581
Views
3
CrossRef citations to date
0
Altmetric
Articles

Supranational security states for national security problems: governing by rules & capacities in tech-driven security spaces

ORCID Icon
Pages 1353-1378 | Received 25 Apr 2022, Accepted 18 Jan 2023, Published online: 02 Feb 2023

References

  • Bauer, S., & Bromley, M. (2004). The European Union code of conduct on arms exports improving the annual report. SIPRI Policy Paper No. 8. https://www.sipri.org/sites/default/files/files/PP/SIPRIPP08.pdf.
  • Baumgartner, F. R., & Jones, B. D. (Eds.). (2002). Policy dynamics. University of Chicago Press. https://press.uchicago.edu/ucp/books/book/chicago/P/bo3625049.html.
  • Beach, D., & Pedersen, R. B. (2019). Process-tracing methods: Foundations and guidelines. University of Michigan Press.
  • Bergmann, J., & Müller, P. (2021). Failing forward in the EU’s common security and defense policy: The integration of EU crisis management. Journal of European Public Policy, 28(10), 1669–1687. https://doi.org/10.1080/13501763.2021.1954064
  • Boin, A., Ekengren, M., & Rhinard, M. (2006). Protecting the union: Analysing an emerging policy space. Journal of European Integration, 28(5), 405–421. https://doi.org/10.1080/07036330600979573
  • Bremberg, N., & Britz, M. (2009). Uncovering the diverging institutional logics of EU civil protection. Cooperation and Conflict, 44(3), 288–308. https://doi.org/10.1177/0010836709106217
  • Bromley, M., & Brockmann, K. (2021). Implementing the 2021 recast of the EU dual-use regulation: Challenges and opportunities. Non-Proliferation and Disarmament Papers, 77(77), 1–16.
  • Bromley, M., & Gerharz, P. (2019, October 7). Revising the EU dual-use regulation: Challenges and opportunities for the trilogue process. Stockholm International Peace Research Institute. https://www.sipri.org/commentary/topical-backgrounder/2019/revising-eu-dual-use-regulation-challenges-and-opportunities-trilogue-process.
  • Brun, L. (2018). The role of the European Union Agency for Network and Information Security (ENISA) in the governance strategies of European cybersecurity. Faculté des sciences économiques, sociales, politiques et de communication, Université catholique de Louvain, 2018. Prom.: Bellanova, Rocco. http://hdl.handle.net/2078.1/thesis:16234
  • Carrapico, H., & Barrinha, A. (2017). The EU as a coherent (cyber)security actor? JCMS: Journal of Common Market Studies, 55(6), 1254–1272. https://doi.org/10.1111/jcms.12575
  • Choucri, N., Madnick, S., & Ferwerda, J. (2014). Institutions for cyber security: International responses and global imperatives. Information Technology for Development, 20(2), 96–121. https://doi.org/10.1080/02681102.2013.836699
  • Council of the EU. (1994). Council Regulation (EC) No 3381/94 of 19 December 1994 setting up a Community regime for the control of exports of dual-use goods. Official Journal of the European Communities. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:31994R3381&from=en.
  • Council of the EU. (1998). European Union Code of Conduct on Arms Exports. 8675/2/98. https://www.europarl.europa.eu/meetdocs/2004_2009/documents/dv/031006codeofconduct1998_/031006codeofconduct1998_en.pdf.
  • Council of the EU. (2003). Fight against the proliferation of weapons of mass destruction—EU strategy against proliferation of Weapons of Mass Destruction. DGE WMD. https://data.consilium.europa.eu/doc/document/ST-15708-2003-INIT/en/pdf.
  • Council of the EU. (2005). Council Framework Decision 2005/222/JHA of 24 February 2005 on attacks against information systems. Official Journal of the European Union. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32005F0222&from=EN.
  • Council of the EU. (2009). Council Regulation (EC) No 428/2009 of 5 May 2009 setting up a Community regime for the control of exports, transfer, brokering and transit of dual-use items. Official Journal of the European Union, 269.
  • Council of the EU. (2013). Regulation (EU) No 526/2013 of the European parliament and of the council of 21 May 2013 concerning the European union agency for network and information security (ENISA) and repealing regulation (EC) No 460/2004Text with EEA relevance. Official Journal of the European Union, 18.
  • Council of the EU. (2016). Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. Official Journal of the European Union.
  • Council of the EU. (2019). Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act). Official Journal of the European Union.
  • Council of the EU. (2020). Proposal for a Regulation of the European Parliament and of the Council setting up a Union regime for the control of exports, brokering, technical assistance, transit and transfer of dual-use items (recast)—Confirmation of the final compromise text with a view to agreement. Council of the EU 12798/20. https://data.consilium.europa.eu/doc/document/ST-12798-2020-INIT/en/pdf.
  • Council of the European Union. (2003). Report on the implementation of programmes, ad hoc centres, pilot projects and joint operations. Cultures & Conflicts, 50, Article 50. https://doi.org/10.4000/conflits.952.
  • de Flers, N. A., Chappell, L., & Müller, P. (2011). The EU’s foreign and security policy: Incremental upgrading of common interests and the effects of institutionalized cooperation. In Gerda Falkner (Ed.), The EU’s decision traps (pp. 162–180). Oxford University Press.
  • Donohue, L. K. (2011). The limits of national security symposium: Moving targets: Issues at the intersection of national security & American criminal Law. American Criminal Law Review, 48(4), 1573–1756. https://scholarship.law.georgetown.edu/facpub/1010
  • Dunn Cavelty, M. & Smeets, M. (2023). Regulatory cybersecurity governance in the making: The formation of ENISA and its struggle for epistemic authority. Journal of European Public Policy, 30(7), 1330–1352. https://doi.org/10.1080/13501763.2023.2173274
  • Eriksson, J., & Rhinard, M. (2009). The internal—external security nexus. Cooperation and Conflict, 44(3), 243–267. https://doi.org/10.1177/0010836709106215
  • EU Commission. (1994). Growth, competitiveness, employment. The challenges and ways forward into the 21st century. Office for Official Publications of the European Communities.
  • EU Commission. (2001). Creating a safer information society by improving the security of information infrastructures and combating computer-related crime. COM(2000) 890. https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2000:0890:FIN:EN:PDF.
  • EU Commission. (2002). Towards integrated management of the external borders of the member states of the European Union. Communication from the Commission to the Council and the European Parliament. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52002DC0233.
  • EU Commission. (2003a). Proposal for a council regulation establishing a European Agency for the management of operational cooperation at the external borders. COM (2003) 687.
  • EU Commission. (2003b). Communication from the commission to the European parliament and the council in view of the European Council of Thessaloniki on the development of a common policy on illegal immigration, smuggling and trafficking of human beings, external borders and the return of illegal residents. Commission of the European Communities COM(2003) 323. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52003DC0323&from=EN.
  • EU Commission. (2004). Critical infrastructure protection in the fight against terrorism. COM(2004) 702. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52004DC0702&from=EN.
  • EU Commission. (2013). Cybersecurity strategy of the European Union: An open, safe and secure cyberspace. Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions.
  • EU Commission. (2014). The Review of export control policy: Ensuring security and competitiveness in a changing world. European Commission Communication COM(2014) 244. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52014DC0244&from=EN.
  • EU Commission. (2015). Proposal for a Regulation of the European Parliament and of the Council on the European Border and Coast Guard and repealing Regulation (EC) No 2007/2004, Regulation (EC) No 863/2007 and Council Decision 2005/267/EC. COM(2015) 671.
  • EU Commission. (2016). European Commission—Press release Commission launches discussion on future framework for stronger and smarter information systems for border management and internal security. European Commission – Press release. https://ec.europa.eu/commission/presscorner/api/files/document/print/en/ip_16_1248/IP_16_1248_EN.pdf.
  • EU Parliament. (2019). European Parliament Legislative Resolution of 17 April 2019 on the Proposal for a Regulation of the European Parliament and of the Council on the European Border and Coast Guard. https://www.europarl.europa.eu/RegData/seance_pleniere/textes_adoptes/provisoire/2019/04-17/0415/P8_TA-PROV(2019)0415_EN.pdf.
  • Falkner, G. (2016). The EU’s current crisis and its policy effects: Research design and comparative findings. Journal of European Integration, 38(3), 219–235. https://doi.org/10.1080/07036337.2016.1140154
  • Gatto, A., & Carmona, J. (2016). European border and coast guard system. EPRS | European Parliamentary Research Service.
  • Genschel, P., & Jachtenfuchs, M. (2016). More integration, less federation: The European integration of core state powers. Journal of European Public Policy, 23(1), 42–59. https://doi.org/10.1080/13501763.2015.1055782
  • Genschel, P., & Jachtenfuchs, M. (2018). From market integration to core state powers: The Eurozone crisis, the refugee crisis and integration theory. JCMS: Journal of Common Market Studies, 56(1), 178–196. https://doi.org/10.1111/jcms.12654
  • Genschel, P., & Jachtenfuchs, M. (2023). The security state in Europe: Regulatory or positive? Journal of European Public Policy, 30(7), 1447–1457. https://doi.org/10.1080/13501763.2023.2174580
  • George, A. L., & Bennett, A. (2005). Case studies and theory development in the social sciences. MIT Press.
  • Herrington, L., & Aldrich, R. (2013). The future of cyber-resilience in an Age of global complexity. Politics, 33(4), 299–310. https://doi.org/10.1111/1467-9256.12035
  • Hoeffler, C. (2023). Beyond the regulatory state? The European Defence Fund and national military capacities. Journal of European Public Policy, 30(7), 1281–1304. https://doi.org/10.1080/13501763.2023.2174581
  • Hoffmann, S. (1966). Obstinate or obsolete? The fate of the nation-state and the case of Western Europe. Daedalus, 95(3), 862–915. https://www.jstor.org/stable/i20026994
  • Hoffmann, S. (2000). Towards a common European foreign and security policy? JCMS: Journal of Common Market Studies, 38(2), 189–198. https://doi.org/10.1111/1468-5965.00216
  • House of Lords. (2003). European Union—Twenty-Ninth Report. https://publications.parliament.uk/pa/ld200203/ldselect/ldeucom/133/13301.htm.
  • Kaunert, C., & Léonard, S. (2019). The collective securitisation of terrorism in the European Union. West European Politics, 42(2), 261–277. https://doi.org/10.1080/01402382.2018.1510194
  • Kaunert, C., & Léonard, S. (2021). Collective securitization and crisification of EU policy change: Two decades of EU counterterrorism policy. Global Affairs, 7(5), 687–693. https://doi.org/10.1080/23340460.2021.2002098
  • Kelemen, R. D., & McNamara, K. R. (2022). State-building and the European Union: Markets, war, and Europe’s uneven political development. Comparative Political Studies, 55(6), 963–991. https://doi.org/10.1177/00104140211047393
  • Kirchner, E. J. (2006). The challenge of European union security governance. JCMS: Journal of Common Market Studies, 44(5), 947–968. https://doi.org/10.1111/j.1468-5965.2006.00669.x
  • Kruck, A., & Weiss, M. (2023). The regulatory security state in Europe. Journal of European Public Policy, 30(7), 1205–1229. https://doi.org/10.1080/13501763.2023.2172061
  • Lavenex, S. (2004). EU external governance in ‘wider Europe’. Journal of European Public Policy, 11(4), 680–700. https://doi.org/10.1080/1350176042000248098
  • Lefkofridi, Z., & Schmitter, P. C. (2015). Transcending or descending? European integration in times of crisis. European Political Science Review, 7(1), 3–22. https://doi.org/10.1017/S1755773914000046
  • Leonard, S. (2009). The creation of FRONTEX and the politics of institutionalisation in the EU external borders policy. Journal of Contemporary European Research, 5(3), 371–388. https://doi.org/10.30950/jcer.v5i3.239
  • Léonard, S. (2010). EU border security and migration into the European Union: FRONTEX and securitisation through practices. European Security, 19(2), 231–254. https://doi.org/10.1080/09662839.2010.526937
  • Léonard, S., & Kaunert, C. (2022a). Refugee flows and terrorism in the European Union: Securitization through association. International Politics, 59(3), 562–576. https://doi.org/10.1057/s41311-021-00359-4
  • Léonard, S., & Kaunert, C. (2022b). The securitisation of migration in the European Union: Frontex and its evolving security practices. Journal of Ethnic and Migration Studies, 48(6), 1417–1429. https://doi.org/10.1080/1369183X.2020.1851469
  • Marks, G., & Hooghe, L. (2004). Contrasting visions of multi-level governance. In I. Bache, & M. Flinders (Eds.), Multi-level governance (pp. 15–30). Oxford University Press.
  • Micara, A. G. (2012). Current features of the European Union regime for export control of dual-use goods*. JCMS: Journal of Common Market Studies, 50(4), 578–593. https://doi.org/10.1111/j.1468-5965.2012.02249.x
  • Neal, A. W. (2009). Securitization and risk at the EU border: The origins of FRONTEX. JCMS: Journal of Common Market Studies, 47(2), 333–356. https://doi.org/10.1111/j.1468-5965.2009.00807.x
  • Negreiro, M. (2021). The NIS2 directive. EPRS|European Parliamentary Research Service, 12, 1–2.
  • Pierson, P. (2000). Increasing returns, path dependence, and the study of politics. American Political Science Review, 94(2), 251–267. https://doi.org/10.2307/2586011
  • Pierson, P., & Skocpol, T. (2002). Historical institutionalism in contemporary political science. In I. Katznelson & H. V. Milner political science: State of the discipline (pp. 693–721). W.W. Norton.
  • Politi, A. (1997). European security: The new transnational risks. WEU Institute for Security Studies. 67.
  • Radjenovic, A. (2019). Protection of EU external borders. EPRS|European Parliamentary Research Service.
  • Ruefle, R., Dorofee, A., Mundie, D., Householder, A. D., Murray, M., & Perl, S. J. (2014). Computer security incident response team development and evolution. IEEE Security & Privacy, 12(5), 16–26. https://doi.org/10.1109/MSP.2014.89
  • Ruohonen, J., Hyrynsalmi, S., & Leppänen, V. (2016). An outlook on the institutional evolution of the European Union cyber security apparatus. Government Information Quarterly, 33(4), 746–756. https://doi.org/10.1016/j.giq.2016.10.003
  • Schilde, K. (2023). Weaponising Europe? Rule-makers and rule-takers in EU regulatory security state. Journal of European Public Policy, 30(7), 1255–1280. https://doi.org/10.1080/13501763.2023.2174582
  • Schmitter, P. C. (2000). How to democratize the European Union … and why bother? Rowman & Littlefield.
  • Shepherd, A. J. K. (2021). The EU security continuum: Blurring internal and external security. Routledge.
  • Simon, S., & de Goede, M. (2015). Cybersecurity, bureaucratic vitalism and European Emergency. Theory, Culture & Society, 32(2), 79–106. https://doi.org/10.1177/0263276414560415
  • Sivan-Sevilla, I. (2019). Complementaries and contradictions: National security and privacy risks in U.S. Federal policy, 1968–2018. Policy & Internet, 11(2), 172–214. https://doi.org/10.1002/poi3.189
  • Sivan-Sevilla, I. (2021). Europeanisation on demand: The EU cybersecurity certification regime between market integration and core state powers (1997–2019). Journal of Public Policy, 41(3), 600–631. https://doi.org/10.1017/S0143814X20000173
  • Smith, M. (2004). Toward a theory of EU foreign policy-making: Multi-level governance, domestic politics, and national adaptation to Europe’s common foreign and security policy. Journal of European Public Policy, 11(4), 740–758. https://doi.org/10.1080/1350176042000248124
  • Wagner, W. (2003). Why the EU’s common foreign and security policy will remain intergovernmental: A rationalist institutional choice analysis of European crisis management policy. Journal of European Public Policy, 10(4), 576–595. https://doi.org/10.1080/1350176032000101262

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.