Skip to main content

Cyber-Security Policies of East European Countries

  • Reference work entry
  • First Online:
Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense

Abstract

In modern times, ensuring security in cyberspace is the main task of national security for most states. States have different approaches to cybersecurity from the aspect of national security policies. They can be divided into two categories: those that regard cybersecurity as a civilian task and those that involve their militaries in creating or implementing cybersecurity policies. Those states that have incorporated cyber warfare into their military planning and organization perceive cyberattacks as a threat to their national security, while states that charge their civilian agencies with domestic cybersecurity missions classify cyber intrusions as security risks for only particular sectors. Adopting the framework of securitization theory, this chapter theorizes both civil and military approaches to cybersecurity and threat perceptions and their sources. The theoretical framework is then applied to a study of the cybersecurity policies of Eastern European countries and the Baltic states.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 489.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Anderson, R. H., & Anthony, H. (1996). An exploration of cyberspace security R&D investment strategies for DARPA: “The day after… in cyberspace II”.

    Google Scholar 

  • Butrimas, V. (2015). National security and international policy challenges in a post Stuxnet world. Lithuanian Annual Strategic Review. Lithuania: Ministry of Internal Affairs.

    Google Scholar 

  • Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner.

    Google Scholar 

  • Deibert, R. J. (2002). Dark guests and great firewalls: The Internet and Chinese security policy. Journal of Social Issues, 58, 143–159. https://doi.org/10.1111/1540-4560.00253.

    Article  Google Scholar 

  • Deibert, R., & Crete‐Nishihata, M. (2011). Blurred boundaries: Probing the ethics of cyberspace research. Review of Policy Research, 28, 531–537. https://doi.org/10.1111/j.1541-1338.2011.00521.x.

    Article  Google Scholar 

  • Dunn Cavelty, M. (2013). From cyber‐bombs to political fallout: Threat representations with an impact in the cyber‐security discourse. International Studies Review. https://doi.org/10.1111/misr.12023.

    Article  Google Scholar 

  • European Union Agency for Network and Information Security (ENISA). (2012). Cyber Europe 2012, key findings report, European Union Agency for Network and Information Security.

    Google Scholar 

  • Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security and the Copenhagen School (2009). International Studies Quarterly, 53, 1155–1175. Available at SSRN: https://ssrn.com/abstract=2567410.

  • Harknett, R., & Stever, J. A. (2009). The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen. Journal of Homeland Security and Emergency Management. Berlin/New York: De Gruyter.

    Google Scholar 

  • Lobato, C. L., & Kenkel K. M. (2015). Discourses of cyberspace securitization in Brazil and in the United States. Revista Brasileira de Política Internacional, 58(2), 23–43. Available at http://www.scielo.br/pdf/rbpi/v58n2/0034-7329-rbpi-58-02-00023.pdf.

    Article  Google Scholar 

  • Moore, T. (2010). Introducing the economics of cybersecurity: Principles and policy options. National Academies of Sciences Engineering Medicine (NAP).

    Google Scholar 

  • Newmeyer, K. P. (2015). Elements of national cybersecurity strategy for developing nations. National Cybersecurity Institute Journal, 1(3), 9–19. Excelsior College, Albany.

    Google Scholar 

  • Saco, D. (1999). Colonizing cyberspace: “National security” and the Internet. In J. Weldes, M. Laffey, H. Gusterson, & R. Duvall (Eds.), Cultures of insecurity: States, communities, and the production of danger. Minneapolis: University of Minnesota Press.

    Google Scholar 

  • Šaljić, E., & Đorđević, Z. (2011). Modern forms of terroism [!] environmental terrorism. Retrieved from https://dk.um.si/IzpisGradiva.php?lang=eng&id=30223.

    Google Scholar 

  • Świątkowska, J., et al. (2012). V4 cooperation in ensuring cyber security – Analysis and recommendations. Krákow: Koscluszko Institute.

    Google Scholar 

  • UNIDIR. (2013). The cyber index. International security trends and realities. Geneva: UNIDIR, United Nations Institute for DIsarmament Research.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dusko Tomic .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Tomic, D., Saljic, E., Cupic, D. (2018). Cyber-Security Policies of East European Countries. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-09069-6_59

Download citation

Publish with us

Policies and ethics