Moving beyond the European Union's Weakness as a Cyber-Security Agent

被引:9
作者
Sliwinski, Krzysztof Feliks [1 ]
机构
[1] Hong Kong Baptist Univ, Dept Govt & Int Studies, Kowloon, Hong Kong, Peoples R China
关键词
D O I
10.1080/13523260.2014.959261
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
Policy and research on European cyber-security remains formative compared to leaders in the field like China and the United States. This article evaluates the European Union (EU) as a cyber-security actor, asking fundamental questions concerning the EU's combination of prominence and obscurity, especially its limitations and prospects. Who and what is going to dominate the European response to cyber-security in the future? These questions are examined within the larger framework of liberal intergovernmentalism. The EU also is compared to the North Atlantic Treaty Organization (NATO), a point of reference to further understand the limitations and challenges ahead for the EU. Two major factors limit the EU as a cyber-security actor: its intergovernmental character, and the lack of collective vision on cyber-security with the EU and between member states. To play an important role in shaping cyberspace and cyber-security, the EU cannot treat the internet as simply a communication tool or trading platform. Cooperation and capacity-building measures are needed to allow EU member states to surpass mere coordination of their respective national cyber-security strategies. To succeed as a cyber-power, the EU should adapt new and different forms of cyber-power, from the compulsory through the institutional, to the structural and productive. Otherwise, coordination of national strategies for cyber-security of EU member states is the most the EU as an actor can aim for.
引用
收藏
页码:468 / 486
页数:19
相关论文
共 55 条
[41]  
North Atlantic Treaty Organization, 2010, ACT ENG MOD DEF STRA
[42]  
Nugent Neil, 2010, GOVT POLITICS EUROPE, P335
[43]  
O'Connell Marry E., 2012, J CONFLICT SECURITY, V17, P199
[44]  
Scott David., 2007, INT RELAT, V21, P23
[45]  
Shackelford Scott J., 2014, STANFORD J INT LAW, P14
[46]  
Sheldon John B., 2011, STRATEGIC STUDIES Q, P101
[47]  
Singer Peter W., 2012, CYBERSECURITY US CHI
[48]  
Stokes Doug, 2013, INT AFF, V89, P1102
[49]  
Tabansky Lior, 2011, MILITARY STRATEGIC A, V3, P77
[50]  
Taylor Nathan D., 2013, CYBERSECURITY DEV US