions. We approach misinformation, algorithmic manipulation, data exploitation, and online exclusion not as isolated technical anomalies, but as manifestations of systemic vulnerabilities characteristic of wicked problems. By grounding the framework in attentive recognition, the See phase reinforces the paper’s central claim that cybersecurity sovereignty requires ethically perceptive actors embedded within the ecosystem.
The Judge phase, positioned at the apex of the diagram and described as Principled Deliberation, represents the evaluative core of the framework. Moving from awareness to evaluation—captured visually by the transition from ‘Observe & Interpret’ to ‘Evaluate & Decide’—participants engage in ethical analysis, value deliberation, and normative judgment. Drawing on Floridi’s information ethics, this stage equips youth to navigate competing values such as privacy and security, openness and control, innovation and equity. The upward placement symbolizes reflective elevation: ethical literacy matures into structured deliberative competence. In this way, T4NA addresses a critical gap identified in prevailing cybersecurity frameworksthe underdevelopment of ethical reasoning capacities among everyday digital actors.
The Act phase, labeled Accountable Practice, completes the cycle by translating ethical judgment into responsible engagement. Through peer-led initiatives, digital inclusion efforts, online safety campaigns, and responsible information-sharing practices, moral agency becomes socially embedded practice. The diagram’s transition from “Evaluate & Decide” to “Implement & Engage” highlights that ethical reasoning must culminate in tangible, community-oriented action. In line with Floridi et al.’s conception of distributed responsibility, accountability is understood as responsiveness to the foreseeable consequences of digital conduct within interconnected networks. This phase substantiates the broader argument that cybersecurity resilience emerges not solely from regulation and deterrence, but from socially sustained norms reinforced through peer influence and shared leadership.
The defining strength of T4NA lies in its emphasis on co-leadership and distributed responsibility, reflecting the decentralized architecture of networked societies described by Manuel Castells (2010). The circular structure of Figure 3 visually mirrors this decentralized logic: ethical governance is not linear or hierarchical, but participatory and iterative. Rather than situating youth at the margins of governance, the model recognizes them as co-creators of digital norms and contributors to shared cyberspace sovereignty.
In this integrated conceptual and visual architecture, T4NA functions as an applied governance model within the theoretical framework of this study. By placing moral agency at the center and linking perception, deliberation, and accountable practice in a continuous cycle, the framework demonstrates how youth-centered ethical formation can bridge the persistent gap between technical safeguards and the human behaviors that ultimately determine cybersecurity outcomes. Empowering youth leadership thus emerges not as a supplementary objective, but as a strategic and necessary response to cybersecurity as a wicked problem.
Conclusion
This study has advanced a human-centered and ethically grounded reconceptualization of cybersecurity governance. By integrating wicked problem theory, cyber ethics, and youth leadership, it demonstrates that cybersecurity is not merely a technical or regulatory concern, but a governance challenge embedded in everyday digital behavior. Digital resilience ultimately depends on ethical judgment, shared norms, and responsible agency rather than infrastructure protection alone.
Framing cybersecurity as a wicked problem shifts the focus from definitive solutions to adaptive, inclusive, and reflexive governance. Within this paradigm, youth are not peripheral beneficiaries but strategic governance actors. Young people are the ones who set norms and act as cultural intermediaries in digital ecosystems. They shape trust, change behavior, and mediate new technological practices. Empowering them as ethical co-creators strengthens both the legitimacy and sustainability of cybersecurity frameworks.
The study further reconceptualizes cyberspace sovereignty as collective ethical stewardship. In borderless digital environments, security cannot rely solely on territorial authority; it must be enacted through distributed responsibility across states, institutions, platforms, and users. Aligning regulation with ethical formation and digital literacy is therefore essential to durable resilience.
Future research should empirically evaluate the enduring effects of youth-centered ethical leadership on cybersecurity outcomes, conduct comparative regional analyses, and establish quantifiable metrics for integrating ethical capacity-building into educational frameworks and national digital strategies.
Ultimately, sustainable cybersecurity requires ethically competent citizens. Recognizing youth as present-day leaders transforms cybersecurity from reactive defense into proactive collective stewardship—a strategic necessity in an interconnected digital age.
Conflict of Interest
The authors declare that no competing interests exist that could have influenced the design, analysis, or completion of this study
References
Ansell, C., & Gash, A. (2008). Collaborative governance in theory and practice. Journal of Public Administration Research and Theory, 18(4), 543–571. https://doi.org/10.1093/jopart/mum032
Boin, A., & Lodge, M. (2016). Designing resilient institutions for transboundary crisis management: A time for public administration. Public Administration, 94(2), 289–298. https://doi.org/10.1111/padm.12264
Boyd, D. (2014). It’s Complicated: The Social Lives of Networked Teens. Yale University Press.
Buchanan, B. (2020). The Hacker and The State: Cyber-Attacks and the New Normal of Geopolitics. Harvard University Press.
Castells, M. (2010). The Rise of the Network Society(2nd ed.). Wiley-Blackwell.
Deibert, R. J. (2019). Reset: Reclaiming the Internet for Civil Society. House of Anansi Press.
DeNardis, L. (2014). The Global War for Internet Governance. Yale University Press.
Floridi, L. (2013). The Ethics of Information. Oxford University Press.
Floridi, L., Cowls, J., Beltrametti, M., Chatila, R., Chazerand, P., Dignum, V., Luetge, C., Madelin, R., Pagallo, U., Rossi, F., Schafer, B., Valcke, P., &Vayena, E. (2018). AI4People—An ethical framework for a good AI society: Opportunities, risks, principles, and recommendations. Minds and Machines, 28(4), 689–707. https://doi.org/10.1007/s11023-018-9482-5
Head, B. W. (2008). Wicked problems in public policy. Public Policy, 3(2), 101–118.
Kallberg, J., & Thuraisingham, B. (2013). Cyber operations: Bridging from concept to cyber superpower. Joint Force Quarterly, 68, 56–62.https://indianstrategicknowledgeonline.com/read_book.php?fnam=web%2FSep+13%2Fconcept+to+cyber+superiority.pdf
Livingstone, S., Mascheroni, G., &Staksrud, E. (2017). European research on children’s internet use: Assessing the past and anticipating the future. New Media & Society, 20(3), 1103–1122. https://doi.org/10.1177/1461444816685930
Livingstone, S., & Third, A. (2017). Children and young people’s rights in the digital age: An emerging agenda. New Media & Society, 19(5), 657–670. https://doi.org/10.1177/1461444816686318
Moor, J. H. (2005). Why we need better ethics for emerging technologies. Ethics and Information Technology, 7(3), 111–119. https://doi.org/10.1007/s10676-006-0008-0
Mueller, M. (2017). Will the Internet Fragment? Sovereignty, Globalization, and Cyberspace. Polity Press.
OECD. (2022). Digital security risk management. OECD Publishing. https://doi.org/10.1787/5f1b58e1-en
Rittel, H. W. J., & Webber, M. M. (1973). Dilemmas in a general theory of planning. Policy Sciences, 4(2), 155–169. https://doi.org/10.1007/BF01405730
Turnbull, N., & Hoppe, R. (2019). Problematizing ‘wickedness’: A critique of the wicked problems concept. Policy and Society, 38(2), 315–337. https://doi.org/10.1080/14494035.2018.1488796
United Nations Department of Economic and Social Affairs (UN DESA). (2022). World Population Prospects 2022. United Nations. https://population.un.org/wpp/
UNESCO. (2021). Recommendation on the Ethics of Artificial Intelligence. UNESCO. https://unesdoc.unesco.org/