top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives / / Gertjan Boulet, Michael Reiterer, and Ramon Pacheco Pardo
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives / / Gertjan Boulet, Michael Reiterer, and Ramon Pacheco Pardo
Autore Boulet Gertjan
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (305 pages)
Disciplina 005.8
Collana New Security Challenges Series
Soggetto topico Computer security - Government policy
Computer security
ISBN 3-031-08384-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Foreword -- Contents -- Notes on Contributors -- List of Tables -- Introduction -- 1 Areas for Cyber Cooperation Between the European Union and South Korea -- 2 Aim of the Book -- 3 Target Audience -- 4 Focus and Outline -- 5 Outline of the Chapters -- Part I: Rationale for Cybersecurity Cooperation Between the EU and South Korea -- EU Cyber Diplomacy: Value- and Interest-Driven Foreign Policy with New Focus on the Indo-Pacific -- 1 Introduction -- 2 Cybersecurity and Foreign Policy: Cyber Diplomacy -- 2.1 Cyber Diplomacy Toolbox -- 2.2 Fighting Disinformation -- 3 The Security-Technology Nexus -- 4 Asia and the Indo-Pacific in the Limelight -- 5 Cyber Issues and the Liberal International Order -- 6 Conclusions: Upgrading Cyber Diplomacy -- References -- EU-South Korea Cooperation on Cybersecurity, Data Protection and Emerging Technologies -- 1 Introduction -- 2 The EU's and South Korea's Approaches to Cybersecurity, Data Protection and Emerging Technologies -- 2.1 The European Union -- 2.1.1 Cybersecurity -- 2.1.2 Data Protection -- 2.1.3 Emerging Technologies -- 2.2 South Korea -- 2.2.1 Cybersecurity -- 2.2.2 Data Protection -- 2.2.3 Emerging Technologies -- 3 Shared Threats, Common Concerns and Cooperation -- 3.1 Cybersecurity -- 3.2 Data Protection and Privacy -- 3.3 Emerging Technologies -- 4 Conclusions -- References -- Cyber Offence Dominance, Regional Dynamics, and Middle Power-led International Cooperation -- 1 Introduction -- 2 Cyber Threat Overview -- 3 The Cyber Offence-Defence Balance -- 4 Chainganging and Cyber Conflict Risk in East Asia -- 5 Policy Recommendations -- 5.1 Bucket 1 -- 5.2 Bucket 2 -- 5.3 Bucket 3 -- References -- Developing a Collective Retorsion Framework Against Malicious Cyber Operations: Opportunities and Steps for EU-South Korea Cybersecurity Cooperation -- 1 Introduction.
2 South Korea's Challenges in Response to Malicious Cyber Operations -- 2.1 Attribution Challenges -- 2.2 High Costs of Unilateral Countermeasures by South Korea -- 3 The EU Cyber Diplomacy Toolbox: Restrictive Measures -- 3.1 The EU Cyber Diplomacy Toolbox -- 3.2 Restrictive Measures Under the EU Cyber Diplomacy Toolbox -- 4 EU-South Korea Cooperation for Developing a Collective Retorsion Framework -- 4.1 Lessons from the EU's Restrictive Measures for South Korea: Collective Retorsions -- 4.2 Opportunities for and Steps Towards EU-South Korea Cooperation for a Collective Retorsion Framework -- 5 Conclusion -- References -- Part II: Comparisons -- Cyber Arms Control on the Korean Peninsula: Challenges and Opportunities with a View to North Korea's Asymmetry Strategy -- 1 Introduction -- 2 The Inner-Korean Conflict and the Role of Cyber-Enabled Strategies -- 2.1 Historical Context of North Korea's Asymmetry Strategy and the Role of Cyber Capabilities -- 2.2 North Korea's Cybercrime and Cyberterror Against South Korea in Peacetime -- 2.3 North Korea's Cyber Strategy During Open Military Conflict -- 3 Towards an Inter-Korean Cyber Arms Control Agreement -- 4 Conclusions -- References -- Arms Control in the Cyber Domain: A European Approach to Mitigate Digital Threats -- 1 Introduction -- 2 Contextualising Cyber Threats -- 3 European Cybersecurity as Arms Control Mechanisms -- 3.1 A European Cyber Arms Control Strategic Framework and Operational Implementation -- 3.2 Imposing Restrictive Measures as a Cyber Arms Control Mechanism -- 4 Conclusion and Future Outlook into the Field of Artificial Intelligence -- References -- South Korea's Cyber Defence and Digital Cooperation with the EU -- 1 Introduction -- 2 Evolving North Korea's Cyber Threats -- 2.1 From a Threatening Weapon to an All-Purpose Sword.
2.2 A Role of the Reconnaissance General Bureau (RGB) -- 2.3 North Korea's Cyber Footprints -- 3 Cyber Cooperation Between South Korea and the EU -- 3.1 South Korea's Cyber Strategy -- 3.2 South Korea-EU's Strategic Partnership in the Cyber Sector -- 4 Conclusion: Policy Recommendations -- References -- Building Cyber Resilience: The Defensive Shield for the EU -- 1 Introduction -- 2 Bolstering Cyber Resilience -- 2.1 Resilience and Technological Sovereignty -- 2.2 Operational Capacity to Prevent, Deter, and Respond -- 2.3 Cyber Defence and Disruptive Technologies -- 3 Global Resilience Through Cooperation -- 4 Conclusion -- References -- Enhancing Cooperation Between South Korea and the EU in the Fight Against Cybercrime -- 1 Introduction -- 2 South Korea's International Cooperation Framework on Cybercrime -- 2.1 The Change of South Korea's Cybercrime Investigation Authority from the Prosecutor's Office to the KNPA -- 2.2 Progress to Join the Convention on Cybercrime -- 2.3 Supporting Capacity Building in Global Cybercrime Investigations -- 2.4 International Cooperation with Major Powers Including the US and the EU -- 3 Measures to Enhance International Cybercrime Cooperation: Focus on the EU -- 3.1 Swiftly Joining the Convention on Cybercrime -- 3.2 Establishing a Working Group on Joint Investigation in Cybercrime Between the EU and South Korea -- 3.3 Delivering Cybercrime Capacity Building Projects in Developing Countries -- 3.4 Expanding Cooperation on Digital Forensic Technology -- 3.5 Signing an Executive Agreement of the CLOUD Act -- 4 Conclusion -- References -- The EU and Access to Electronic Evidence: Privatisation of Law Enforcement? -- 1 Introduction -- 2 The EU Approach to E-evidence: Mechanisms and Challenges -- 3 US CLOUD Act -- 4 EU E-Evidence Proposals -- 5 Second Additional Protocol to the Budapest Convention -- 6 Conclusion.
References -- Part III: International Order and Cross-Cutting Issues -- Recent Trends in UN Cybersecurity Governance and South Korea-EU Cooperation -- 1 Introduction -- 2 Discussions on Cybersecurity Norms and Laws -- 3 Future Format of Cybersecurity Governance -- 4 South Korea-EU Cooperation in the Context of Cyber Diplomacy -- 4.1 South Korea's International Cooperation -- 4.2 EU-South Korea Strategic Partnership and Shared Interests in Cyber Resilience -- 4.3 South Korea's Cyber Policy Cooperation with the EU -- 5 Conclusion -- References -- The International Cybersecurity Cooperation Dilemma and Implications for EU-South Korea Relations -- 1 Introduction -- 2 Models of International Cybersecurity Cooperation -- 3 Problems in International Cybersecurity Cooperation -- 3.1 Mechanism Fragmentation -- 3.2 Poor Effectiveness -- 3.2.1 Substantive Content/Whether It Serves and Promotes Cooperation -- 3.2.2 Regulatory Constraints/Whether It Regulates and Restricts -- 3.2.3 Accountability/Whether It Punishes Non-cooperative Behavior -- 3.3 Confrontation Between Camps -- 4 Reasons for International Cybersecurity Cooperation Dilemma -- 4.1 Realist Perspective -- 4.1.1 Different Interests to Cooperate Caused by Gaps in National Power -- 4.1.2 The Game of Cost Allocation and Benefit Distribution -- 4.1.3 Technical Uncertainties -- 4.2 Constructivist Perspective -- 4.2.1 Perceptions Caused by Stereotype Thinking -- 4.2.2 Features of Cyberspace Magnifying Perceptions -- 5 A Primer on the Predicament of International Cybersecurity Cooperation in EU-South Korea Relations -- 6 Conclusion -- References -- Conclusion: From Words to Deeds -- 1 Key Rationales for Cybersecurity Cooperation Between the EU and South Korea -- 2 Cybersecurity Policy Development in the EU and South Korea -- 3 Towards EU-South Korea Cybersecurity Cooperation Through Action.
4 The EU, South Korea, and Multilateral Cybersecurity Cooperation -- Index.
Record Nr. UNINA-9910634030803321
Boulet Gertjan  
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Indo-Asia-Pacific's maritime future : a practical assessment of the state of Asian seas / / edited by Kerry Lynn Nankivell, Jeffrey Reeves and Ramon Pacheco Pardo
The Indo-Asia-Pacific's maritime future : a practical assessment of the state of Asian seas / / edited by Kerry Lynn Nankivell, Jeffrey Reeves and Ramon Pacheco Pardo
Pubbl/distr/stampa [Honolulu, Hawaii] : , : Daniel K. Inouye Asia-Pacific Center for Security Studies, , 2017
Descrizione fisica 1 online resource (53 pages) : color illustrations, maps (some color)
Soggetto topico Territorial waters - Indo-Pacific Region
Territorial waters - Pacific Area
International cooperation
Boundary disputes
Maritime boundaries - Indo-Pacific Region
Maritime boundaries - Pacific Area
Economic development - Indo-Pacific Region
Economic development - Pacific Area
Pacific Area cooperation
Asian cooperation
Economic development
Maritime boundaries
Territorial waters
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Indo-Asia-Pacific's maritime future
Record Nr. UNINA-9910714046703321
[Honolulu, Hawaii] : , : Daniel K. Inouye Asia-Pacific Center for Security Studies, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui