Moving beyond the European Union's Weakness as a Cyber-Security Agent

被引:9
|
作者
Sliwinski, Krzysztof Feliks [1 ]
机构
[1] Hong Kong Baptist Univ, Dept Govt & Int Studies, Kowloon, Hong Kong, Peoples R China
关键词
D O I
10.1080/13523260.2014.959261
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
Policy and research on European cyber-security remains formative compared to leaders in the field like China and the United States. This article evaluates the European Union (EU) as a cyber-security actor, asking fundamental questions concerning the EU's combination of prominence and obscurity, especially its limitations and prospects. Who and what is going to dominate the European response to cyber-security in the future? These questions are examined within the larger framework of liberal intergovernmentalism. The EU also is compared to the North Atlantic Treaty Organization (NATO), a point of reference to further understand the limitations and challenges ahead for the EU. Two major factors limit the EU as a cyber-security actor: its intergovernmental character, and the lack of collective vision on cyber-security with the EU and between member states. To play an important role in shaping cyberspace and cyber-security, the EU cannot treat the internet as simply a communication tool or trading platform. Cooperation and capacity-building measures are needed to allow EU member states to surpass mere coordination of their respective national cyber-security strategies. To succeed as a cyber-power, the EU should adapt new and different forms of cyber-power, from the compulsory through the institutional, to the structural and productive. Otherwise, coordination of national strategies for cyber-security of EU member states is the most the EU as an actor can aim for.
引用
收藏
页码:468 / 486
页数:19
相关论文
共 50 条
  • [1] European Cyber-Security Research and Innovation
    Maggi, Federico
    Zanero, Stefano
    Markatos, Evangelos
    [J]. ERCIM NEWS, 2015, (100): : 43 - 43
  • [2] Moving to analysis-led cyber-security
    Maisey, Martin
    [J]. Network Security, 2014, 2014 (05) : 5 - 12
  • [3] Beyond the Castle Model of cyber-risk and cyber-security
    Leuprecht, Christian
    Skillicorn, David B.
    Tait, Victoria E.
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2016, 33 (02) : 250 - 257
  • [4] Cyber-Security Profiles of European Users: A Survey
    Zamfirescu, Raisa-Gabriela
    Rughinis, Cosima
    Hosszu, Alexandra
    Cristea, Darie
    [J]. 2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 438 - 442
  • [5] Keep spending: Beyond optimal cyber-security investment
    Zhang, Yunxiao
    Malacaria, Pasquale
    [J]. 2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, : 123 - 136
  • [6] The European Union as a Security Actor: Moving Beyond the Second Pillar
    Zwolski, Kamil
    [J]. JOURNAL OF CONTEMPORARY EUROPEAN RESEARCH, 2009, 5 (01) : 82 - 96
  • [7] CYSEP - A Cyber-Security Processor for 10Gbps networks and beyond
    Chao, HJ
    Karri, R
    Lau, WC
    [J]. MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 1114 - 1122
  • [8] Industrial systems: Cyber-security's new battlefront
    Piggin, Richard
    [J]. Engineering and Technology, 2014, 9 (08): : 70 - 74
  • [9] Cyber-security challenges of Agent Technology in Intelligent Transportation Systems.
    Mukisa, Sarah Schulz
    Rashid, Awais
    [J]. 1ST INTERNATIONAL WORKSHOP ON AGENTS & CYBERSECURITY, 2014,
  • [10] The Cyber-Security State of our Nation: A Critique of South Africa's Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure
    Mohideen, Feroze
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 235 - 243