Skip to main content

Cybersecurity in Europe: Cooperation and Investment

  • Chapter
  • First Online:
Cyber-Development, Cyber-Democracy and Cyber-Defense
  • 1782 Accesses

Abstract

European nations are subject to continuously increasing number and severity of cyber-attacks. In this essay we firstly examine the developments in cybersecurity and cyber-defence in Europe and particularly the European Union. The EU Cybersecurity Strategy is analysed. This is done in conjunction to the broader European Information and Communications Technology (ICT) agenda, as well as the Common Security and Defence Policy (CSDP), and related policies for cybercrime and intelligence. We identify common elements and especially the tendency towards more cooperation at various levels. This has spillover effects at international organizations as NATO and United Nation. The principal European Institutions associated to Cybersecurity are assessed. Except institutions the Defence and Security industry in Europe and the main challenges that faces are examined. The main hypothesis is if these policies and institutions can provide sufficient cybersecurity and cyber-defence. We conclude that Europe is on the right direction regarding cybersecurity and cyber-defence but it is questionable if these policies and institutions are backed by enough infrastructure and investment. Cooperation is crucial and can yield significant benefits. In that sense institutional overlap should be avoided and better coordination, sharing and pooling of resources, appropriate investment and infrastructure could significant mitigate risks in cyberspace and increase welfare.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    “Agreement between the European Union and the North Atlantic Treaty Organization on the Security

    of Information,” PESC 599, COSDP 463 (Brussels: 18 December 2002).

  2. 2.

    Article 31, Lisbon Treaty.

  3. 3.

    Article 21, paragraph 2, Lisbon Treaty.

  4. 4.

    Article 25, (c), Lisbon Treaty.

  5. 5.

    Article 21, paragraph 3, Lisbon Treaty.

  6. 6.

    Article 24, paragraph 1, Lisbon Treaty.

  7. 7.

    Ibid., pp. 82-83.

  8. 8.

    Article 21, Lisbon Treaty.

  9. 9.

    Membership includes all formal members of international organisations, looking at various membership configurations that institutions offer states – such as the Partnership for Peace (PfP) in NATO. What matters is whether the state is included in the formal decision-making process. Mandate is understood as the tasks and functions that the institutions have subscribed to in their treaties, strategies and other constitutive and operational texts. Overlapping mandates imply that member states are subject to similar commitments. In the case of crisis management, the mandate can reach from low to high intensity crisis management operations or just elements of crisis management. Resources include the common and pooled resources of each institution. It stresses the fact that the existence of multiple institutions in one policy field increases the relative scarcity of resources.” In Hofman (2011). Also see Hofmann (2009).

  10. 10.

    The EDA’s exact mission: ‘EDA’s mission is to support the Council and the Member States in their effort to improve theEuropean Union’s defence capabilities for the Common Security and Defence Policy (CSDP). This means running and supporting cooperative European defence projects; supporting research and technology development; boosting the European defence technological and industrial base; and providing a forum for European Ministries of Defence. EDA is one of the youngest European Union Agencies. It works on the basis of a new approach, tailored to the military needs of tomorrow, providing different and often innovative solutions. EDA and its participating Member States have launched important projects such as helicopters availability, the European Air Transport Fleet or the insertion of Unmanned Aircraft Systems into normal airspace, to name but a few. EDA is pragmatic, cost effective and results oriented. It offers multinational solutions for capability improvement in a time where defence budget constraints foster the need for cooperation.’ It can be observed that it is primarily a cooperative institution in which all EU member states, but Denmark, participate. http://www.eda.europa.eu/Aboutus/Whatwedo/Missionandfunctions

  11. 11.

    For example, the European Defence Agency supports the council and member states, while ENISA consults with the European Parliament regarding cybersecurity.

  12. 12.

    Inefficiencies from transaction costs, opportunity, cost of time, and sub-optimal policies resulting from the complexity of decision making.

  13. 13.

    In addition, Stetter expresses skepticism for the supranational-intergovernmental logic. This is also the opinion of Howorth (2012), presented in the next paragraph (Stetter 2004).

  14. 14.

    This argument is analyzed later by using welfare economics and game theory.

  15. 15.

    It should be added that EC3 is expected to be fully operation by 2015. http://www.loc.gov/lawweb/servlet/lloc_news?disp3_l205403457_text

  16. 16.

    “The Pentagon has approved a major expansion of its cybersecurity force over the next several years, increasing its size more than fivefold to bolster the nation’s ability to defend critical computer systems and conduct offensive computer operations against foreign adversaries, according to U.S. officials.

    The move, requested by the head of the Defense Department’s Cyber Command, is part of an effort to turn an organization that has focused largely on defensive measures into the equivalent of an Internet-era fighting force. The command, made up of about 900 personnel, will expand to include 4,900 troops and civilians” (Nakashima 2013).

  17. 17.

    IT industries are developed in other countries, most notably China.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pythagoras Petratos Ph.D. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Petratos, P. (2014). Cybersecurity in Europe: Cooperation and Investment. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Cyber-Development, Cyber-Democracy and Cyber-Defense. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-1028-1_11

Download citation

Publish with us

Policies and ethics