4,053
Views
18
CrossRef citations to date
0
Altmetric
Articles

Cyber insecurity as a national threat: overreaction from Germany, France and the UK?

Pages 21-35 | Received 03 Jan 2012, Accepted 12 Nov 2012, Published online: 03 Jan 2013

References

  • 2010. "Référentiel Général de Sécurite [General security framework]". Paris: ANSSI; 2010.
  • 2009. " Avis – Tome VIII – Sécurité [Report – Book VIII – Security]". Paris: Assemblée Nationale; 2009.
  • Breton, T. , 2005. "Chantier sur la lutte contre la cybercriminalité [Policies to tackle cybercriminality]". Paris: La documentation française; 2005.
  • Brito, J. , and Watkins, T. , 2011. Loving the cyberbomb? The danger of threat inflation in cybersecurity policy . Arlington: Mercatus Center, George Mason University; 2011.
  • 2005. " Die Lage der IT-Sicherheit in Deutschland 2005 [The situation of IT security in Germany]". Bonn: BSI; 2005.
  • 2008. BSI-Standard 100-1, 100-2, 100-3, 100-4 [Standards from the BSI number 100-1, 100-2, 100-3] . Bonn: BSI; 2008.
  • 2010. "Cybercrime Bundeslagebild 2010 [Cybercrime: a federal overview of the 2010 situation]". Wiesbaden: BKA; 2010.
  • 2010. "Bundeshaushalt – Einzelplan 06 [(Federal budget – section 06)]". Berlin: BMF; 2010.
  • 2006. "Weißbuch 2006 zur Sicherheitspolitik Deutschlands und zur Zukunft des Bundeswehr [The 2006 white paper on German Security Policy and the Future of the Bundeswehr]". Berlin: BMV; 2006. p. 149, .
  • 2005. " Nationaler Plan zum Schutz der Informationsinfrastrukturen [National plan for information infrastructure protection]". Berlin: BMI; 2005.
  • 2008. The national security strategy of the United Kingdom security in an interdependent world . London: Cabinet Office; 2008.
  • 2009. Resource accounts 2009–2010 . London: Cabinet Office; 2009.
  • 2011. The UK cyber security strategy – protecting and promoting the UK in a digital world . London: Cabinet Office ; 2011.
  • 2011. The cost of cyber crime . London: Cabinet Office; 2011.
  • Clarke, R.A. , and Knake, R.K. , 2010. Cyber war: the next threat to national security and what to do about it . New York: Ecco; 2010.
  • 2008–2010. Menaces informatiques et pratiques de sécurité en France [Information systems threats and security practices in France] . Paris: Clusif; 2008–2010.
  • 1993. On unfair terms in consumer contracts , Official Journal of the European Communities (1993), pp. 29–34, L 095, 93/13/EEC.
  • 1985. "On the approximation of the laws, regulations and administrative provisions of the Member States concerning liability for defective products". In: 85/374/EEC . 1985. pp. 20–21, Official Journal of the European Communities, L 141.
  • Deibert, R. , 2011. Tracking the emerging arms race in cyberspace , Bulletin of the atomic scientists 67 (2011), pp. 1–8.
  • Deudney, D. , 1990. The case against linking environmental degradation and national security , Journal of international studies 19 (1990), pp. 461–476.
  • 2011. "IT-Investitionsprogramm – Wirtschaft stärken – Verwaltung verbessern [IT investment programs – Strengthening the economy – Improving the administration]". Berlin: CIO; 2011.
  • Espiner, T. , 2009. Britain to get official cyber attack dogs , ZDNet (2009).
  • 2001. Network and information security: proposal for a European policy approach . Brussels: European Commission; 2001.
  • 2000. "On certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (Directive on electronic commerce)". 2000. pp. 1–16, Official Journal of the European Communities, L 178, 2000/31/EC.
  • 1995. "On the protection of individuals with regard to the processing of personal data and on the free movement of such data". 1995. pp. 31–50, Office Journal of the European Communities, L 281, 95/46/EC.
  • 2007. EU terrorism situation and trend report . The Hague, the Netherlands: Europol; 2007.
  • 2009. EU terrorism situation and trend report . The Hague, the Netherlands: Europol; 2009.
  • Fottrell, M. , et al., 2007. Live free or die hard . Beverly Hills, CL: 20th Century Fox Home Entertainment; 2007.
  • Hansen, L. , and Nissenbaum, H. , 2009. Digital disaster, cyber security, and the Copenhagen school , International studies quarterly 53 (2009), pp. 1155–1175. DOI: 10.1111/j.1468-2478.2009.00572.x
  • 2005. Sober-Wurm tarnt sich als Benachrichtung zur WM-Ticket-Auslosung , [online]. Available from: http://www.heise.de/newsticker/meldung/Sober-Wurm-tarnt-sich-als-Benachrichtung-zur-WM-Ticket-Auslosung-2-Update-158190.html [Accessed 13 December 2011].
  • 2008. Budget 2008 – stability and opportunity: building a strong, sustainable future . London: The Stationery Office; 2008.
  • Hopkins, N. , 2011. UK developing cyber-weapons programme to counter cyber war threat . London: Guardian; 2011, [online], Available from: http://www.guardian.co.uk/uk/2011/may/30/military-cyberwar-offensive [Accessed 7 October 2011].
  • 2011. Annual report 2010–2011 . London: Cabinet Office; 2011.
  • 2011. " ICT eye ". Geneva: ITU; 2011.
  • Lesk, M. , 2007. The new front line , IEEE computer society 5 (2007), pp. 76–79.
  • Levy, M.A. , 1995. Is the environment a national security issue? , International security 20 (1995), pp. 35–62. DOI: 10.2307/2539228
  • Lorents, P. , and Ottis, R. , 2010. Knowledge based framework for cyber weapons and conflict . Presented at Conference on cyber conflict . Tallinn, Estonia, 15–18, June, In , CCD COE Publications.
  • 2009. Virtual criminology report 2009 – virtually here: the age of cyber warfare . Santa Clara: McAfee; 2009.
  • 2011. "McAfee threats report: third quarter 2011". In: McAfee threats report . Santa Clara, CA: McAfee ; 2011.
  • McMurdie, C. , 2011. "What does ‘Secure’ look like?". In: Cyber challenges for National Security . London: Royal United Services Institute; 2011.
  • 2008. Criminal Justice Statistics in England and Wales: Supplementary table . 2008, s. Magistrate Court - Part 3.
  • 2010. Criminal Justice Statistics in England and Wales: Supplementary table . 2010, s. Magistrate Court - Part 3.
  • Moussu, N. , 2011. Plongée dans la cyber-terminologie. Ministère de la défense et des anciens combattants , [online]. Ministère de la défense. Available from: http://www.defense.gouv.fr/actualites/dossiers/sept-2011-cyberdefense-enjeu-du-21eme-siecle/cyberespace/voir-les-articles/plongee-dans-la-cyber-terminologie [Accessed 7 October 2011].
  • Quinault, J. , 2011. Delivering the national cyber security strategy . London: Royal United Services Institute; 2011.
  • Rid, T. , 2012. Cyber war will not take place , Journal of strategic studies 35 (2012), pp. 5–32.
  • Russinovich, M.E. , 2011. Zero day . New York: Thomas Dunne Books; 2011.
  • Sarkozy, N. , 2008. "Défense et Sécurité nationale - Le livre blanc [Defence and National Security: the White Paper]". Paris: Odile Jacob; 2008.
  • 2008. Projet de loi de finances pour 2008: Direction de l'action du Gouvernement , [online]. Sénat. Available from: http://www.senat.fr/rap/l07-091-310/l07-091-3106.html [Accessed 19 October 2011].
  • 2009. Bundeswehr baut geheime Cyberwar-Truppe auf , [online]. Available from: http://www.spiegel.de/spiegel/vorab/0,1518,606095,00.html [Accessed 22 September 2011].
  • Sternstein, A. , 2011. Pentagon seeks $3.2 billion for revised cyber budget , [Online]. Nextgov. Available from: http://www.nextgov.com/nextgov/ng_20110324_2474.php [Accessed 13 December 2011].
  • Villepin, D.D. , et al., 2006. "Arrêté du 2 juin 2006 fixant la liste des secteurs d'activités d'importance vitale et désignant les ministres coordonnateurs desdits secteurs [Decree from the 2 June 2006 setting the list for sectors of critical importance and appointing the ministers coordinating these sectors]". 2006, Journal Officiel, 129, 8502.
  • 2003. The national strategy to secure cyberspace . Washington, DC: The White House; 2003.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.