EU CYBERSPACE GOVERNANCE. WHICH WAY FORWARD
Accepted
25 March 2026
Available Online
15 July 2013
Abstract
THE PURPOSE OF THIS PAPER IS TO FORMULATE A CONVINCING AND REALIST EXPLANATION CONCERNING A POSSIBLE FEASIBLE MODEL FOR GLOBAL GOVERNANCE OF CYBERSPACE AS THERE IS A CONTINUOUS DISAGREEMENT REGARDING THE ESTABLISHMENT OF NEW INTERNATIONAL RULES TO GOVERN THE CYBERSPACE, BOTH WITHIN AND OUTSIDE OF THE EU. FIRST AND FOREMOST THIS PAPER AIMS TO REVEAL THAT GOVERNANCE OF CYBERSPACE IS CRITICAL FOR THE NATION STATES AS THE COMPUTER NETWORKS ARE NOW ABLE TO TRANSCEND MODERN CONCEPTIONS OF TIME AND SPACE TO CHANGE THE POWER RELATIONSHIPS BETWEEN NATION STATES AND INDIVIDUALS. I ARGUE THAT THE GOVERNANCE OF CYBERSPACE HAS CONSIDERABLE CONSEQUENCES FOR NATIONAL SECURITY ALSO. LAST BUT NOT THE LEAST, THIS PAPER DRAWS THE ATTENTION TO THE EFFORTS MADE BY THE EU TO SECURE THE CYBERSPA CE AS THE TRADITIONAL FORMS OF GOVERNANCE LACK IN CONTROLLING THE BORDERLESS CHALLENGES ENCOMPASSED BY THE INFORMATION AND COMMUNICATIONS TECHNOLOGIES.
Keywords
CYBERSPACE
EUROPEAN UNION
CYBER GOVERNANCE
CYBER SECURITY
Full Text
The body of this article is intentionally hidden on the public page. Please use the PDF reader or the PDF download for the complete text.
References
[1]
ACTA Blog, The. http://acta.ffii.org/?p=1702.
[2]
Arimatsu, Louise “A Treaty for Governing Cyber -Weapons: Potential Benefits and Practical Limitations.” Paper Presented at 4th International Conference on Cyber Conflict, Tallin, June 4-7, 2012.
[3]
Bailes, Alyson “Private Sector, Public Security” in Private Actors and Security Governance, ed. Alan Bryden and Marina Caparini. (Berlin: Lit Verlag, 2006).
[4]
Barlow, John Perry . “A Declaration of the Independence of Cyberspace”. Accessed May 21, 2013. https://projects.eff.org/~barlow/Declaration-Final.html.
[5]
Buckland, Benjamin S., Fred Schreier, and Theodor H. Winkler . “Democratic Governance Challenges of Cyber Security.” in DCAF Horizon 1( 2012):11 -20. Accessed May 19, 2013. http://genevasecurityforum.org/files/DCAF-GSF-cyber- Paper.pdf.
[6]
Dunn Cavelty, Myriam. “Unraveling the Stuxnet Effect: Of much P ersistence and Little change in the Cyber Threats Debate” Military and Strategic Affairs , vol. 3(2009): 11.
[7]
European Commission - Official Journal of the European Union. “Directive 2006/24/EC “. Accessed May 19, 2013. http://eur-lex.europa.eu/.
[8]
European Commission. “European Commission officially referred ACTA to the European Court of Justice”. Accessed May 19, 2013. http://trade.ec.europa.eu/index.cfm?id=799.
[9]
European Commission . “EU Commission COM(2012) 784”. Accessed May 19, 2013. http://ec.europa.eu/information_society/newsroom/cf/dae/document.cfm?doc_id=1 381.
[10]
ENISA. “What does ENISA Do?”. Accessed May 20, 2013. http://enisa.europa.eu/about.
[11]
Europol. “A Collective EU Response to Cyber Crime”. Accessed May 18, 2013. https://www.europol.europa.eu/ec3.
[12]
ETSI. “About ETSI”. Accessed May 19, 2013. http://www.etsi.org/about.
[13]
Graf, Christoph . “Terena Technical Programme Update”. Access ed May 20, 2013. http://www.terena.org/about/ga/ga36/TechnicalProgramme.pdf.
[14]
Interpol – Media Release Centre. “Fighting cybercrime worldwide requires law enforcement and private sector to work more closely together, says Interpol Chief”. Accessed May 18, 2013. http://www.interpol.int/News-and-media/News-media- releases/2013/PR043.
[15]
Loader, Brian D . The Governance of Cyberspace: Politics, Technology and Global Restructuring. London: Routledge, 1997.
[16]
Kwalwasser, Harold . “Internet Governance” in Cyberpower and National Security, ed. Franklin D. Kramer, Stuart H. Starr, and Larry. K. Wentz. Washington, DC: National Defense University Press, 2009.
[17]
NATO Newsroom.“NATO Rapid Reaction Team to fight cyber attack”. Accessed May 19, 2013. http://www.nato.int/cps/en/natolive/news_85161.htm.
[18]
Nye, Joseph, Jr. Cyber Power. Cambridge: Harvard Kennedy School, 2010. July 2013
[19]
Portnoy, Michael, and Goodman, Seymour . Global Initiatives to Secure the Cyberspace – An emerging landscape. New York: Springer, 2009.
[20]
Tikk, Eneken, Kaska, Kadri, and Vihul, Liis . “International Cyber Incidents – Legal Considerations”. Accessed May 19, 2013. http://www.ccdcoe.org/publications/books/legalconsiderations.pdf
[21]
Tromparent, Patrice . “French Cyberdefence Policy.” Paper presented at 4th International Conference on Cyber Conflict, Tallin, June 4-7, 2012.
[22]
Vatis, Michael A . “The Council of Europe Convention on Cybercrime” Paper presented at the Workshop on Deterring Cyberattacks: Informing Strate gies and Developing Options for U.S. Policy, Washington, DC, 2012.
[23]
Zittrain, Ronald, John Deibert, Palfrey Rafal, and Jonathan Rohozinski . Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace . Cambridge: MIT Press, 2012.