<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd"><article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SJPA</journal-id><journal-title-group><journal-title>Scandinavian Journal of Public Administration</journal-title></journal-title-group><issn pub-type="epub">2001-7413</issn><issn pub-type="ppub">2001-7405</issn><publisher><publisher-name>School of Public Administration, University of Gothenburg</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SJPA.V28I2.14068</article-id><article-id pub-id-type="doi">10.58235/SJPA.V28I2.14068</article-id><article-categories><subj-group xml:lang="en"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title>Information Resilience in Networks: An Analysis of a National Security Legislation Evidence Base</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-9828-0511</contrib-id><name><surname>Rantam&#x00E4;ki</surname><given-names>Aino</given-names></name><xref ref-type="aff" rid="aff0001"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6120-7553</contrib-id><name><surname>Uusikyl&#x00E4;</surname><given-names>Petri</given-names></name><xref ref-type="aff" rid="aff0002"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6941-7969</contrib-id><name><surname>Jalonen</surname><given-names>Harri</given-names></name><xref ref-type="aff" rid="aff0003"/></contrib><aff id="aff0001">MHA, works as a doctoral researcher in the University of Vaasa. She is a midwife and has worked over 15 years as a nurse and a nursing supervisor in a ward with children with severe disabilities. Her research interests include information resilience, epistemic governance, evidence-based policy and the development, management and leadership of social and healthcare. She is currently involved in different research projects focusing on preparedness, pandemic governance, social media and interprofessional collaboration. She has published articles in both national academic journals and professional publications.</aff><aff id="aff0002">PhD, is a Research Director at the University of Vaasa and a Docent at the University of Eastern Finland. He has considerable expertise in information resilience, governance, innovation policy, policy evaluation, regulatory impact assessment, public budgeting, systems analysis, complexity, and European policymaking. He has published more than 150 scientific reports or publications prepared in the area of applied research.</aff><aff id="aff0003">PhD, is professor at the University of Vaasa. He has over 20 years of experience in systems and complexity sciences, knowledge management, public decision-making, and service dominant value creation. His current interests include ignorance in organizations and information resilience. He has been responsible for or involved in 20 national/international research projects (incl. Horizon2020, Academy of Finland). Jalonen has published around 100 scientific articles (incl. in <italic>Public Management Review, Public Administration Review,</italic> and <italic>International Journal of Public Service Management</italic>) and books or book sections (published by <italic>Routledge</italic> and <italic>Springer</italic>, among others). In addition to communication in academic communities, Jalonen has contributed to popular science communications by publishing around 100 articles in newspapers and trade magazines. He has worked as a reviewer for several scientific journals and academic conferences and served as an expert evaluator in research funding institutions.</aff></contrib-group><pub-date pub-type="epub"><day>15</day><month>6</month><year>2024</year></pub-date><pub-date pub-type="collection"><year>2024</year></pub-date><volume>28</volume><issue>2</issue><fpage>1</fpage><lpage>20</lpage><permissions><copyright-year>2024</copyright-year><copyright-holder>&#x00A9; 2024 Aino Rantam&#x00E4;ki, Petri Uusikyl&#x00E4;, Harri Jalonen</copyright-holder><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by-nc/4.0/"><license-p>This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by-nc/4.0/">http://creativecommons.org/licenses/by-nc/4.0/</ext-link>), permitting all non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p></license></permissions><abstract xml:lang="en"><title>Abstract</title><p>Governance theory emphasises that networks are pivotal to societal governance and related steering mechanisms. One important means of steering is legislation, the evidence base of which is built on the interaction between social actors and the expert hearings related to the legislative process. This research uses network analysis to examine the construction of a legislative knowledge base and the information resilience displayed in the related networks. The data are derived from experts (n=440) appearing in committee hearings on five proposed acts of parliament. The results show that the expert consultations behind the legislation are official-oriented and illuminate the limited information produced by the private sector and a narrow view of scientific expertise. The network reveals epistemic authorities &#x2013; mainly representing the security cluster &#x2013; acting as gatekeepers. A more systemic approach is needed to build an evidence base encompassing the views on societal phenomena derived from different disciplines.</p></abstract><kwd-group xml:lang="en"><title>Keywords</title><kwd>information resilience</kwd><kwd>epistemic governance</kwd><kwd>knowledge regime</kwd><kwd>legislation</kwd><kwd>social network analysis</kwd></kwd-group></article-meta></front><body><boxed-text><sec><title>Practical Relevance</title><list list-type="bullet"><list-item><p>Increasing the knowledge base of governance and the variety of interpretations and perceptions can be accomplished by providing support for the creation of information resilience.</p></list-item><list-item><p>Paying attention to the information flows and interactions within the governance network, as well as the mechanisms that either improve or degrade interaction patterns, is required in order to bolster the system&#x2019;s information resilience.</p></list-item><list-item><p>A systemic approach is required to establish the knowledge base and situational awareness on security-related issues.</p></list-item><list-item><p>Knowledge brokerage requires the ability to create a diverse and comprehensive cross-sectoral understanding of the security policy issues that are being discussed.</p></list-item><list-item><p>Strengthening democratic decision-making about comprehensive security policy can be accomplished through increased transparency and openness throughout the policy cycle.</p></list-item></list></sec></boxed-text><sec id="sec1"><title>Introduction</title><p>The physical survival of the state and protection from those who threaten it lies at the very heart of national security. The strategic goal of national security of supply is to ensure the continuity of production and infrastructure vital for society such that the critical functions of society and its population&#x2019;s living conditions are assured during emergencies. Enhancing national preparedness is not only a crisis management task but is also embedded in broader societal contexts such as democracy, the rule of law, and fundamental human rights and freedoms. National security can be viewed as a <italic>wicked problem</italic> &#x2013; a problem that is &#x201C;ill-formulated, where the information is confusing, where there are many clients and decision-makers with conflicting values, and where the ramifications in the whole system are thoroughly confusing&#x201D; (<xref ref-type="bibr" rid="R34">Head 2022</xref>, 23, originally Rittel &#x0026; Webber 1973). National security involves myriad interconnected issues such as defence, intelligence, diplomacy, economic stability, technology, and even health. Each of these factors is complex in its own right and interacts with others in often unpredictable and non-linear ways. National security is fraught with uncertainty, including unknown threats, unpredictable actions by other nations or non-state actors, and rapidly evolving technology that can offer new security tools but also create new security risks. National security affects many stakeholders with divergent interests and perspectives, including various government agencies, the military, industry, citizens, and foreign nations. Achieving consensus among these stakeholders is often challenging. Measures that enhance one aspect of national security may compromise another; for instance, investing heavily in the military might jeopardise social or economic stability.</p><p>Moreover, some security measures undermine individual privacy or civil liberties, triggering ethical and legal debates. Actions taken to address one national security threat might create new threats or exacerbate existing ones. Given the complexity, uncertainty, and compromises inherent in national security, achieving absolute security is impossible. Any solution is only temporary because the threats and resources landscape constantly changes. There are no true final solutions in this realm, only ongoing management of risks. National security is a challenge that defies easy solutions, requires nuanced understanding, and necessitates collaboration on the part of a broad range of stakeholders. From the <italic>governance</italic> perspective, no individual actor can access the information or resources necessary to address these problems (<xref ref-type="bibr" rid="R39">Klijn &#x0026; Koppenjan 2015</xref>; <xref ref-type="bibr" rid="R13">Cairney, Heikkila &#x0026; Wood 2019</xref>). To address wicked problems, many scholars have suggested a network approach to governance (e.g. <xref ref-type="bibr" rid="R23">Ferlie et al. 2011</xref>; <xref ref-type="bibr" rid="R39">Klijn &#x0026; Koppenjan 2014</xref>). The rationale has been that networks can facilitate the production and sharing of knowledge, which is necessary for evidence-based policymaking in general (e.g. <xref ref-type="bibr" rid="R12">Cairney 2016</xref>) and evidence-based legislation (<xref ref-type="bibr" rid="R58">Princen 2022</xref>) in particular. Acknowledging the critique of evidence-based policymaking (e.g. <xref ref-type="bibr" rid="R33">Head 2013</xref>; <xref ref-type="bibr" rid="R53">Newman 2017</xref>), we do not use the evidence base concept to describe the objective of ensuring effective, efficient, and well-targeted policy interventions. Instead, the term <italic>evidence base,</italic> as used here, refers to the knowledge originating in expert consultations related to the legislative process in the context of national security legislation.</p><p>This article examines governance and its evidence base from the perspectives of knowledge regimes, epistemic governance, and information resilience in the context of national security legislation. For the purposes of this study, knowledge regimes are defined as a variety of information and idea-based actors whose views define the political agenda, frame how those actors will determine the subject and determine the decision-making procedures. These entities are often composed on a case-by-case basis but may become established as permanent structures of power. In addition, they are largely context-related and vary widely between different administrative systems (Campbell &#x0026; Pedersen 2014). The operation of the knowledge regimes can be perceived as an expression of epistemic work, which is a way to implement epistemic governance. Epistemic governance refers to an approach intended to influence people&#x2019;s views on social reality and, thus, the decisions they make (<xref ref-type="bibr" rid="R3">Alasuutari &#x0026; Qadir 2014</xref>). Information resilience, in the context of public policy, refers to a phenomenon that highlights the role of network-like cooperation, intermediary actors supporting or suppressing the flow of information, a forward-looking approach and social structures in building the evidence base of decision-making, especially in uncertain circumstances (Rantam&#x00E4;ki &#x0026; Jalonen 2022). These theoretical concepts share a perspective on the significance of network cooperation and interaction and also highlight the important role of information intermediaries, who operate between various networks of actors and are central to the interpretation and employment of evidence supporting decision-making.</p><p>This research focuses on Finnish legislation addressing information and national security. The chosen research context reflects changes in the security environment and anticipated security threats (<xref ref-type="bibr" rid="R26">Finnish Government, 2022</xref>) and the findings of prior research on the central role of social institutions, such as legislation, in the emergence of information resilience (Rantam&#x00E4;ki &#x0026; Jalonen 2022). The acts of parliament in question are the Emergency Powers Act, the Act on the Supervision of Intelligence Activities, the Civilian Intelligence Act, the Military Intelligence Act and the Act on the Government Situation Centre. In this research, national security encompasses a goal of societal threats and risks remaining under control as a result of cooperation between different actors (see, e.g. The Finnish Terminology Centre TSK 2017; <xref ref-type="bibr" rid="R26">Finnish Government 2022</xref>). This research focused on the expert consultations and statements following government proposals on laws.</p><p>The research on how information resilience emerges within networks of actors in the drafting of legislation is important for three particular reasons. First, legislation is one of the key instruments of societal governance, emphasising the role of laws in reducing complexity and maintaining order within society (e.g. <xref ref-type="bibr" rid="R46">Luhmann 1985</xref>). The law is a system comprising the principal societal ideas, rules, and institutions and is key to determining how public, private, and civic actors operate in society. Legal systems embody foundational societal values, such as secure democratic decision-making, separation of state powers, and preservation of human rights (<xref ref-type="bibr" rid="R84">Waldron 2010</xref>). In the context of security, legislation is an important component that must convince a wide range of actors if it is to be useful and credible (Virta &#x0026; Branders 2016; Valtonen &#x0026; Branders 2020). <xref ref-type="bibr" rid="R3">Alasuutari and Qadir (2014)</xref> indicate this would mean that the legislative process must be able to create such debate and criteria that can also convince actors outside of the preparatory field of legislation. Knowledgeable stakeholders are more likely to engage in constructive dialogue and collaboration with policymakers (<xref ref-type="bibr" rid="R52">Nabatchi et al. 2012</xref>), which improves policy outcomes (<xref ref-type="bibr" rid="R28">Fung 2006</xref>). Scrutinising the parties involved in drafting legislation unveils the key governance actors, the links between them, and the types of actors absent from those networks.</p><p>Second, building information resilience has been highlighted as one possible way to prepare for various information-related challenges, such as increasing environmental uncertainty and the appearance of mis- and disinformation (Rantam&#x00E4;ki &#x0026; Jalonen 2022). Institutions encouraging the involvement of different social networks have been identified as an element that strengthens information resilience. However, findings from previous research suggest that the concept of information resilience requires further theoretical examination as well as empirical research on the subject (Rantam&#x00E4;ki &#x0026; Jalonen 2022; <xref ref-type="bibr" rid="R60">Rantam&#x00E4;ki 2023</xref>). In this study, we aim to address that gap by applying network analysis to examine the construction of the evidence base underlying the context of national security legislation and also the information resilience within that construction. The context of national security legislation was chosen mainly because several studies have identified the relationship between resilience and crises as one that is crucial to national security (e.g. <xref ref-type="bibr" rid="R17">Canetti et al. 2014</xref>; <xref ref-type="bibr" rid="R18">Dalgaard-Nielsen 2017</xref>; <xref ref-type="bibr" rid="R75">Svitkov&#x00E1; 2017</xref>).</p><p>Third, the notion of knowledge regimes as idea-producing entities relates to viewing networked interaction as a key characteristic of information resilience (Brassett &#x0026; Vaughan-Williams 2015; <xref ref-type="bibr" rid="R6">Bingham et al. 2017</xref>; Rantam&#x00E4;ki &#x0026; Jalonen 2022). Previous studies often use knowledge regimes as a framework for interpreting results, and consequently, there has been limited empirical examination of those regimes. At a national level, the nature of the knowledge regimes has been examined in various territories (Campbell &#x0026; Pedersen 2014; <xref ref-type="bibr" rid="R89">Zhu 2020</xref>), but there is a lack of research addressing knowledge regimes from the perspective of epistemic governance. Most research on knowledge regimes is conducted in the political economy field, but the concept also has the potential to help advance security research (Campbell &#x0026; Pedersen 2014). The current research explains how groups of actors apply epistemic work during the legislation process in the context of national security legislation.</p><p>The following research questions are intended to address the research gaps stated above: <italic>What is the structure and nature of the network that contributes to the development of the knowledge base for national security legislation? How can the concepts of knowledge regimes, epistemic governance, and information resilience assist in understanding and interpreting that network?</italic></p><p>Expert consultation and statements offer a unique perspective on the knowledge networks underpinning the legislative process. They reveal details of the parties being consulted, their relationships and expertise, the valuable information they bring, and how their advice is applied. These understandings help map the networks involved in creating national security legislation.</p></sec><sec id="sec2"><title>Theoretical Framework</title><sec id="sec3"><title>A network approach to governance</title><p>The transition from government to governance has highlighted the number of networks that create and direct the implementation of such governance. Governance can be seen as self-organising networks that cross organisations or societies (<xref ref-type="bibr" rid="R62">Rhodes 1996</xref>; Peters &#x0026; Pierre 1998). These networks enable the dispersion of authority and resources such as information (Smith-Doerr &#x0026; Powell 2005). The governance concept is based on solving societal problems through interaction between the state, industry, and civil society (<xref ref-type="bibr" rid="R42">Kooiman 1999</xref>). In a broad sense, it is a change in the interface between the state and civil society (<xref ref-type="bibr" rid="R64">Rhodes 2007</xref>), in which the role of decision-makers is to formulate societal objectives and enable the formation of networks appropriate to these objectives (Peters &#x0026; Pierre 1998). Global governance is largely based on a process of generating and transferring information, negotiated by stakeholders representing various interests, relationships, and institutional requirements (<xref ref-type="bibr" rid="R3">Alasuutari &#x0026; Qadir 2016</xref>). Instead of the government&#x2019;s goal-oriented and conscious activities, governance is about the sum of various interactions and activities (<xref ref-type="bibr" rid="R62">Rhodes 1996</xref>; <xref ref-type="bibr" rid="R35">Hufty 2011</xref>) and, conversely, about the steering produced by that sum of interaction (<xref ref-type="bibr" rid="R3">Alasuutari &#x0026; Qadir 2014</xref>).</p><p>The networked cooperation highlighted in the governance approach is also relevant to political decision-making. The network approach has, for example, been used in research on the effects of policy networks on decision-making structures and the use of informal power (e.g. <xref ref-type="bibr" rid="R63">Rhodes 2006</xref>; <xref ref-type="bibr" rid="R39">Klijn &#x0026; Koppenjan 2015</xref>). The approach also features in work on the advocacy coalition theory relating to various competing belief systems (<xref ref-type="bibr" rid="R66">Sabatier 1993</xref>). It has been suggested that the best way to understand the long-term change in policies is to look at the dynamics and efforts of networks in certain policy areas (<xref ref-type="bibr" rid="R66">Sabatier 1993</xref>, 16). Examples of such research include recent network analyses related to climate change decision-making (e.g. Wagner, Torney &#x0026; Yl&#x00E2;-Anttila 2021; <xref ref-type="bibr" rid="R29">Gronow et al. 2022</xref>).</p></sec><sec id="sec4"><title>The knowledge regime as an institutional arrangement</title><p>A knowledge regime refers to the set of <italic>institutional arrangements</italic> (see e.g. <xref ref-type="bibr" rid="R54">North 1990</xref>), norms, and practices that shape the production, dissemination, and validation of knowledge within a society. Such a regime can encompass academic institutions, research organisations, media outlets, and other knowledge-producing entities, as well as the rules and norms that govern their operation. Knowledge regimes can differ significantly across countries and cultural contexts, and those variations shape the forms of knowledge produced and valued. The idea of knowledge regimes is analytically closely related to the research tradition of policy networks. The review of regimes, which originally developed in the study of international relations, has since become more widespread in political and economic research. The knowledge regimes concept is used to examine organisational and institutional systems that produce different ideas for public debate and decision-making (Campbell &#x0026; Pedersen 2014, 3). The fundamental question is what are the different mechanisms that produce and convey these ideas and how these different ideas can, in turn, influence decision-making (Sorsa, Alaja &#x0026; Kaitila 2021).</p><p>Knowledge regimes are the organisations and institutions that administer different policy ideas (Campbell &#x0026; Pedersen 2015). Effective knowledge regimes help decision-makers justify their past views and decisions (Campbell &#x0026; Pedersen 2014, 340). Accordingly, the concept of knowledge regimes is linked to epistemic governance, which aims to influence others&#x2019; views (<xref ref-type="bibr" rid="R3">Alasuutari &#x0026; Qadir 2014</xref>).</p></sec><sec id="sec5"><title>Epistemic governance as a process</title><p>Epistemic governance is a <italic>process</italic> through which societies establish, maintain, and revise the rules, norms, and institutions that guide the production and distribution of knowledge (<xref ref-type="bibr" rid="R3">Alasuutari &#x0026; Qadir, 2014</xref>). Epistemic governance is crucial to the quality, credibility, and trustworthiness of knowledge within a society. Previous studies define epistemic governance as a bundle of efforts to shape commonly shared perceptions within a specific social context (<xref ref-type="bibr" rid="R3">Alasuutari &#x0026; Qadir 2014</xref>) and as practices through which the creation and dissemination of knowledge influence the comprehension of policy issues and the determination of priorities (Jacob &#x0026; Hellstr&#x00F6;m 2018). Actors working on the principle of epistemic governance aim to influence the views of others on the nature of reality and also the desirable and undesirable phenomena associated with that reality. Therefore, epistemic governance represents the interests that actors wish to see reflected in societal decision-making. Epistemic work is a way to implement epistemic governance (<xref ref-type="bibr" rid="R3">Alasuutari &#x0026; Qadir 2014</xref>), which can also be described as the different ways of channelling information relevant to decision-making. Epistemic governance creates visions that encourage people to frame situations and phenomena in a certain way (<xref ref-type="bibr" rid="R3">Alasuutari &#x0026; Qadir 2016</xref>).</p><p>Epistemic governance is also associated with the idea of epistemic authority or epistemic capital, the volume of which affects how much influence different actors have on others&#x2019; activities and decisions (<xref ref-type="bibr" rid="R2">Alasuutari 2018</xref>). In the case of epistemic governance, authority is seen as cumulative capital, meaning that using different means of influence and epistemic work can also strengthen their impact, thereby increasing the amount of epistemic authority (<xref ref-type="bibr" rid="R2">Alasuutari 2018</xref>, 168). The key point is that such authority is located in interactions. Various networks and so-called epistemic communities, that is, groups sharing common beliefs, have been acknowledged to have a significant impact on the selection of ideas underlying political decisions (<xref ref-type="bibr" rid="R30">Haas 2016</xref>). In epistemic communities, information is seen as a valuable resource that circulates continuously (<xref ref-type="bibr" rid="R30">Haas 2016</xref>; <xref ref-type="bibr" rid="R3">Alasuutari &#x0026; Qadir 2016</xref>; <xref ref-type="bibr" rid="R2">Alasuutari 2018</xref>).</p></sec><sec id="sec6"><title>Information resilience as system capacity</title><p>Prior research links information resilience, for example, to the ability of refugees to cope in a fragmented information environment (<xref ref-type="bibr" rid="R45">Lloyd 2017</xref>), to the role of various institutions in strengthening individual-level information resilience (<xref ref-type="bibr" rid="R4">V&#x00E5;rheim 2016</xref>), and to societal information infrastructures as a guarantor of stability (Scholl &#x0026; Patin 2013). In the context of disasters, information resilience has become relevant in the context of the self-organising fourth sector and voluntary activities, for example (<xref ref-type="bibr" rid="R59">Raisio et al., 2023</xref>).</p><p>In the field of public policy, information resilience has been defined as the <italic>capacity</italic> of individuals, communities, and societies to withstand misinformation, disinformation, and other forms of information manipulation and recover from them. The concept also encompasses the ability to operate amid information uncertainty and imperfection. Establishing information resilience involves the development of cognitive skills, critical thinking, media literacy, and a robust information infrastructure that enables people to access, evaluate, and use information effectively. It is a systemic phenomenon created by the interaction between actors in an uncertain and fluctuating environment (Rantam&#x00E4;ki &#x0026; Jalonen 2022.) The logic of emergence suggests information resilience is generated by the interaction between different actors and influences that interaction (<xref ref-type="bibr" rid="R8">Blitz 1992</xref>). Information resilience has been identified as a phenomenon that strengthens information-related agency and reduces information-related vulnerabilities, such as the effects of misinformation and disinformation (<xref ref-type="bibr" rid="R24">Filipec 2019</xref>; Rantam&#x00E4;ki &#x0026; Jalonen 2022). Information resilience is therefore seen as one of the key elements in forming a systemic situational awareness and a multi-dimensional evidence base for decision-making.</p></sec><sec id="sec7"><title>Networks as elements strengthening the information resilience of governance and legislation</title><p>The theoretical framework underpinning the current research employs the concepts of knowledge regimes, epistemic governance, and information resilience. <xref ref-type="fig" rid="F1">Figure 1</xref> illustrates the interfaces between those concepts. Their overlapping nature is not arbitrary but is a manifestation of their intricate connections and mutual dependencies. First, the intersection between <italic>epistemic governance</italic> and the <italic>knowledge regime</italic> domain reflects the manner in which institutions and their arrangements influence knowledge production, dissemination, and use. Institutional structures and norms actively shape epistemic processes, determining what knowledge is deemed significant and how it is attained. Second, the intersection between the <italic>knowledge regime</italic> and <italic>information resilience</italic> points to the connection between institutional arrangements and their capacity to adapt and resist informational challenges, such as misinformation and disinformation (<xref ref-type="bibr" rid="R24">Filipec 2019</xref>). An institution&#x2019;s structural arrangement can either strengthen the system&#x2019;s capacity to confront those challenges or render it more vulnerable (Rantam&#x00E4;ki &#x0026; Jalonen 2022). Third, the overlap between <italic>epistemic governance</italic> and <italic>information resilience</italic> points to the strategies and tactics that either amplify or diminish a system&#x2019;s resilience to information disturbance. The domain of <italic>networks and connections representing knowledge brokerage</italic>, bridging the three circles, underscores that knowledge brokering and mobility are paramount in the interaction between those concepts (see, e.g. Oldham &#x0026; McLean 1997; <xref ref-type="bibr" rid="R48">Meyer 2010</xref>). Knowledge networks and connections facilitate the flow, distribution, and reconfiguration of knowledge across different sections, creating a nexus between epistemic governance, the knowledge regime, and information resilience. The centrality of this network within the diagram is not merely a visual construction but mirrors the network&#x2019;s pivotal role in integrating and mediating interactions between the three realms. In summary, the figure provides a schematic representation and also comprehensively explores the fundamental relationships binding the concepts. It addresses the complexities inherent in the convergence of institutional structures, knowledge paradigms, and resilience strategies.</p><fig id="F1"><caption><p>Figure 1. The theoretical framework of the research.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="images\c2-fig1.jpg"/></fig><p>The legislative process embodies well-established social practices and structures that represent social institutions (<xref ref-type="bibr" rid="R13">Cairney &#x0026; Geyer 2017</xref>, 3) and bind groups of actors together in complex systems of governance (<xref ref-type="bibr" rid="R22">Eppel 2017</xref>, 847). Focusing research on the networks involved in building the knowledge base of legislation helps unmask the gatekeepers who are central to the emergence of information resilience and who implement epistemic governance. In this context, gatekeeping refers to critical information sharing, which can either enable or prevent interaction and the flow of information between information environments (<xref ref-type="bibr" rid="R29">Gronow et al. 2022</xref>; see e.g. White 1950 and Katz &#x0026; Lazarsfeld 1955 on the concept of gatekeeping). Scrutinising these networks also helps identify existing and missing links between groups of actors. These links can be viewed as forms of <italic>social capital</italic> essential for the manifestation of information resilience. In this research, social capital refers to multidirectional social links reflecting strong relationship structures (horizontal links, cf. <italic>bonding social capital</italic>) and the understanding of the need to work beyond institutional and sectoral boundaries (vertical and diagonal links, cf. <italic>bridging and linking social capital</italic>) required by the legislative process. Similar to social capital, the connections between different groups of actors are seen as valuable social resources that, among other things, enable access to the information resources of others (e.g. Smith-Doerr &#x0026; Powell 2005; Bhandari &#x0026; Yasunobu 2009; Hawkins &#x0026; Maurer 2010). Effective <italic>societal institutions</italic> can help construct competence-building capabilities &#x2013; such as those derived from information and media literacy &#x2013; and also foster the democratic decision-making underpinning societal governance. The networks building the evidence base of legislation represent the institutional arrangement of this decision-making process. Especially in the context of security and preparedness, this process requires a <italic>forward-looking perspective</italic> that is open to future uncertainties and is supported, for example, by diverse connections that produce various and even surprising perspectives (cf. <xref ref-type="bibr" rid="R78">Uusikyl&#x00E4; 2019</xref>, 89).</p><p>With regard to the knowledge regimes underlying the evidence base for national-level decision-making, it has been suggested that the knowledge regimes in Finland are not a single entity but are divided into sector-specific groups (Sorsa, Alaja &#x0026; Kaitila 2021). Building networks between researchers and decision-makers has been identified as one of the major challenges for evidence-based decision-making (<xref ref-type="bibr" rid="R26">Finnish Academy of Science and Letters, 2022</xref>). The finding supports previous research conclusions on how groups formed in the context of policymaking increasingly interact between the actors in their own groups, thereby weakening both the connections outside the group and the resulting innovation and diversity of information (<xref ref-type="bibr" rid="R78">Uusikyl&#x00E4; 2019</xref>, 89). Together, these findings create an impression of the evidence base of decision-making that lacks the vertical and diagonal connections required to build information resilience and gatekeepers conveying information between researchers and decision-maker groups. In this research, this initial assumption is tested with data consisting of a network that builds the evidence base of national security legislation in the Finnish context at one stage of the legislative process.</p></sec></sec><sec id="sec8"><title>Research Context and Methodology</title><p>Like other security measures in the Nordic area, Finland&#x2019;s Comprehensive Security Model (CSM) adopts an expansive view of potential threats, involves various stakeholders, including the public, and prioritises the preparation and execution of safety plans. Serving as both a theoretical framework and a functional governance structure, the CSM is consistently applied in security strategies, collaborative forums, and by political leaders (Valtonen &#x0026; Branders 2020). The concept of resilience, encompassing the protection of crucial infrastructure and the preservation of essential societal operations and societal security, is a fundamental component of Finland&#x2019;s CSM (<xref ref-type="bibr" rid="R59">The Security Committee 2023</xref>). That shift is confirmed in numerous policy documents produced by government departments (Hyv&#x00F6;nen &#x0026; Juntunen 2020).</p><p>This research examines the expert consultations related to the legislative process in the context of national security laws. The CSM involves a range of stakeholders, including the public, government departments, and other interested parties. Expert consultations are likely to reflect that diverse input and provide insights into the various perspectives and interests affecting the development of national security legislation. Expert consultation is a key part of the legislative process, providing the technical and theoretical underpinnings that inform policy formulation and implementation. Such consultation also provides a unique window onto the knowledge networks that underpin the legislative process, revealing who is being consulted, their affiliations and expertise, the information they provide, and how their advice is used. The information can reveal the networks behind the development of national security legislation. <xref ref-type="fig" rid="F2">Figure 2</xref> illustrates the Finnish legislative process to establish the overall picture and the positioning of the focus and data of this research.</p><fig id="F2"><caption><p>Figure 2. The Finnish legislative process (Finlex n.d.).</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="images\c2-fig2.jpg"/></fig><p>The data consist of expert hearings from the seventh stage of the legislative process (<italic>Parliamentary review</italic>), where the committee hearings occur between the government&#x2019;s proposal being submitted to parliament and parliamentary approval. Expert consultations following government proposals are a key part of the legislative process, as they are the last step before the parliamentary process is adopted or rejected. From the point of view of building an evidence base in the legislative process, committee consultations are the third part of the process that is inclusive of and responsive to stakeholders. However, as the legislative process progresses, the scope of consultation and participation is reduced. In the preparatory phase, stakeholders are consulted to assess the need for regulation but also to assess the target effects and the desired state of affairs. The consultation process triggered by the government&#x2019;s draft proposal includes selecting the main stakeholders to consult. In the post-government committee hearings, the scope of participation rests heavily on the independent consideration of the committees. Parliament&#x2019;s right to information can thus be said to rely to varying degrees on decisions made in committee (<xref ref-type="bibr" rid="R79">Uusikyl&#x00E4; et al. 2023</xref>).</p><p>The current research conducts network analysis to unveil the knowledge regimes and the information resilience within the networks of legislation, as reflected by the expert consultations on Finnish national security legislation. Network analysis is a proportionate method for exploring interaction structures and relationships between actors. In this context, network analysis refers primarily to the tradition of <italic>structural network analysis</italic> as a distinction between network metaphors, matrix organisations, or coordination mechanisms between markets and hierarchies (Scott &#x0026; Carrington 2011). Although structural network analysis relies heavily on mathematical methods and statistical analysis techniques originally developed in the graph theory, it tends to be seen as the underlying interpretative framework. Despite this, it is not a unified theory but rather a perspective on the analysis of interaction structures (Emirbayer &#x0026; Goodwin, 1994; <xref ref-type="bibr" rid="R9">Borgatti et al., 2009</xref>; Borgatti &#x0026; Lopez-Kidwell, 2014). <xref ref-type="bibr" rid="R41">Knoke and Kuklinski (1982</xref>, 13) justify structural analysis by stating that the relationship structure between operators and the positions of individual actors in the network is important not only to reveal the behaviour, observations, and attitudes of operators but also to aid in understanding the system as a whole. A structural analysis does not merely analyse the importance of individual network positions but encompasses the links between those social positions. The ever-changing interaction structures between social positions change role-based behaviours and allow room for new roles while changing old ones. Accordingly, the structural characteristics of the network and the role of the individual in the structure of the network are very important to the individual&#x2019;s activities and to the overall functioning of the system. However, the intensity of the activity, the importance assigned to the network structure, and how it is interpreted varies considerably between theoretical interpretations. The above-mentioned theoretical concepts provide a wide range of interpretative frameworks for the study of networks and social interaction systems.</p><p>Research on power and policy analysis has scrutinised various aspects of networks, such as the presence of overlapping memberships on firms&#x2019; supervisory boards or government committees, which are sometimes referred to as interlocking directorates. If the primary interpretive notions for trade networks across organisations centred upon competition and conflict, the presence of overlapping memberships could indicate collaborative efforts between organisations. The perspective suggests organisations endeavour to address environmental uncertainty by assimilating the variables contributing to uncertainty within their own structures. Such a policy could ensure the stability and survival of the organisation within a complex or dynamic environment. The presence of overlapping and cumulative relational patterns might indicate the consolidation of social power and the aggregation of capital into a limited set of stakeholder groups. From this standpoint, examining interlocking directorates resembles the theory of elitist power discussed by <xref ref-type="bibr" rid="R49">Mills (1956)</xref>. An exemplary illustration of this kind of research is that by <xref ref-type="bibr" rid="R73">Stokman et al. (1985)</xref> examining and comparing the concentration of economic structures across various countries.</p><p>Nevertheless, the diverse and multidisciplinary nature of the applications has contributed to the lack of a cohesive theoretical foundation to facilitate analysing organisational networks. Furthermore, the situation has hindered the development of a comprehensive theory encapsulating the role and importance of networks in shaping organisational behaviour (<xref ref-type="bibr" rid="R67">Salancik, 1995</xref>). Recent network analysis has effectively served as a quantitative approach to help examine intricate networks composed of multiple connections. The theoretical foundations typically consist of resource dependence theories (e.g. <xref ref-type="bibr" rid="R50">Mizruchi, 1992</xref>), resource mobilisation theories (<xref ref-type="bibr" rid="R44">Laumann-Knoke, 1987</xref>), elite theories (Domfhoff, 1979), state theories such as neo-corporatism and pluralism (Mattila, 1994), models of rational choice (<xref ref-type="bibr" rid="R74">Stokman, 1995</xref>), and neo-institutionalist organisational theories (DiMaggio &#x0026; Powell, 1991; <xref ref-type="bibr" rid="R70">Scott, 1995</xref>).</p><p>The data consist of lists of actors involved in the drafting processes. Data on actors and their background organisations were manually collected from the parliamentary database. The focus was on national security legislation and expert consultations on the relevant government proposals. The authors compiled an observation matrix of five government proposals made by experts in committee hearings and their organisations to facilitate the analysis of the networks. <xref ref-type="table" rid="T1">Table 1</xref> shows the number of committees involved in the various legislative proposals, the number of experts consulted, and the number of statements on each piece of proposed legislation.</p><table-wrap id="T1"><label>Table 1.</label><caption><title>Number of committees, experts consulted, and statements per government proposal.</title></caption><table><thead><tr><th align="center" valign="top">Government proposal</th><th align="center" valign="top">Number of committees</th><th align="center" valign="top">Number of experts</th><th align="center" valign="top">Number of statements</th></tr></thead><tbody><tr><td align="center" valign="top">HE 3/2008 Government proposal to Parliament for the Emergency Powers Act and certain related acts</td><td align="center" valign="top">13</td><td align="center" valign="top">100</td><td align="center" valign="top">147</td></tr><tr><td align="center" valign="top">HE 203/2017 Government proposal to Parliament for an Act on Military Intelligence and certain related acts</td><td align="center" valign="top">7</td><td align="center" valign="top">118</td><td align="center" valign="top">252</td></tr><tr><td align="center" valign="top">HE 202/2017 Government proposal to Parliament to Legislation on Civilian Intelligence</td><td align="center" valign="top">7</td><td align="center" valign="top">117</td><td align="center" valign="top">265</td></tr><tr><td align="center" valign="top">HE 199/2017 Government proposal to Parliament on the supervision of intelligence gathering activities and for an Act amending section 7 of the Civil Service Act</td><td align="center" valign="top">7</td><td align="center" valign="top">87</td><td align="center" valign="top">154</td></tr><tr><td align="center" valign="top">HE 261/2016 Government proposal to Parliament for an Act on the Government Situation Centre</td><td align="center" valign="top">2</td><td align="center" valign="top">18</td><td align="center" valign="top">20</td></tr></tbody></table></table-wrap><p>The experts consulted in the various committees were listed by the piece of legislation in their respective Excel tables, from where data were transferred to the Ucinet software to facilitate network analysis. The list consisted of the actors, their expert roles, the organisations they represented, and the committees involved. The experts were also divided into groups according to whether they were associated with public administration (including civil servants and political decision-makers), the scientific community, industry and business sector, and the third sector, meaning associations and non-governmental organisations. The study then computed the frequency and overlap of interaction structures between the organisations, the centrality of the organisations and the groups they represented, and also the linkages between the legislative proposals under consideration through the presence of joint experts.</p></sec><sec id="sec9"><title>Findings</title><p>The networks involved in the construction of the evidence base of legislation were analysed in three ways. The first analysis focused on the actors, and its results showed the experts representing the creative and knowledge-based gatekeepers who set up links between the legal entities and conduct epistemic work. The second analysis examined the organisations and their concentration. This concentration meant the distribution of statements among the actors of each organisation. Thirdly, the networks were examined from the point of view of the groups of actors, describing how the respondents and their organisations settled in the groups defined in the study and how those groups were represented in the consultations highlighting the structures of the knowledge regime in the context of national security legislation. In combination, the observations help reveal a network that underpins the evidence base of legislation. The observations on gatekeeping and connections between groups of actors also convey the information resilience that emerges within the network.</p><p>First, a network of experts formed around the government&#x2019;s presentations showed that the Civil Intelligence Act (HE 202/2017), the Military Intelligence Act (HE 203/2017), and the government&#x2019;s proposal on intelligence supervision (HE 199/2017) formed a fixed cluster cemented by a common knowledge regime. At its core were officials from the ministries involved in the preparation of laws (particularly the Ministry of Interior, Ministry of Defence, and Ministry of Justice) and representatives of key interest groups (Amnesty International, the Confederation of Finnish Industries, and the Human Rights Federation). In addition to the above, the actor-oriented review highlighted the key role of scientific experts in the network. The role of Finland&#x2019;s leading constitutional experts as gatekeepers at the heart of various legislative proposals is noteworthy. A clique of five professors of law and three key officials formed an intermediary structure in the regulatory field of national security (<xref ref-type="fig" rid="F3">Figure 3</xref>). With regard to the network analysis indicators, the centrality of those eight actors is higher than that of other actors, most of whom can be considered peripheral (Hanneman &#x0026; Riddle 2014, 363). By centrality, we refer to the number of direct links that the actor has with other nodes in the network (<italic>degree centrality</italic>) as well as to the intermediary or bridging role these actors have in the network (<italic>betweenness centrality</italic>) (Wasserman &#x0026; Faust 1994; Hanneman &#x0026; Riddle 2014, 364-366). It has been suggested that greater centrality in networks is linked to both greater influence and more constraints and obligations (see, e.g. Smith-Doerr &#x0026; Powell 2005; Hanneman &#x0026; Riddle 2014, 363). These eight key actors can therefore be considered to have the most influence and the most epistemic authority accumulated by the various overlapping consultations.</p><fig id="F3"><caption><p>Figure 3. The position of actors in the network.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="images\c2-fig3.jpg"/></fig><p>Several actors were involved in more than one of the legislative committee hearings, and thus actors formed entities that differed from their original groups. An examination of those groups identified key informants and actors spanning different groups. The repeated appearance of the same actors in expert hearings on different pieces of legislation raises the question of whether the network formed around a single bill is built in a phenomenon-based approach to the issues related to the legislation or whether the networks are more based on the process of legal drafting and familiar expertise (compare the <italic>usual suspects</italic>, e.g. Blackstock, Kirk &#x0026; Reeves 2004). Although the previous research on the Finnish knowledge regimes indicates a case-by-case selection of data producers, the finding has been interpreted as being due more to structural changes in the decision-making system than to the specific selection of the most suitable data producers (<xref ref-type="bibr" rid="R72">Sorsa, Alaja &#x0026; Kaitila 2021</xref>).</p><p>Second, in addition to the actor-centric approach, the contributions of the various organisations were observed by examining how they were represented in committee hearings. A total of 123 organisations were represented, and 838 statements were issued, of which the 20 most representative organisations accounted for 532 opinions, 63% of all opinions given (<xref ref-type="fig" rid="F4">Figure 4</xref>).</p><fig id="F4"><caption><p>Figure 4. The main organisations and the number of experts representing them in the consultation network.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="images\c2-fig4.jpg"/></fig><p>Networks were studied to discern the concentration of different organisations and groups of actors. The term <italic>concentration</italic> refers here to the number of actors to whom statements issued by one organisation or group were distributed. An examination of the concentration of different organisations revealed that the number of actors giving statements was relatively small, especially in the case of the most consulted organisations. In contrast, representatives of organisations that issued fewer statements also issued fewer statements per actor. Accordingly, the number of actors who gave statements varied less than the number of statements per organisation. The most concentrated organisations were the Ministry of Justice (6.6 statements per expert), the Ministry of Defence (4.9 statements per expert), the Office of the Parliament (3.7 statements per expert), and the Ministry of the Interior (3.3 statements per expert). The hearings focused on the public administration group, particularly the related security cluster, which included the Ministry of the Interior, the Ministry of Defence, the Ministry of Justice, and the Finnish Security Intelligence Service. These same organisations, including the Office of the Parliament and excluding the Finnish Security Intelligence Service, were particularly concentrated. In practice, this means that the actors of these organisations had a stronger epistemic authority and a key role in the knowledge-building process behind the legislation. The share of public organisations among the 20 most consulted organisations was high, both among the most consulted organisations (84%) and among the overall number of consultations (53%). As for the scientific community, the two universities among the most consulted organisations were represented in particular by legal practitioners focusing on the Constitution. The associations and NGOs were represented by Effi ry, which defends the rights of citizens in the context of information technology and the digital world. The only representative of the business sector among the most consulted organisations was the state-owned Finland&#x2019;s Separate Networks, which is controlled by the Prime Minister&#x2019;s Office. The situation raises a question on the actual participation of the business and industry sector in the process of national security legislation despite the majority of the critical information infrastructure being in the hands of this particular sector.</p><p>Third, the distribution of statements between the groups of actors was also examined. The actors and the organisations they represented were divided into public administration &#x2013; including officials, civil servants, and political decision-makers &#x2013; the scientific community, industry and business, and associations. In addition, an other-actors group was formulated to encompass the Finnish Centre for Pensions and the Matriculation Examination Board. The division of statements by group of actors and their share of the total amount of statements are shown in <xref ref-type="table" rid="T1">Table 2</xref>. The public administration group was both the most heard and the most concentrated of the different actor groups, with each actor providing approximately 2.3 statements.</p><table-wrap id="T2"><label>Table 2.</label><caption><title>Distribution and proportion of total number of statements.</title></caption><table><thead><tr><th align="center" valign="top">Organization group</th><th align="center" valign="top">Statements</th><th align="center" valign="top">Actors</th><th align="center" valign="top">Statement/actor</th><th align="center" valign="top">Share of total statements</th></tr></thead><tbody><tr><td align="center" valign="top">Public administration</td><td align="center" valign="top">571</td><td align="center" valign="top">251</td><td align="center" valign="top">2.27</td><td align="center" valign="top">0.68</td></tr><tr><td align="center" valign="top">Scientific community</td><td align="center" valign="top">99</td><td align="center" valign="top">56</td><td align="center" valign="top">1.77</td><td align="center" valign="top">0.12</td></tr><tr><td align="center" valign="top">Business</td><td align="center" valign="top">45</td><td align="center" valign="top">31</td><td align="center" valign="top">1.45</td><td align="center" valign="top">0.05</td></tr><tr><td align="center" valign="top">Associations</td><td align="center" valign="top">121</td><td align="center" valign="top">100</td><td align="center" valign="top">1.21</td><td align="center" valign="top">0.14</td></tr><tr><td align="center" valign="top">Other</td><td align="center" valign="top">2</td><td align="center" valign="top">2</td><td align="center" valign="top">1.00</td><td align="center" valign="top">0.00</td></tr></tbody></table></table-wrap><p>An analysis of the groups of actors showed that a wide range of associations and NGOs participated in the consultations, although only one of them was among the 20 most involved organisations. The hearings highlighted the role of technology associations, information networks, and various lobby groups. The business and industry group played a limited role in the consultations as a whole, despite the central role of industry in social preparedness and the support of critical infrastructure in society.</p></sec><sec id="sec10"><title>Conclusions</title><p>The current research aims to reveal the structure and nature of the network contributing to the knowledge base for national security legislation and how the concepts of knowledge regimes, epistemic governance, and information resilience assist in interpreting that network.</p><sec id="sec11"><title>Structural view on the knowledge-building network</title><p>The research illustrates the structure and nature of the network contributing to the development of the knowledge base for national security legislation. The results present an image of a network mainly comprising government officials with some representatives of the scientific community, associations of non-governmental organisations, and a few members of the business and industry sectors. The results align with previous research identifying how, while the opportunity of consultation is theoretically open to all, different actors and organisations have different participation options in the legislative processes (<xref ref-type="bibr" rid="R1">Aaltola &#x0026; Juntunen 2018</xref>; <xref ref-type="bibr" rid="R58">Princen 2022</xref>). In particular, legislative proposals concerning intelligence legislation form a close cluster, and the same actors are repeatedly consulted. The proposals related to the Situation Centre and the Emergency Powers Act are somewhat separate from this cluster, but all clusters are connected through a few individuals.</p></sec><sec id="sec12"><title>Network defining the knowledge regime</title><p>The results suggest that the national security legislation is based on a <italic>technical-legal knowledge regime</italic>. The expert hearings strongly highlight constitutional aspects and the statements of defence-related government officials, as previous research also suggests (see, e.g. <xref ref-type="bibr" rid="R43">Larsson 2020</xref>). The evidence base underpinning legislation is usually produced by competent actors (<xref ref-type="bibr" rid="R58">Princen 2022</xref>). Defence-related knowledge regimes are considered more isolated and to generally involve fewer research organisations (<xref ref-type="bibr" rid="R15">Campbell &#x0026; Pedersen 2014</xref> 337). However, many key functions of society are affected by the underlying phenomena of legislation, so a more multidisciplinary approach would be needed to better take account of the intertwining and complexity of these phenomena. Supplementing the legal perspective with different aspects of social and behavioural sciences could strengthen the understanding of the societal implications of proposed legislative changes and the claims of legislative changes originating in other sectors. However, the change in network cooperation and the culture supporting it is slow and essentially central government-driven. Similarly, the change in knowledge regimes is institutionally limited and path-dependent (<xref ref-type="bibr" rid="R15">Campbell &#x0026; Pedersen 2014</xref>, 341). Overall, these findings strongly indicate a need to reconsider knowledge management practices in parliament and how the decision-making processes of various committees should be developed.</p></sec><sec id="sec13"><title>The representation of epistemic governance in the network</title><p>The concept of <italic>epistemic governance</italic> prompts an examination of the actors located between different systems. These actors are seen as epistemic workers who act as information brokers between different systems and influence the connections formed between different systems. They can also be seen as gatekeepers that can either promote or prevent the manifestation of information resilience (Rantam&#x00E4;ki &#x0026; Jalonen 2022). The main epistemic governance and gatekeeping actors are legal experts, some of whom (e.g. constitutional experts) are very visible, and a few central government officials. The positioning of legal scientists as constitutionally aware gatekeepers is expected in the context of intelligence legislation, where safeguarding fundamental human rights is essential. The frequent appearance of certain officials and their role in information dissemination in the period covering legislative processes and the formulation of the law is particularly interesting. Epistemic authority approaches its zenith when the same actor is consulted in more than one context. Those officials who have consulted for both legal entities and committees have a high level of epistemic authority (<xref ref-type="bibr" rid="R2">Alasuutari 2018</xref>). However, the network can only reveal the actors conducting epistemic governance but not the way in which they do so. The network may also include &#x2018;hidden&#x2019; gatekeepers: actors who determine who are consulted during the committee stages.</p></sec><sec id="sec14"><title>The manifestation of information resilience in the network</title><p>The manifestation of <italic>information resilience</italic> is dependent on the development of horizontal, vertical, and diagonal links between different information environments (Rantam&#x00E4;ki &#x0026; Jalonen 2022). In addition to legal experts, the consultations focused on the role of public administration and, in particular, on the related security cluster, which included various security-related actors, such as the Ministry of Defence and the Finnish Security Intelligence Service. The strong emphasis on civil servants reflects the high level of horizontal contacts (see e.g. <xref ref-type="bibr" rid="R78">Uusikyl&#x00E4; 2019</xref>). The links between legislation and various security-related actors, such as the police and district courts, reflect the vertical links. The vertical links to the safety cluster in national security legislation are logical. The group of associations was well represented in the hearings, although the associations involved were strongly lobbying-oriented. The participation of the business community in the network is very limited. These findings and the above observation of the shortcomings of multidisciplinary participants can be seen as illustrative of inadequate diagonal links in terms of information resilience. Diagonal links have also been considered particularly important for the construction of a diverse evidence base supporting the construction of information resilience (Yang &#x0026; <xref ref-type="bibr" rid="R88">Wu 2020</xref>). The results highlight the need to strengthen diagonal links in decision-making in particular. These diagonal links both reinforce the linking social capital of legislation and decision-making and allow access to a broader evidence base that enables the utilisation of a forward-looking and phenomenon-driven perspective on societal challenges.</p><p>Prerequisites of information resilience include the acceptance of uncertainty and ignorance (e.g. <xref ref-type="bibr" rid="R19">DeNicola 2018</xref>) and creative and flexible approaches to foresight. Without multidirectional connections and the silent signals or new openings produced by stakeholders, such anticipation would be difficult (e.g. <xref ref-type="bibr" rid="R78">Uusikyl&#x00E4; 2019</xref>). The results portray a network that is strongly civil- servant-centric and lacks sufficient links with other groups of actors. Increasing the systemic connections between decision-making processes and different organisations and communities, including a more diverse view of the scientific community, could expand the evidence base of legislation and thus help build a more systemic approach to society, its needs, and the means of strengthening its security and resilience (<xref ref-type="bibr" rid="R1">Aaltola &#x0026; Juntunen 2018</xref>).</p></sec><sec id="sec15"><title>Summary of the findings</title><p>A robust knowledge regime is crucial to effective epistemic governance. It provides the institutional framework and norms that guide the production and dissemination of knowledge, ensuring that information is accurate, credible, and relevant to societal needs. In turn, strong epistemic governance helps maintain and improve the quality of the knowledge regime, as it sets the standards for knowledge production and distribution. Information resilience is a critical component of both knowledge regimes and epistemic governance. A society with high information resilience is better equipped to protect itself from misinformation and disinformation, which can undermine the credibility and effectiveness of the knowledge regime. In turn, effective epistemic governance fosters information resilience by encouraging critical thinking, media literacy, and the cultivation of reliable information sources. The three concepts are interconnected and mutually reinforcing. A strong knowledge regime supports effective epistemic governance, which in turn fosters information resilience. Information resilience, in turn, helps to maintain the integrity of the knowledge regime and the effectiveness of epistemic governance.</p><p>Incorporating the results into the theoretical framework indicates that constitutional experts and a few key officials act as gatekeepers with epistemic authority and as actors implementing epistemic governance. According to the results, the number of vertical and diagonal connections is limited. The results of the research thus confirm previous findings of inadequate links between decision-making and the scientific community (<xref ref-type="bibr" rid="R26">Finnish Academy of Science and Letters 2021</xref>) as well as decision-making and citizens (<xref ref-type="bibr" rid="R78">Uusikyl&#x00E4; 2019</xref>). The idea-building regime of legal science has slack, meaning overlapping connections that can replace each other if needed. Slack among the connections is important for the construction of information resilience (Rantam&#x00E4;ki &#x0026; Jalonen 2022). However, there are no links between other scientific fields and legislative hearings. The results indicate that the Finnish legislative process is guided by an institutional tradition comprising both written guidelines and unwritten consultation practices.</p><p>The results show that the expert consultations behind the legislation are official-oriented, include limited information produced by the private sector, and hold a narrow view of scientific expertise. The network can identify gatekeepers as epistemic authorities, mainly representing the security cluster. The security cluster refers to those societal actors that have traditionally been associated with safeguarding social security, such as the police, the border guard, the Ministry of the Interior, and the Ministry of Defence. A more systemic approach is needed to build an evidence base that takes better account of the views on societal phenomena of the various disciplines.</p></sec></sec><sec id="sec16"><title>Discussion</title><p>This research contributes to public policy research both theoretically and pragmatically. The theoretical contribution is threefold. First, the research advances the theoretical understanding of information resilience. While information resilience has been studied in the context of individuals, preparedness, and crises, it has not been studied from a social networks perspective. This research highlights the role of gatekeepers in ensuring information diversity in one institutional network. Second, this article brings the research of knowledge regimes into the context of security. As Campbell and Pedersen (2014) advocated, this research showcases a knowledge regime that involves more state and fewer research or private sector organisations. This study thus reinforces the previous understanding that in the context of security, the knowledge regimes are narrow. Third, the article introduces a framework that showcases the links between the three theoretical concepts. Previous research has focused more on material interests than institutions, ideas, and immaterial interests (<xref ref-type="bibr" rid="R85">Walter &#x0026; Sen 2009</xref>, 231). Future studies could exploit the theoretical framework established in this research, especially as it acknowledges the importance of information and the immaterial perspective in public administration and policy research. This research illustrates how the analysis of networks of governance can increase the visibility of those research interests and identify the key strengths and weaknesses of the networks&#x2019; resilience.</p><p>The pragmatic contribution is also three-pronged. First, the study provides empirical evidence of the types of actors and groups involved in the process of national security legislation. The research results show that the expert consultations underpinning the legislative process are official-oriented, which illuminates the limited information produced by the private sector and a narrow view of scientific expertise. Second, the study provides an understanding of the evidence base of national security legislation and the underlying technical-legal knowledge regime. The results highlight the key role of government officials and constitutional experts in building the evidence base supporting the legislation. Third, the study reveals the formation of systemic links and the gatekeepers essential to reinforce information resilience in the institutional context of legislation. The network reveals epistemic authorities acting as gatekeepers, mainly representing the security cluster. Overall, the research shows that the analysis of networks makes it possible to identify the connections representing knowledge brokerage, gatekeeping, and social capital, as well as the connections missing from the network. The result should encourage the development of knowledge-producing networks so that relevant policy issues can be examined on a broader context, giving better access to different stakeholders.</p><p>This research examines national security legislation by focusing on expert consultations on legislative proposals. Future research should perhaps pay attention to the other stages of the legislative process and the associated networks of participants. Additionally, examining the network of actors does not reveal how the statements made utilise argumentation or persuasion. This research highlights the key parties to constructing the evidence base and the connections between them; however, further research is needed to understand how epistemic work is carried out and epistemic authority built into these legislative processes. That aspect could be better explored by examining the content of the statements. It is also worth noting that institutional contexts vary by country (e.g. <xref ref-type="bibr" rid="R47">March &#x0026; Olsen 1996</xref>). Therefore, research might benefit from undertaking an institutional analysis with a comparative perspective (cf. <xref ref-type="bibr" rid="R57">Pollitt &#x0026; Bouckaert 2017</xref>). That approach could identify patterns, similarities, and differences in how countries develop their national security knowledge base and reveal how institutional contexts shape such processes.</p><p>Some key constraints and challenges have been identified in the implementation of this research. One of the challenges is the temporal placement of the laws examined. The data consist of five acts of parliament, four of which were prepared during 2017&#x2013;2018, while the Emergency Act dates from several years earlier. This time gap particularly affected the actor-specific analysis, as it is assumed that the main actors in public administration will have changed over the nearly ten years between the acts. The second challenge relates to the framework of the knowledge regimes, as it has previously been used mainly in political-economic research. However, previous research has hypothesised on the regimes of other policy areas (<xref ref-type="bibr" rid="R15">Campbell &#x0026; Pedersen 2014</xref>, 337). Knowledge regimes could also have explanatory power in the context of other policy issues, such as security and preparedness. Additionally, the research focuses on one phase of the legislative process, thus constraining interpretations of the overall evidence base of the legislation or the diversity of the debate behind the legislative initiatives. This research does not aim to create a nationally applicable interpretation of the underlying knowledge regimes that influence societal decision-making. It does, however, provide an overview of one part of the decision-making network using knowledge regimes as an analytical lens.</p></sec><sec id="sec17"><title>Funding</title><p>The article has been written as part of the Information Resilience in a Wicked Environment - project funded by the Academy of Finland and implemented during 2021&#x2013;2023 (IRWIN; decision number 337760).</p></sec></body><back><ref-list id="references"><title>References</title><ref id="R1"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Aaltola</surname><given-names>Mika</given-names></name><name><surname>Juntunen</surname><given-names>Tapio</given-names></name></person-group><year>2018</year><article-title>&#x2018;Nordic model meets resilience: Finnish strategy for societal security&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Aaltola</surname><given-names>Mika</given-names></name><name><surname>Kuznetsov</surname><given-names>Boris</given-names></name><name><surname>Spruds</surname><given-names>Andris</given-names></name><name><surname>Vizgunova</surname><given-names>Elizabete</given-names></name></person-group><source>Societal Security in the Baltic Sea region: Expertise mapping and raising policy relevance</source><publisher-name>Latvian Institute for International Affairs</publisher-name><publisher-loc>Riga</publisher-loc></element-citation></ref><ref id="R2"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Alasuutari</surname><given-names>Pertti</given-names></name></person-group><year>2018</year><article-title>Authority as epistemic capital</article-title><source>Journal of Political Power</source><volume>11</volume><issue>2</issue><fpage>165</fpage><lpage>190</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/2158379X.2018.1468151">https://doi.org/10.1080/2158379X.2018.1468151</ext-link></element-citation></ref><ref id="R3"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Alasuutari</surname><given-names>Pertti</given-names></name> &#x0026; <name><surname>Qadir</surname><given-names>Ali</given-names></name></person-group><year>2014</year><article-title>Epistemic governance: an approach to the politics of policy-making</article-title><source>European Journal of Cultural and Political Sociology</source><volume>1</volume><issue>1</issue><fpage>67</fpage><lpage>84</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/23254823.2014.887986">https://doi.org/10.1080/23254823.2014.887986</ext-link></element-citation></ref><ref id="R4"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Alasuutari</surname><given-names>Pertti</given-names></name><name><surname>Qadir</surname><given-names>Ali</given-names></name></person-group><year>2016</year><article-title>Imageries of the social world in epistemic governance</article-title><source>International Sociology</source><volume>31</volume><issue>6</issue><fpage>633</fpage><lpage>652</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/0268580916662386">https://doi.org/10.1177/0268580916662386</ext-link></element-citation></ref><ref id="R5"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bhandari</surname><given-names>Humnath</given-names></name><name><surname>Yasunobu</surname><given-names>Kumi</given-names></name></person-group><year>2009</year><article-title>What is social capital? A comprehensive review of the concept</article-title><source>Asian Journal of Social Science</source><volume>37</volume><issue>3</issue><fpage>480</fpage><lpage>510</lpage></element-citation></ref><ref id="R6"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bingham</surname><given-names>Tricia Jane</given-names></name><name><surname>Wirjapranata</surname><given-names>Josie</given-names></name><name><surname>Bartley</surname><given-names>Allen</given-names></name></person-group><year>2017</year><article-title>Building resilience and resourcefulness. The evolution of an academic and information literacy strategy for first year social work students</article-title><source>Information and Learning Science</source><volume>118</volume><issue>7/8</issue><fpage>433</fpage><lpage>446</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/ILS-05-2017-0046">https://doi.org/10.1108/ILS-05-2017-0046</ext-link></element-citation></ref><ref id="R7"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Blackstock</surname><given-names>Kirsty</given-names></name><name><surname>Kirk</surname><given-names>Elizabeth</given-names></name><name><surname>Reeves</surname><given-names>Alison</given-names></name></person-group><year>2004</year><article-title>Just the usual suspects? Partnerships and environmental regulation</article-title><source>Environment and Planning C: Government and Policy</source><volume>22</volume><issue>5</issue><fpage>651</fpage><lpage>666</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1068/c03110s">https://doi.org/10.1068/c03110s</ext-link></element-citation></ref><ref id="R8"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Blitz</surname><given-names>David</given-names></name></person-group><year>1992</year><article-title>Emergent Evolution: Qualitative Novelty and the Levels of Reality</article-title><publisher-name>Kluwer Academic Publishers</publisher-name><publisher-loc>Dordrecht</publisher-loc></element-citation></ref><ref id="R9"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Borgatti</surname><given-names>Stephen P</given-names></name><name><surname>Mehra</surname><given-names>Ajay</given-names></name><name><surname>Brass</surname><given-names>Daniel J</given-names></name><name><surname>Labianca</surname><given-names>Giuseppe</given-names></name></person-group><year>2009</year><article-title>Network analysis in the social sciences</article-title><source>Science</source><volume>323</volume><issue>5916</issue><fpage>892</fpage><lpage>895</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1126/science.1165821">https://doi.org/10.1126/science.1165821</ext-link></element-citation></ref><ref id="R10"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Borgatti</surname><given-names>Stephen P</given-names></name><name><surname>Lopez-Kidwell</surname><given-names>Virginie</given-names></name></person-group><year>2014</year><article-title>&#x2018;Network theory&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Scott</surname><given-names>John</given-names></name><name><surname>Carrington</surname><given-names>Peter J</given-names></name></person-group><source>The SAGE Handbook of Social Network Analysis</source><publisher-name>SAGE Publications Ltd</publisher-name><publisher-loc>London</publisher-loc></element-citation></ref><ref id="R11"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Brassett</surname><given-names>James</given-names></name><name><surname>Vaughan-Williams</surname><given-names>Nick</given-names></name></person-group><year>2015</year><article-title>Security and the performative politics of resilience: Critical infrastructure protection and humanitarian emergency preparedness</article-title><source>Security Dialogue</source><volume>46</volume><issue>1</issue><fpage>32</fpage><lpage>50</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/0967010614555943">https://doi.org/10.1177/0967010614555943</ext-link></element-citation></ref><ref id="R12"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Cairney</surname><given-names>Paul</given-names></name></person-group><year>2016</year><source>The Politics of Evidence-Based Policy Making</source><publisher-name>Palgrave Macmillan</publisher-name><publisher-loc>Basingstoke</publisher-loc></element-citation></ref><ref id="R13"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cairney</surname><given-names>Paul</given-names></name><name><surname>Geyer</surname><given-names>Robert</given-names></name></person-group><year>2017</year><article-title>A critical discussion of complexity theory: How does &#x2018;complexity thinking&#x2019; improve our understanding of politics and policymaking?</article-title><source>Complexity, Governance &#x0026; Networks</source><volume>3</volume><issue>2</issue><fpage>1</fpage><lpage>11</lpage></element-citation></ref><ref id="R14"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Cairney</surname><given-names>Paul</given-names></name><name><surname>Heikkila</surname><given-names>Tanya</given-names></name><name><surname>Wood</surname><given-names>Matthew</given-names></name></person-group><year>2019</year><source>Making Policy in a Complex World</source><publisher-name>Cambridge University Press</publisher-name><publisher-loc>Cambridge</publisher-loc></element-citation></ref><ref id="R15"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Campbell</surname><given-names>John L</given-names></name><name><surname>Pedersen</surname><given-names>Ove K</given-names></name></person-group><year>2014</year><source>The National Origins of Policy Ideas. Knowledge Regimes in the United States, France, Germany, and Denmark</source><publisher-name>Princeton University Press</publisher-name><publisher-loc>Princeton</publisher-loc></element-citation></ref><ref id="R16"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Campbell</surname><given-names>John</given-names></name><name><surname>Pedersen</surname><given-names>Ove</given-names></name></person-group><year>2015</year><article-title>Policy ideas, knowledge regimes and comparative political economy</article-title><source>Socio-Economic Review</source><volume>13</volume><issue>4</issue><fpage>679</fpage><lpage>701</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1093/ser/mwv004">https://doi.org/10.1093/ser/mwv004</ext-link></element-citation></ref><ref id="R17"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Canetti</surname><given-names>Daphna</given-names></name><name><surname>Waismel-Manor</surname><given-names>Israel</given-names></name><name><surname>Cohen</surname><given-names>Naor</given-names></name><name><surname>Rapaport</surname><given-names>Carmit</given-names></name></person-group><year>2014</year><article-title>What does national resilience mean in a democracy? Evidence from the United States and Israel</article-title><source>Armed Forces &#x0026; Society</source><volume>40</volume><issue>3</issue><fpage>504</fpage><lpage>520</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org./10.1177/0095327X12466828">https://doi.org./10.1177/0095327X12466828</ext-link></element-citation></ref><ref id="R18"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Dalgaard-Nielsen</surname><given-names>Anja</given-names></name></person-group><year>2017</year><article-title>Organizational resilience in national security bureaucracies: Realistic and practicable?</article-title><source>Journal of Contingencies and Crisis Management</source><volume>25</volume><issue>4</issue><fpage>341</fpage><lpage>349</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/1468-5973.12164">https://doi.org/10.1111/1468-5973.12164</ext-link></element-citation></ref><ref id="R19"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>DeNicola</surname><given-names>Daniel, R</given-names></name></person-group><year>2018</year><source>Understanding Ignorance. The Surprising Impact of What We Don&#x2019;t Know</source><publisher-name>MIT Press</publisher-name><publisher-loc>Cambridge</publisher-loc></element-citation></ref><ref id="R20"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>DiMaggio</surname><given-names>Paul J</given-names></name><name><surname>Powell</surname><given-names>Walter W</given-names></name></person-group><year>1991</year><article-title>&#x2018;The Iron Cage revisited: Institutional isomorphism and collective rationality in organizational fields&#x2019;</article-title><person-group person-group-type="editor"><name><surname>DiMaggio</surname><given-names>Paul J</given-names></name><name><surname>Powell</surname><given-names>Walter W</given-names></name></person-group><source>The New Institutionalism in Organizational Analysis</source><publisher-name>Chicago University Press</publisher-name><publisher-loc>Chicago</publisher-loc></element-citation></ref><ref id="R21"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Emirbayer</surname><given-names>Mustafa</given-names></name><name><surname>Goodwin</surname><given-names>Jeff</given-names></name></person-group><year>1994</year><article-title>Network analysis, culture, and the problem of agency</article-title><source>American Journal of Sociology</source><volume>99</volume><issue>6</issue><fpage>1411</fpage><lpage>1454</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1086/230450">https://doi.org/10.1086/230450</ext-link></element-citation></ref><ref id="R22"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Eppel</surname><given-names>Elizabeth</given-names></name></person-group><year>2017</year><article-title>Complexity thinking in public administration&#x2019;s theories-in-use</article-title><source>Public Management Review</source><volume>19</volume><issue>6</issue><fpage>845</fpage><lpage>861</lpage></element-citation></ref><ref id="R23"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ferlie Ewan</surname><given-names>Fitzgerald</given-names></name><name><surname>Louise McGivern</surname><given-names>Gerry</given-names></name><name><surname>Dopson</surname><given-names>Sue</given-names></name><name><surname>Bennett</surname><given-names>Chris</given-names></name></person-group><year>2011</year><article-title>Public policy networks and &#x2018;wicked problems&#x2019;: A nascent solution?</article-title><source>Public Administration</source><volume>89</volume><issue>2</issue><fpage>307</fpage><lpage>324</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/j.1467-9299.2010.01896.x">https://doi.org/10.1111/j.1467-9299.2010.01896.x</ext-link></element-citation></ref><ref id="R24"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Filipec</surname><given-names>Ondrej</given-names></name></person-group><year>2019</year><article-title>Towards a disinformation resilient society? The experience of the Czech Republic</article-title><source>Cosmopolitan Civil Societies: An Interdisciplinary Journal</source><volume>11</volume><issue>1</issue><fpage>1</fpage><lpage>26</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5130/ccs.v11.i1.6065">https://doi.org/10.5130/ccs.v11.i1.6065</ext-link></element-citation></ref><ref id="R25"><element-citation publication-type="book"><person-group person-group-type="author"><collab>Finlex</collab></person-group><source>Legislative Drafting Process Guide</source><ext-link ext-link-type="uri" xlink:href="http://lainvalmistelu.finlex.fi/en/">http://lainvalmistelu.finlex.fi/en/</ext-link></element-citation></ref><ref id="R26"><element-citation publication-type="book"><person-group person-group-type="author"><collab>Finnish Academy of Science and Letters</collab></person-group><year>2022</year><article-title>Tiedeneuvonnan kehitt&#x00E4;mishanke SOFI [Science Advice Initiative of Finland]. Suomen nelj&#x00E4;n tiedeakatemian yhteinen, vuosina 2019&#x2013;2021 toteuttama ja opetus- ja kulttuuriministeri&#x00F6;n rahoittama kehitt&#x00E4;mishanke</article-title><ext-link ext-link-type="uri" xlink:href="https://acadsci.fi/sofi/wp-content/uploads/SOFI-2019%E2%80%932021.pdf">https://acadsci.fi/sofi/wp-content/uploads/SOFI-2019%E2%80%932021.pdf</ext-link></element-citation></ref><ref id="R27"><element-citation publication-type="book"><person-group person-group-type="author"><collab>Finnish Government</collab></person-group><year>2022</year><source>Government Report on Internal Security</source><article-title>Publications of the Finnish Government 2022:12</article-title><ext-link ext-link-type="uri" xlink:href="http://urn.fi/URN:ISBN:978-952-383-669-3">http://urn.fi/URN:ISBN:978-952-383-669-3</ext-link></element-citation></ref><ref id="R28"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Fung</surname><given-names>Archon</given-names></name></person-group><year>2006</year><article-title>Varieties of participation in complex governance</article-title><source>Public Administration Review</source><volume>66</volume><issue>1</issue><fpage>66</fpage><lpage>75</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/j.1540-6210.2006.00667.x">https://doi.org/10.1111/j.1540-6210.2006.00667.x</ext-link></element-citation></ref><ref id="R29"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gronow</surname><given-names>Antti</given-names></name><name><surname>Satoh</surname><given-names>Keiichi</given-names></name><name><surname>Yl&#x00E4;-Anttila</surname><given-names>Tuomas</given-names></name><name><surname>Weible</surname><given-names>Christopher</given-names></name></person-group><year>2022</year><article-title>Of devils, angels and brokers: how social network positions affect misperceptions of political influence</article-title><source>Journal of European Public Policy</source><volume>30</volume><issue>5</issue><fpage>1</fpage><lpage>24</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/13501763.2022.2046137">https://doi.org/10.1080/13501763.2022.2046137</ext-link></element-citation></ref><ref id="R30"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Haas</surname><given-names>Peter M</given-names></name></person-group><year>2016</year><source>Epistemic Communities, Constructivism, and International Environmental Politics</source><publisher-name>Routledge</publisher-name><publisher-loc>New York</publisher-loc></element-citation></ref><ref id="R31"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Hanneman</surname><given-names>Robert A</given-names></name><name><surname>Riddle</surname><given-names>Mark</given-names></name></person-group><year>2014</year><article-title>&#x2018;Concepts and measures for basic network analysis&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Scott</surname><given-names>John</given-names></name><name><surname>Carrington</surname><given-names>Peter J</given-names></name></person-group><source>The SAGE Handbook of Social Network Analysis</source><publisher-name>SAGE Publications Ltd</publisher-name><publisher-loc>London</publisher-loc></element-citation></ref><ref id="R32"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hawkins</surname><given-names>Robert L</given-names></name><name><surname>Maurer</surname><given-names>Katherine</given-names></name></person-group><year>2010</year><article-title>Bonding, bridging and linking: How social capital operated in New Orleans following Hurricane Katrina</article-title><source>The British Journal of Social Work</source><volume>40</volume><issue>6</issue><fpage>1777</fpage><lpage>1793</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1093/bjsw/bcp087">https://doi.org/10.1093/bjsw/bcp087</ext-link></element-citation></ref><ref id="R33"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Head</surname><given-names>Brian W</given-names></name></person-group><year>2013</year><article-title>Evidence-based policymaking - speaking truth to power?</article-title><source>Australian Journal of Public Administration</source><volume>72</volume><issue>4</issue><fpage>397</fpage><lpage>403</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/1467-8500.12037">https://doi.org/10.1111/1467-8500.12037</ext-link></element-citation></ref><ref id="R34"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Head</surname><given-names>Brian W</given-names></name></person-group><year>2022</year><source>Wicked Problems in Public Policy Understanding and Responding to Complex Challenges</source><publisher-name>Palgrave Macmillan</publisher-name><publisher-loc>Cham</publisher-loc></element-citation></ref><ref id="R35"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Hufty</surname><given-names>Marc</given-names></name></person-group><year>2011</year><article-title>&#x2018;Investigating policy processes: The Governance Analytical Framework (GAF)&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Wiesmann</surname><given-names>Urs M</given-names></name><name><surname>Hurni</surname><given-names>Hans</given-names></name></person-group><source>Research for Sustainable Development: Foundations, Experiences, and Perspectives</source><ext-link ext-link-type="uri" xlink:href="http://Geographica Bernensia, Bern">Geographica Bernensia, Bern</ext-link></element-citation></ref><ref id="R36"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Hyv&#x00F6;nen</surname><given-names>Ari-Elmeri</given-names></name><name><surname>Juntunen</surname><given-names>Tapio</given-names></name></person-group><year>2020</year><article-title>&#x2018;From &#x2019;spiritual defence&#x2019; to robust resilience in the Finnish comprehensive security model&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Larsson</surname><given-names>Sebastian</given-names></name><name><surname>Rhinard</surname><given-names>Mark</given-names></name></person-group><source>Nordic societal security: Convergence and divergence</source><publisher-name>Routledge</publisher-name><publisher-loc>New York</publisher-loc></element-citation></ref><ref id="R37"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jacob</surname><given-names>Merle</given-names></name><name><surname>Hellstrom</surname><given-names>Thomas</given-names></name></person-group><year>2018</year><article-title>Epistemic governance and the conditions for knowledge production in HER institutions</article-title><source>Studies in Higher Education</source><volume>43</volume><issue>10</issue><fpage>1711</fpage><lpage>1717</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/03075079.2018.1520413">https://doi.org/10.1080/03075079.2018.1520413</ext-link></element-citation></ref><ref id="R38"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Katz</surname><given-names>Elihu</given-names></name><name><surname>Lazarsfeld</surname><given-names>Paul, F</given-names></name></person-group><year>1955</year><source>Personal Influence: The Part Played by People in the Flow of Mass Communications</source><publisher-name>The Free Press</publisher-name></element-citation></ref><ref id="R39"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Klijn</surname><given-names>Erik H</given-names></name><name><surname>Koppenjan</surname><given-names>Joop</given-names></name></person-group><year>2014</year><article-title>Complexity in governance network theory</article-title><source>Complexity, Governance &#x0026; Networks</source><volume>1</volume><issue>1</issue><fpage>61</fpage><lpage>70</lpage><fpage>61</fpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.7564/14-CGN8">https://doi.org/10.7564/14-CGN8</ext-link></element-citation></ref><ref id="R40"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Klijn</surname><given-names>Erik H</given-names></name><name><surname>Koppenjan</surname><given-names>Joop</given-names></name></person-group><year>2015</year><source>Governance Networks in the Public Sector</source><publisher-name>Routledge</publisher-name><publisher-loc>New York</publisher-loc><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4324/9781315887098">https://doi.org/10.4324/9781315887098</ext-link></element-citation></ref><ref id="R41"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Knoke</surname><given-names>David</given-names></name><name><surname>Kuklinski</surname><given-names>James H</given-names></name></person-group><year>1982</year><source>Network analysis</source><publisher-name>Sage</publisher-name><publisher-loc>Newbury Park</publisher-loc></element-citation></ref><ref id="R42"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kooiman</surname><given-names>Jan</given-names></name></person-group><year>1999</year><article-title>Social-political governance</article-title><source>Public Management an International Journal of Research and Theory</source><volume>1</volume><issue>1</issue><fpage>67</fpage><lpage>92</lpage><ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1080/14719037800000005">http://doi.org/10.1080/14719037800000005</ext-link></element-citation></ref><ref id="R43"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Larsson</surname><given-names>Sebastian</given-names></name></person-group><year>2020</year><article-title>&#x2018;Swedish total defence and the emergence of societal security&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Larsson</surname><given-names>Sebastian</given-names></name><name><surname>Rhinard</surname><given-names>Mark</given-names></name></person-group><source>Nordic societal security: Convergence and divergence</source><publisher-name>Routledge</publisher-name><publisher-loc>New York</publisher-loc></element-citation></ref><ref id="R44"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Laumann</surname><given-names>Edward O</given-names></name><name><surname>Knoke</surname><given-names>David</given-names></name></person-group><year>1987</year><source>The Organizational State. Social Choice in National Policy Domains</source><publisher-name>University of Wisconsin Press</publisher-name><publisher-loc>Madison</publisher-loc></element-citation></ref><ref id="R45"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lloyd</surname><given-names>Annemaree</given-names></name></person-group><year>2017</year><article-title>Researching fractured (information) landscapes: implications for Library and Information Science researchers undertaking research with refugees and forced migration studies</article-title><source>Journal of Documentation</source><volume>73</volume><issue>1</issue><fpage>35</fpage><lpage>47</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JD-03-2016-0032">https://doi.org/10.1108/JD-03-2016-0032</ext-link></element-citation></ref><ref id="R46"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Luhmann</surname><given-names>Niklas</given-names></name></person-group><year>1985</year><source>A Sociological Theory of Law</source><publisher-name>Routledge &#x0026; Kegan Paul</publisher-name><publisher-loc>London</publisher-loc></element-citation></ref><ref id="R47"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>March</surname><given-names>James, G</given-names></name><name><surname>Olson</surname><given-names>Johan, P</given-names></name></person-group><year>1996</year><article-title>Institutional perspectives on political institutions</article-title><source>Governance</source><volume>9</volume><issue>3</issue><fpage>247</fpage><lpage>264</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/j.1468-0491.1996.tb00242.x">https://doi.org/10.1111/j.1468-0491.1996.tb00242.x</ext-link></element-citation></ref><ref id="R48"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Meyer</surname><given-names>Morgan</given-names></name></person-group><year>2010</year><article-title>The rise of the knowledge broker</article-title><source>Science Communication</source><volume>32</volume><issue>1</issue><fpage>118</fpage><lpage>127</lpage></element-citation></ref><ref id="R49"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Mills</surname><given-names>C. Wright</given-names></name></person-group><year>1956</year><source>The power elite</source><publisher-name>Oxford University Press</publisher-name><publisher-loc>Oxford</publisher-loc></element-citation></ref><ref id="R50"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Mizruchi</surname><given-names>Mark S</given-names></name></person-group><year>1992</year><source>The Structure of Corporate Political Action. Interfirm Relations and Their Consequences</source><publisher-name>Harvard University Press</publisher-name><publisher-loc>Cambridge, MA</publisher-loc></element-citation></ref><ref id="R51"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Mulgan</surname><given-names>Geoff</given-names></name></person-group><year>2022</year><source>Another World Is Possible. How to Reignite Social and Political Imagination</source><publisher-name>Hurts Publishers</publisher-name><publisher-loc>London</publisher-loc></element-citation></ref><ref id="R52"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Nabatchi</surname><given-names>Tina</given-names></name><name><surname>Gastil</surname><given-names>John</given-names></name><name><surname>Leighninger</surname><given-names>Matt</given-names></name><name><surname>Weiksner</surname><given-names>G. Michael</given-names></name></person-group><year>2012</year><source>Democracy in Motion: Evaluating the Practice and Impact of Deliberative Civic Engagement</source><publisher-name>Oxford University Press</publisher-name><publisher-loc>Oxford</publisher-loc></element-citation></ref><ref id="R53"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Newman</surname><given-names>Joshua</given-names></name></person-group><year>2017</year><article-title>Deconstructing the debate over evidence-based policy</article-title><source>Critical Policy Studies</source><volume>11</volume><issue>2</issue><fpage>211</fpage><lpage>226</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/19460171.2016.1224724">https://doi.org/10.1080/19460171.2016.1224724</ext-link></element-citation></ref><ref id="R54"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>North</surname><given-names>Douglass, C</given-names></name></person-group><year>1990</year><source>Institutions, Institutional Change and Economic Performance </source><publisher-name>Cambridge University Press</publisher-name><publisher-loc>Cambridge</publisher-loc></element-citation></ref><ref id="R55"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Oldham</surname><given-names>Geoffrey</given-names></name><name><surname>McLean</surname><given-names>Rob</given-names></name></person-group><year>1997</year><source>Approaches to knowledge-brokering</source><publisher-name>IISD Publications Centre</publisher-name></element-citation></ref><ref id="R56"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Peters</surname><given-names>B. Guy</given-names></name><name><surname>Pierre</surname><given-names>John</given-names></name></person-group><year>1998</year><article-title>Governance without government? Rethinking public administration</article-title><source>Journal of Public Administration Research and Theory</source><volume>8</volume><issue>2</issue><fpage>223</fpage><lpage>243</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1093/oxfordiournals.jpart.a024379">https://doi.org/10.1093/oxfordiournals.jpart.a024379</ext-link></element-citation></ref><ref id="R57"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Pollitt</surname><given-names>Christopher</given-names></name><name><surname>Bouckaert</surname><given-names>Geert</given-names></name></person-group><year>2017</year><source>Public Management Reform. A Comparative Analysis into the Age of Austerity</source><edition>4th</edition><publisher-name>Oxford University Press</publisher-name><publisher-loc>New York</publisher-loc></element-citation></ref><ref id="R58"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Princen</surname><given-names>Sebastiaan</given-names></name></person-group><year>2022</year><article-title>The use of evidence in evidence-based legislation: A reflection</article-title><source>European Journal of Law Reform</source><volume>24</volume><issue>1</issue><fpage>147</fpage><lpage>160</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5553/EJLR/138723702022024001010">https://doi.org/10.5553/EJLR/138723702022024001010</ext-link></element-citation></ref><ref id="R59"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Raisio</surname><given-names>Harri Puustinen</given-names></name><name><surname>Alisa</surname><given-names>Lindell Juha</given-names></name><name><surname>Wiikinkoski</surname><given-names>Tarja</given-names></name><name><surname>Valtonen</surname><given-names>Vesa</given-names></name></person-group><year>2023</year><article-title>Could virtual volunteerims enhance information resilience in a nuclear emergency? The potential role of disaster knowledge workers and virtual emergent groups</article-title><source>Radioprotection</source><volume>58</volume><issue>1</issue><fpage>11</fpage><lpage>18</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1051/radiopro/2023003">https://doi.org/10.1051/radiopro/2023003</ext-link></element-citation></ref><ref id="R60"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rantamaki</surname><given-names>Aino</given-names></name></person-group><year>2023</year><article-title>Kun talo on tulessa, on keskustelua vaikea k&#x00E4;yd&#x00E4;&#x201D; &#x2013; Tapaustutkimus informaatioresilienssin ilmaantumisesta koronapandemian aikana [&#x201C;When the house is on fire, it is difficult to have a conversation&#x2013; Case study on the emergence of information resilience during the COVID-19 pandemic]</article-title><source>Hallinnon tutkimus</source><volume>42</volume><issue>3</issue><fpage>284</fpage><lpage>302</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.37450/ht.119755">https://doi.org/10.37450/ht.119755</ext-link></element-citation></ref><ref id="R61"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rantamaki</surname><given-names>Aino</given-names></name><name><surname>Jalonen</surname><given-names>Harri</given-names></name></person-group><year>2022</year><article-title>Hallinnon informaatioresilienssia etsimass&#x00E4; - Tutkimusmatka kasitteen juurille [Searching for information-resilient governance &#x2013; A journey to the roots of the concept]</article-title><source>Hallinnon tutkimus</source><volume>41</volume><issue>1</issue><fpage>35</fpage><lpage>51</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.37450/ht.107861">https://doi.org/10.37450/ht.107861</ext-link></element-citation></ref><ref id="R62"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rhodes</surname><given-names>Roderick A. W</given-names></name></person-group><year>1996</year><article-title>The new governance: Governing without government</article-title><source>Political Studies</source><volume>44</volume><fpage>652</fpage><lpage>667</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/i.1467-9248.1996.tb01747.x">https://doi.org/10.1111/i.1467-9248.1996.tb01747.x</ext-link></element-citation></ref><ref id="R63"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Rhodes</surname><given-names>Roderick A. W</given-names></name></person-group><year>2006</year><article-title>&#x2018;Policy network analysis&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Moran</surname><given-names>Michael</given-names></name><name><surname>Rein</surname><given-names>Martin</given-names></name><name><surname>Goodin</surname><given-names>Robert E</given-names></name></person-group><source>The Oxford Handbook of Public Policy</source><publisher-name>Oxford University Press</publisher-name><publisher-loc>Oxford</publisher-loc></element-citation></ref><ref id="R64"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rhodes</surname><given-names>Roderick A. W</given-names></name></person-group><year>2007</year><article-title>Understanding governance: Ten years on</article-title><source>Organization Studies</source><volume>28</volume><issue>8</issue><fpage>1</fpage><lpage>22</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/0170840607076586">https://doi.org/10.1177/0170840607076586</ext-link></element-citation></ref><ref id="R65"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rittel</surname><given-names>Horst W</given-names></name><name><surname>Webber</surname><given-names>Melvin M</given-names></name></person-group><year>1973</year><article-title>Dilemmas in a general theory of planning</article-title><source>Policy Sciences</source><volume>4</volume><issue>2</issue><fpage>155</fpage><lpage>169</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/BF01405730">https://doi.org/10.1007/BF01405730</ext-link></element-citation></ref><ref id="R66"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Sabatier</surname><given-names>Paul</given-names></name></person-group><year>1993</year><article-title>&#x2018;Policy Change over a Decade or More&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Sabatier</surname><given-names>Paul</given-names></name><name><surname>Hank C</surname><given-names>Jenkins-Smith</given-names></name></person-group><source>Policy Change and Learning. An Advocacy Coalition Approach</source><publisher-name>Westview Press</publisher-name><publisher-loc>Boulder</publisher-loc></element-citation></ref><ref id="R67"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Salancik</surname><given-names>Gerald R</given-names></name></person-group><year>1995</year><article-title>Wanted: A good network theory of organization</article-title><source>Administrative Science Quarterly</source><volume>40</volume><fpage>345</fpage><lpage>349</lpage></element-citation></ref><ref id="R68"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Scholl</surname><given-names>Hans</given-names></name><name><surname>Patin</surname><given-names>Beth</given-names></name></person-group><year>2013</year><article-title>Resilient information infrastructures: Criticality and role in responding to catastrophic incidents</article-title><source>Transforming Government: People, Process and Policy</source><volume>8</volume><issue>1</issue><fpage>28</fpage><lpage>48</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/TG-12-2012-0015">https://doi.org/10.1108/TG-12-2012-0015</ext-link></element-citation></ref><ref id="R69"><element-citation publication-type="book"><person-group person-group-type="editor"><name><surname>Scott</surname><given-names>John</given-names></name><name><surname>Carrington</surname><given-names>Peter J</given-names></name></person-group><year>2011</year><source>The SAGE Handbook of Social Network Analysis</source><publisher-name>SAGE Publications Ltd</publisher-name><publisher-loc>London</publisher-loc></element-citation></ref><ref id="R70"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Scott</surname><given-names>W. Richard</given-names></name></person-group><year>1995</year><source>Institutions and Organizations</source><publisher-name>Sage</publisher-name><publisher-loc>Thousand Oaks, CA</publisher-loc></element-citation></ref><ref id="R71"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Smith-Doerr</surname><given-names>Laurel</given-names></name><name><surname>Powell</surname><given-names>Walter W</given-names></name></person-group><year>2005</year><article-title>&#x2018;Networks and economic life&#x2019;</article-title><person-group person-group-type="author"><name><surname>Smelser</surname><given-names>Neil</given-names></name><name><surname>Swedberg</surname><given-names>Richard</given-names></name></person-group><source>The Handbook of Economic Sociology</source><publisher-name>Princeton University Press</publisher-name><publisher-loc>Princeton</publisher-loc></element-citation></ref><ref id="R72"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Sorsa</surname><given-names>Ville-Pekka</given-names></name><name><surname>Alaja</surname><given-names>Antti</given-names></name><name><surname>Kaitila</surname><given-names>Joel</given-names></name></person-group><year>2021</year><article-title>Suomen tiedontuotannon regiimi: yksi vai monta?</article-title><source>Poliittinen talous</source><volume>9</volume><issue>1</issue><fpage>72</fpage><lpage>105</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.51810/pt.109887">https://doi.org/10.51810/pt.109887</ext-link></element-citation></ref><ref id="R73"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Stokman</surname><given-names>Frans</given-names></name><name><surname>Ziegler</surname><given-names>Rolf</given-names></name><name><surname>Scott</surname><given-names>John</given-names></name></person-group><year>1985</year><source>Networks of Corporate Power</source><publisher-name>Polity Press</publisher-name><publisher-loc>Glasgow</publisher-loc></element-citation></ref><ref id="R74"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Stokman</surname><given-names>Frans</given-names></name></person-group><year>1995</year><article-title>&#x2019;Entscheidungsansatze in Politichen Netzwerken&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Jansen</surname><given-names>Dorothea</given-names></name><name><surname>Schubert</surname><given-names>Klaus</given-names></name></person-group><source>Netzwerke undPolitikproduktion</source><publisher-name>Shuren</publisher-name><publisher-loc>Marburg</publisher-loc></element-citation></ref><ref id="R75"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Svitkova</surname><given-names>Katarina</given-names></name></person-group><year>2017</year><article-title>Resilience in the national security discourse</article-title><source>Orbana a strategie &#x2013; Defence &#x0026; Strategy</source><volume>17</volume><issue>1</issue><fpage>21</fpage><lpage>42</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3849/1802-7199.17.2017.01.021-042">https://doi.org/10.3849/1802-7199.17.2017.01.021-042</ext-link></element-citation></ref><ref id="R76"><element-citation publication-type="book"><person-group person-group-type="author"><collab>The Finnish Terminology Centre TSK</collab></person-group><year>2017</year><source>Vocabulary of comprehensive security</source><ext-link ext-link-type="uri" xlink:href="https://turvallisuuskomitea.fi/en/comprehensive-security/vocabulary-of-comprehensive-security/">https://turvallisuuskomitea.fi/en/comprehensive-security/vocabulary-of-comprehensive-security/</ext-link></element-citation></ref><ref id="R77"><element-citation publication-type="book"><person-group person-group-type="author"><collab>The Security Committee</collab></person-group><year>2023</year><article-title>Concept of Comprehensive Security &#x2013; Building National Resilience in Finland</article-title><ext-link ext-link-type="uri" xlink:href="https://turvallisuuskomitea.fi/concept-of-comprehensive-security-building-national-resilience-in-finland/">https://turvallisuuskomitea.fi/concept-of-comprehensive-security-building-national-resilience-in-finland/</ext-link></element-citation></ref><ref id="R78"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Uusikyla</surname><given-names>Petri</given-names></name></person-group><year>2019</year><source>Endeavour to find evidence. The role of evaluation in complex systems of governance</source><article-title>Academic dissertation, Publications of the Faculty of Social Sciences 130</article-title><publisher-name>University of Helsinki</publisher-name><publisher-loc>Helsinki</publisher-loc></element-citation></ref><ref id="R79"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Uusikyla</surname><given-names>Petri</given-names></name><name><surname>Keinanen</surname><given-names>Anssi</given-names></name><name><surname>Vartiainen</surname><given-names>Niko</given-names></name><name><surname>Ervasti</surname><given-names>Kaijus</given-names></name><name><surname>Salminen</surname><given-names>Vesa</given-names></name><name><surname>Kettinen</surname><given-names>Juha</given-names></name><name><surname>Lintinen</surname><given-names>Urho</given-names></name><name><surname>Koppa</surname><given-names>Lassi</given-names></name><name><surname>Lindstrom</surname><given-names>Elina</given-names></name></person-group><year>2023</year><source>Kohti laadukasta lainvalmistelua. Lainvalmisteluprosessin laatuindikaattorit</source><article-title>Valtioneuvoston selvitys-ja tutkimustoiminnan julkaisusarja 2023:13</article-title><ext-link ext-link-type="uri" xlink:href="http://urn.fi/URN:ISBN:978-952-383-467-5">http://urn.fi/URN:ISBN:978-952-383-467-5</ext-link></element-citation></ref><ref id="R80"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Valtonen</surname><given-names>Vesa</given-names></name><name><surname>Branders</surname><given-names>Minna</given-names></name></person-group><year>2020</year><article-title>&#x2018;Tracing the Finnish comprehensive security model&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Larsson</surname><given-names>Sebastian</given-names></name><name><surname>Rhinard</surname><given-names>Mark</given-names></name></person-group><source>Nordic societal security: Convergence and divergence</source><publisher-name>Routledge</publisher-name><publisher-loc>New York</publisher-loc></element-citation></ref><ref id="R81"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Virta</surname><given-names>Sirpa</given-names></name><name><surname>Branders</surname><given-names>Minna</given-names></name></person-group><year>2016</year><article-title>Legitimate security? Understanding the contingencies of security and deliberation</article-title><source>British Journal of Criminology</source><volume>56</volume><fpage>1146</fpage><lpage>1164</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1093/bjc/azw024">https://doi.org/10.1093/bjc/azw024</ext-link></element-citation></ref><ref id="R82"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Varheim</surname><given-names>Andreas</given-names></name></person-group><year>2016</year><article-title>Public libraries, community resilience, and social capital</article-title><source>Information Research</source><volume>22</volume><issue>1</issue><fpage>1</fpage><lpage>19</lpage></element-citation></ref><ref id="R83"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wagner</surname><given-names>Paul M</given-names></name><name><surname>Torney</surname><given-names>Diarmuid</given-names></name><name><surname>Yla-Anttila</surname><given-names>Tuomas</given-names></name></person-group><year>2021</year><article-title>Governing a multilevel and cross-sectoral climate policy implementation network</article-title><source>Environmental Policy and Governance</source><volume>31</volume><issue>5</issue><fpage>417</fpage><lpage>431</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/eet.1942">https://doi.org/10.1002/eet.1942</ext-link></element-citation></ref><ref id="R84"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Waldron</surname><given-names>Jeremy</given-names></name></person-group><year>2010</year><article-title>&#x2018;The Rule of Law and the Importance of Procedure&#x2019;</article-title><person-group person-group-type="editor"><name><surname>Fleming</surname><given-names>James E</given-names></name></person-group><source>Getting to the Rule of Law</source><publisher-name>New York University Press</publisher-name><publisher-loc>New York</publisher-loc></element-citation></ref><ref id="R85"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Walter</surname><given-names>Andrew</given-names></name><name><surname>Sen</surname><given-names>Gautam</given-names></name></person-group><year>2009</year><source>Analyzing the Global Political Economy</source><publisher-name>Princeton University Press</publisher-name><publisher-loc>Princeton</publisher-loc></element-citation></ref><ref id="R86"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Wasserman</surname><given-names>Stanley</given-names></name><name><surname>Faust</surname><given-names>Katherine</given-names></name></person-group><year>1994</year><source>Social Networks Analysis: Methods and Applications</source><publisher-name>Cambridge University Press</publisher-name><publisher-loc>Cambridge</publisher-loc></element-citation></ref><ref id="R87"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>White</surname><given-names>David, M</given-names></name></person-group><year>1950</year><article-title>The &#x201C;Gate Keeper&#x201D;: A case study in the selection of news</article-title><source>Journalism &#x0026; Mass Communication Quarterly</source><volume>27</volume><issue>4</issue><fpage>383</fpage><lpage>390</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/107769905002700403">https://doi.org/10.1177/107769905002700403</ext-link></element-citation></ref><ref id="R88"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>Alan Hao</given-names></name><name><surname>Wu</surname><given-names>Judy Shu-Hsien</given-names></name></person-group><year>2020</year><article-title>Building a disaster-resilient community in Taiwan: A social capital analysis of the Meizhou experience</article-title><source>Politics and Governance</source><volume>8</volume><issue>4</issue><fpage>386</fpage><lpage>394</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.17645/pag.v8i4.3106">https://doi.org/10.17645/pag.v8i4.3106</ext-link></element-citation></ref><ref id="R89"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhu</surname><given-names>Xufeng</given-names></name></person-group><year>2020</year><article-title>Think tanks in politically embedded knowledge regimes: does the &#x201C;revolving door&#x201D; matter in China?</article-title><source>International Review of Administrative Sciences</source><volume>86</volume><issue>2</issue><fpage>295</fpage><lpage>315</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/0020852318776362">https://doi.org/10.1177/0020852318776362</ext-link></element-citation></ref></ref-list></back></article>