2,421
Views
7
CrossRef citations to date
0
Altmetric
Symposium: European Union cyber security as an emerging research and policy field

Europe's cyber-power

ORCID Icon

References

  • Alberts, D. S., & Papp, D. (Eds.). (1997). The Information age: An anthology of its impacts and consequences. Washington, DC: National Defense University.
  • Arquilla, J., & Ronfeldt, D. F. (Eds.). (1997). In athena’s camp: Preparing for conflict in the information age. Santa Monica: RAND Corporation.
  • Bachrach, P., & Baratz, M. S. (1962). Two faces of power. American Political Science Review, 56(4), 947–52. doi: 10.2307/1952796
  • Barlow, J. P. (1996). A declaration of the independence of cyberspace. Retrieved from http://homes.eff.org/~barlow/Declaration-Final.html
  • Barnett, M., & Duvall, R. (2005). Power in international politics. International Organization, 59(1), 39–75. doi: 10.1017/S0020818305050010
  • Bendiek, A. (2012). European cyber security policy. SWP Research Paper, 14. Berlin: Stiftung Wissenschaft und Politik.
  • Berkowitz, B. D. (2003). The new face of war: How war will be fought in the 21st century. New York: Free Press.
  • Betz, D. (2012). Cyberpower in strategic affairs: Neither unthinkable nor blessed. Journal of Strategic Studies, 35(5), 689–711. doi: 10.1080/01402390.2012.706970
  • Betz, D., & Stevens, T. (2011). Cyberspace and the state: Toward a strategy for cyber-power. Adelphi, vol. 424. Londong: The International Institute for Strategic Studies.
  • Bially Mattern, J. (2005). Why “soft power” isn’t so soft: Representational force and the sociolinguistic construction of attraction in world politics. Millennium: Journal of International Studies, 33(3), 583–612. doi: 10.1177/03058298050330031601
  • Carrapico, H., & Trauner, F. (2013). Europol and its influence on EU policy- making on organised crime: Analysing governance dynamics and opportunities. Perspectives on European Politics and Society, 14(3), 357–71. doi: 10.1080/15705854.2013.817804
  • Centre for European Policy Studies. (2015). More union in European defense – report of the CEPS task force. Brussels: Centre for European Policy.
  • Christou, G. (2014). The EU’s Approach to Cyber-Security, EUSC Policy Paper. Retrieved from http://privatewww.essex.ac.uk/~susyd/EUSC/documents/EUSC%20Cyber%20Security%20EU%20Christou.pdf
  • Dahl, R. A. (1957). The concept of power. Behavioral Science, 2(3), 201–15. doi: 10.1002/bs.3830020303
  • Digeser, P. (1992). The fourth face of power. The Journal of Politics, 54(4), 977–1007. doi: 10.2307/2132105
  • Dunn Cavelty, M. (2013). A Resilient Europe for an Open, Safe and Secure Cyberspace. Occasional Papers, No.23. The Swedish Institute of International Affairs, Stockholm.
  • Dunn Cavelty, M. (2015). The normalization of cyber-international relations. In O. Thränert & M. Zapfe (Eds.), Strategic Trends 2015: Key Developments in Global Affairs (pp. 81–98). Zurich: Center for Security Studies.
  • Dunn Cavelty, M., Kaufmann, M., & Kristensen, K. S. (2015). Resilience and (In)security: Practices, subjects, temporalities. Security Dialogue, 46(1), 3–14. doi: 10.1177/0967010614559637
  • Dunn Cavelty, M. & Kristensen, K. S. (Eds.). (2008). Securing the homeland: Critical infrastructure, risk, and (In)security. London: Routledge.
  • Dunn Cavelty, M., & Suter, M. (2012). The art of CIIP strategy: Taking stock of content and processes. In J. Lopez, R. Setola, & S. D. Wolthusen (Eds.), Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense (pp. 15–38). Berlin: Springer.
  • European Commission. (2007). Communication ‘Towards a General Policy on the Fight Against Cyber Crime’, COM/2007/0267 final.
  • European Commission. (2009). Communication ‘Protecting Europe from Large Scale Cyber-attacks And Disruptions: Enhancing Preparedness, Security And Resilience’ COM(2009) 149 final.
  • European Commission. (2012). Communication ‘Tackling Crime in our Digital Age: Establishing a European Cybercrime Centre’ COM(2012) 140 final.
  • European Commission. (2013a). Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, JOIN(2013)1final.
  • European Commission. (2013b). Proposal for a Directive of the European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union, 2013/0027(COD).
  • European Council. (2015). Council Conclusions on Cyber Diplomacy, 6122 / 15.
  • European Council. (2005). Council Framework Decision on ‘Attacks against information systems’, 2005/222/JHA.
  • European Council. (2013). Directive on attacks against information systems and replacing Council Framework Decision 2005/222/JHA.
  • European Council. (2014). Outcome of Proceedings, EU Cyber Defence Policy Framework, 18 November 2014.
  • Foucault, M. (1982). The subject and power. Critical Inquiry, 8(4), 777–795. doi: 10.1086/448181
  • Geers, K. (2011). Sun Tzu and Cyberwar, in: Cooperative Cyber Defence Centre of Excellence. Retrieved from https://ccdcoe.org/sites/default/files/multimedia/pdf/Geers2011_SunTzuandCyberWar.pdf
  • Ginsberg, R. H. (1999). Conceptualizing the European union as an international actor: Narrowing the theoretical capability-expectations gap. JCMS: Journal of Common Market Studies, 37(3), 429–454.
  • Gortler, F. W. (1995). Understanding information power and organizing for victory in joint warfighting. Quantico: Marine Corps Command and Staff College. Retrieved from http://fas.org/spp/eprint/gortler.htm
  • Gray, C. S. (2014). Making strategic sense of cyber power: Why the sky is not falling. Carlisle Baracks: Strategic Studies Institute.
  • Guzzini, S. (1993). Structural power: The limits of neorealist power analysis. International Organization, 47(3), 443–478. doi: 10.1017/S0020818300028022
  • Guzzini, S. (2004). The enduring dilemmas of realism in international relations. European Journal of International Relations, 10(4), 533–568. doi: 10.1177/1354066104047848
  • Guzzini, S. (2005). The concept of power: A constructivist analysis. Millennium: Journal of International Studies, 33(3), 495–521. doi: 10.1177/03058298050330031301
  • Guzzini, S. (2007). Re-reading weber, or: The three fields for the analysis of power in international relations. DIIS working papers 2007/29. Copenhagen: Danish Institute for International Studies.
  • Haugaard, M. (2012). Rethinking the four dimensions of power: Domination and empowerment. Journal of Political Power, 5(1), 33–54. doi: 10.1080/2158379X.2012.660810
  • Hyde-Price, A. (2006). ‘Normative’ power Europe: A realist critique. Journal of European Public Policy, 13(2), 217–234. doi: 10.1080/13501760500451634
  • Jordan, T. (1999). Cyberpower: The culture and politics of cyberspace and the internet. London: Routledge.
  • Keohane, R. O., & Nye, J. S. (1998). Power and interdependence in the information age. Foreign Affairs, 77(5), 81–94. doi: 10.2307/20049052
  • Klimburg, A. (2011a). The whole of nation in cyberpower. Georgetown Journal of International Affairs, Special issue, International Engagement on Cyber, 171–179.
  • Klimburg, A. (2011b). Mobilising cyber power. Survival, 53(1), 41–60. doi: 10.1080/00396338.2011.555595
  • Klimburg, A., & Tirmaa-Klaar, H. (2011). Cybersecurity and Cyberpower: Concepts, Conditions and Capabilities for Cooperation for Action within the EU, Study for the Directorate-General for External Policies of the Union.
  • Kuehl, D. (2009). From cyberspace to cyberpower: Defining the problem. In F. D. Kramer, S. H. Starr, & L. K. Wentz (Eds.), Cyberpower and National Security (pp. 24–42). Washington, DC: National Defense University Press.
  • Lukes, S. (1974). Power: A radical view. London: Macmillan.
  • Manjikian, M. M. (2010). From global village to virtual battlespace: The colonizing of the internet and the extension of realpolitik. International Studies Quarterly, 54, 381–401. doi: 10.1111/j.1468-2478.2010.00592.x
  • Manners, I. (2002). Normative power Europe: A contradiction in terms? JCMS: Journal of Common Market Studies, 40(2), 235–58.
  • Manners, I. (2006). Normative power Europe reconsidered: beyond the crossroads1. Journal of European Public Policy, 13(2), 182–199. doi: 10.1080/13501760500451600
  • Moravcsik, A. (1993). Preferences and power in the European community: A liberal intergovernmentalist approach. JCMS: Journal of Common Market Studies, 31(4), 473–524.
  • Morriss, P. (2002). Power: A philosophical analysis. Manchester: Manchester University Press.
  • Nye, J. (2004). Soft power: The means to success in world politics. New York: Public Affairs.
  • Nye, J. (2010, May). Cyber Power, Paper, Belfer Center for Science and International Affairs, Harvard Kennedy School.
  • Organski, A. F. K. (1958). World politics. New York: Alfred A. Knopf.
  • Rattray, G. (2001). Strategic warfare in cyberspace. Cambridge: MIT Press.
  • Renard, T. (2014). The rise of cyber-diplomacy: The EU, its strategic partners and cyber-security. Working Paper 7. Brussels: The European Strategic Partnership Observatory.
  • Richardson, J. J. (2006). Books on google play European union: Power and policy-making. Abingdon: Routledge.
  • Robinson, N., Horvath, V., Cave, J., & Roosendaal, A. (2013). Data and Security Breaches and Cyber-Security Strategies in the EU and its International Counterparts, Committee on Industry, Research, and Energy.
  • Robinson, N., Walczak, A., Brune, S.-C., Esterle, A., & Rodriguez, P. (2013). Stocktaking study of military cyber defence capabilities in the European union (milCyberCAP), unclassified summary. Santa Monica: RAND.
  • Rosamond, B. (2000). Theories of European integration. Basingstoke: Macmillan.
  • Rosecrance, R. (1999). The Rise of the Virtual State. Wealth and Power in the Coming Century. New York: Basic Books.
  • Rosenau, J. N. (1998). Global affairs in an epochal transformation. In C. Henry, C. Ryan, & E. Peartree (Eds.), Information Revolution and International Security (pp. 33–57). Washington, DC: Center for Strategic and International Studies.
  • Rothkopf, D. J. (1998). Cyberpolitik: The changing nature of power in the information age. Journal of International Affairs, 51(2), 325–60.
  • Rowland, J., Rice, M., & Shenoi, S. (2014a). The anatomy of a cyber power. International Journal of Critical Infrastructure Protection, 7, 3–11. doi: 10.1016/j.ijcip.2014.01.001
  • Rowland, J., Rice, M., & Shenoi, S. (2014b). Whither cyberpower? International Journal of Critical Infrastructure Protection, 7, 124–137. doi: 10.1016/j.ijcip.2014.04.001
  • Sheldon, J. B. (2011). Deciphering cyberpower: Strategic purpose in peace and war. Strategic Studies Quarterly, Summer 2011, 95–112.
  • Sliwinski, K. F. (2014a). European union – Cyber power in the making. Asia-Pacific Journal of EU Studies, 12(1), 1–22.
  • Sliwinski, K. F. (2014b). Moving beyond the European union’s weakness as a cyber-security agent. Contemporary Security Policy, 35(3), 468–486. doi: 10.1080/13523260.2014.959261
  • Smith, M. E. (2011). A liberal grand strategy in a realist world? Power, purpose and the EU’s changing global role. Journal of European Public Policy, 18(2), 144–163. doi: 10.1080/13501763.2011.544487
  • Starr, S. H. (2009). Towards an evolving theory of cyberpower. In C. Czosseck & K. Geers (Eds.), The Virtual Battlefield: Perspectives on Cyber-Warfare (pp. 18–52). Amsterdam: IOS Press.
  • Strange, S. (1988). States and markets (2nd ed.). London: continuum.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.