The working paper discusses the challenges facing the European Union as it seeks to become a more active player in the field of cybersecurity. It outlines the concept of cybersecurity and the various approaches to cybersecurity governance. It then discusses the EU’s approach to cybersecurity issues, focusing on three elements: cybercrime, network and information security, and cyber-defence. Although a relative newcomer on the scene, the EU has made strides towards establishing a coherent policy framework across these areas. The EU is also developing a role in cyber defence, a field that has been largely left to the Member States. It finally analyses the external dimension of cybersecurity policy, and argues that the EU can influence the dev...
The last three decades have seen the development of the European Union (EU) as a security actor. The...
The last three decades have seen the development of the European Union (EU) as a security actor. The...
The benefits that the virtual environment and their adjacent technologies brought to mankind have b...
The aim of this special section is to draw the readers' attention to what is an emerging policy fiel...
The aim of this special section is to draw the readers' attention to what is an emerging policy fiel...
The aim of this special section is to draw the readers' attention to what is an emerging policy fiel...
The aim of this special section is to draw the readers' attention to what is an emerging policy fiel...
Increased digitalisation has brought both economic benefits and cybersecurity challenges. According ...
Because of the asymmetric nature of cyber threats and the dynamics of their evolution, there is a te...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
Cybersecurity and cybersecurity governance in the EU region has been the focus of political stakehol...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
Malicious cyber activities have become a growing threat, a fact that has become more visible in rece...
In the last decade, the EU’s policy on cybersecurity has changed significantly, both as to its refe...
The last three decades have seen the development of the European Union (EU) as a security actor. The...
The last three decades have seen the development of the European Union (EU) as a security actor. The...
The benefits that the virtual environment and their adjacent technologies brought to mankind have b...
The aim of this special section is to draw the readers' attention to what is an emerging policy fiel...
The aim of this special section is to draw the readers' attention to what is an emerging policy fiel...
The aim of this special section is to draw the readers' attention to what is an emerging policy fiel...
The aim of this special section is to draw the readers' attention to what is an emerging policy fiel...
Increased digitalisation has brought both economic benefits and cybersecurity challenges. According ...
Because of the asymmetric nature of cyber threats and the dynamics of their evolution, there is a te...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
Cybersecurity and cybersecurity governance in the EU region has been the focus of political stakehol...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
Malicious cyber activities have become a growing threat, a fact that has become more visible in rece...
In the last decade, the EU’s policy on cybersecurity has changed significantly, both as to its refe...
The last three decades have seen the development of the European Union (EU) as a security actor. The...
The last three decades have seen the development of the European Union (EU) as a security actor. The...
The benefits that the virtual environment and their adjacent technologies brought to mankind have b...