5,716
Views
3
CrossRef citations to date
0
Altmetric
Articles

Risk vs. threat-based cybersecurity: the case of the EU

ORCID Icon
Pages 85-103 | Received 01 Dec 2021, Accepted 20 Apr 2022, Published online: 09 May 2022

References

  • Aradau, C., Lobo-Guerrero, L., and Van Munster, R., 2008. Security, technologies of risk, and the political: guest editors’ introduction. Security dialogue., 39 (2-3), 147–154.
  • Aradau, C., and van Munster, R., 2007. Governing terrorism through risk: taking precautions, (un)knowing the future. European journal of international relations, 13 (1), 89–115.
  • Adamson, L., and Homburger, Z., 2019. Let them roar: small states as cyber norm entrepreneurs. European foreign affairs review, 24 (2), 217–234.
  • Backman, S., 2020. Conceptualizing cyber crises. Journal of contingencies and crisis management, 29, 429–438.
  • Balzacq, T., Léonard, S., and Ruzicka, J., 2016. ‘Securitization’ revisited: theory and cases. International relations, 30 (4), 494–531.
  • Beck, U., 1999. World risk society. Polity. Cambridge: Polity Press, 184.
  • Bendiek, A., Bossong, R., and Schultze, M., 2017. The EU's revised cybersecurity strategy: half-hearted progress on far-reaching challenges. Berlin: Stiftung Wissenschaft und Politik (SWP) Deutsches Institut für Internationale Politik und Sicherheit.
  • Baylis, J., Smith, S., and Owens, P. eds. 2017. The Globalization of World Politics: An Introduction to International Relations. Oxford: Oxford University Press.
  • Bengtsson, L., Borg, S., and Rhinard, M., 2018. European security and early warning systems: from risks to threats in the European Union’s health security sector. European security, 27 (1), 20–40.
  • Brown, I., and Marsden, C., 2013. Regulating code: good governance and better regulation in the information Age. Cambridge: The MIT Press.
  • Burton, J., and Christou, G., 2021. Bridging the gap between cyberwar and cyberpeace. International affairs, 97 (6), 1727–1747.
  • Buzan, B., Wæver, O., and Wilde, J.D., 1998. Security: a new framework for analysis. Boulder, CO: Lynne Rienner.
  • Carrapico, H., and Barrinha, A., 2017. The EU as a coherent (cyber)security actor?. JCMS: Journal of common market studies, 55, 1254–1272. doi:10.1111/jcms.12575.
  • Carrapico, H., and Farrand, B., 2020. Discursive continuity and change in the time of COVID-19: the case of EU cybersecurity policy. Journal of European integration, 42, 8.
  • Chandler, D., 2010. Review article: risk and the biopolitics of global insecurity. Conflict, security & development, 10 (2), 287–297.
  • Christou, G., 2019. The collective securitisation of cyberspace in the European Union. West European politics, 42 (2), 278–301.
  • Christou, G., 2016. Cyber security in the European Union: resilience and adaptability in governance policy. Houndmills. Basingstoke: Palgrave Macmillan.
  • Claessen, E., 2020. Reshaping the internet – the impact of the securitisation of internet infrastructure on approaches to internet governance: the case of Russia and the EU. Journal of cyber policy, 5 (1), 140–157.
  • Corry, O., 2012. Securitisation and ‘riskification’: second-order security and the politics of climate change. Millennium: Journal of international studies, 40 (2), 235–258.
  • Council of the European Union. 2018. Proposal for a Regulation of the European Parliament and of the Council on ENISA, the “EU Cybersecurity Agency”, and repealing Regulation (EU) 526/2013, and on information and communication technology cybersecurity certification (“Cybersecurity Act”) - General approach.
  • Council of the European Union. 2021. Proposal for a Directive of the European Parliament and of the Council on measures for a high common level of cybersecurity across the Union, repealing Directive 2016/1148- General Approach.
  • Department of Defence, United States of America. 2018. The 2018 Department of Defense Cyber Strategy.
  • Deibert, R., 2016. Cyber-security. In: M. Dunn Cavelty, and T. Balzacq, eds. Routledge handbook of security studies. (2nd ed.). Abingdon: Routledge, 172–182.
  • Dunn Cavelty, M., 2018. Europe's cyber-power. European politics and society, 19 (3), 304–320.
  • Dunn Cavelty, M., 2008. Cyber-security and threat politics: US efforts to secure the information age. London & New York: Routledge.
  • Emmers, R., 2010. Securitization. In: A Collins, ed. Contemporary security studies. Oxford: Oxford University Press, 136–151.
  • Estève, A., 2021. Preparing the French military to a warming world: climatization through riskification. International politics, 58, 600–618.
  • European Commission. 2013. Cybersecurity strategy of the European Union: an open, safe and secure cyberspace.
  • European Commission. 2015. The European agenda on security.
  • European Commission. 2020a. The EU's cybersecurity strategy for the digital decade.
  • European Commission. 2020b. The EU security union strategy.
  • European Commission. 2021. Commission Recommendation (EU) 2021/1086 of 23 June 2021 on building a Joint Cyber Unit.
  • European Court of Auditors. 2019. Review No 02/2019: challenges to effective EU cybersecurity policy (Briefing Paper).
  • Iasiello, E., 2016. What happens if cyber norms are agreed to? Georgetown Journal of international affairs, 17 (3), 30–37.
  • Judge, A., and Maltby, T., 2017. European energy union? Caught between securitisation and ‘riskification’. European journal of international security, 2 (2), 179–202.
  • Liebetrau, T., 2019. EU cybersecurity governance: redefining the role of the internal market. Dissertation (PhD). University of Copenhagen, Department of Political Science.
  • Mueller, M., 2010. Networks and states: the global politics of Internet governance. Cambridge: MIT press.
  • Mingst, K. and Snyder, J., (2017). Essential readings in world politics (6th ed.). New York: Norton.
  • Pawlak, P., 2019. The EU’s role in shaping the cyber regime complex. European foreign affairs review, 24 (2), 167–186.
  • Pawlak, P., and Missiroli, A., 2019. Introduction: trends, patterns, and challenges for international cooperation in cyberspace. European foreign affairs review, 24 (2), 125–134.
  • Petersen, K.L., 2012. Risk analysis – a field within security studies? European journal of international relations, 18 (4), 693–717.
  • Radu, R., Chenou, J., and Weber (red.), R.H., 2014. The evolution of global Internet governance: principles and policies in the making. Berlin: Springer.
  • Rasmussen, M., 2006. The risk society at war: terror, technology and strategy in the twenty-first century. Cambridge: Cambridge University Press.
  • Raymond, M., 2016. Managing decentralized cyber governance: the responsibility to troubleshoot. Strategic studies quarterly, 10 (4), 123–149.
  • Scholte, J., 2017. Polycentrism and democracy in internet governance. In: U Kohl, ed. The net and the nation state: multidisciplinary perspectives on Internet governance. Cambridge: Cambridge University Press, 165–184.
  • Shepherd, A.J.K., 2021. The EU security continuum: blurring internal and external security. London: Routledge.
  • Singer, P.W., and Friedman, A., 2014. Cybersecurity and cyberwar: what everyone needs to know. New York: Oxford University Press.
  • Trombetta, M., 2008. Environmental security and climate change: analysing the discourse. Cambridge review of international affairs, 21, 4.
  • Turell, J., Su, F., and Boulanin, V., 2020. Cyber-incident management: identifying and dealing with the risk of escalation. Stockholm: SIPRI.
  • Valeriano, B., Jensen, B.M., and Maness, R.C., 2018. Cyber strategy: the evolving character of power and coercion. New York: Oxford University Press.