Accès libre

Catalysts of Cyber Threats on the Example of Visegrad Group Countries

   | 13 oct. 2022
À propos de cet article

Citez

Aleksandrowicz, T. R. – K. Liedel (2014): ‘Społeczeństwo informacyjne – sieć – cyberprzestrzeń. Nowe zagrożenia’, in K. Liedel, P. Piasecka and T.R. Aleksandrowicz (eds.), Sieciocentryczne bezpieczeństwo. Wojna, pokój i terroryzm w epoce informacji, Warsaw: Difin, 9–38. Search in Google Scholar

Aradau, C. (2010): Security That Matters: Critical Infrastructure and Objects of Protection. Security Dialogue 4(5): 491–514.10.1177/0967010610382687 Search in Google Scholar

Axelrod, R. – Iliev, R. (2014): Timing of cyber conflict. PNAS 111(4): 1298–1303.10.1073/pnas.1322638111 Search in Google Scholar

Carr, M. (2016): US Power and the Internet in International Relations. The Irony of the Information Age, London: Palgrave Macmillan.10.1057/9781137550248 Search in Google Scholar

CFR (2020): Cyber Operations Tracker. Available at https://www.cfr.org/interactive/cyber--operations (June 21 2020). Search in Google Scholar

Chamonikolas, K. (2016): Czech Republic Says Russian Hackers Were ‘Very Active’ There in 2016. Available at https://www.bloomberg.com/news/articles/2017-10-24/russian-fancy-bear--hackers-seen-very-active-in-prague-in-2016(18June2020). Search in Google Scholar

Christou, G. (2015): Cybersecurity in the European Union. Resilience and Adaptability in Governance Policy, London: Palgrave Macmillan. Search in Google Scholar

CSIC (2020): Significant Cyber Incidents. Available at https://www.csis.org/programs/cybersecurity-and-gov-ernance/technology-policy-program/other-projects-cybersecurity (29 June 2020). Search in Google Scholar

cyberdefence24 (2015): Perpetrator of cyber attack on Plus Bank in hands of police. Available at https://www.cyberdefence24.pl/sprawca-cyberataku-na-plus-bank-w-rekach-policji (18 June 2020). Search in Google Scholar

Czech Republic 2018–2022 (2018): Cyber Defence Strategy of the Czech Republic 2018–2022. available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022). Search in Google Scholar

de Wilde, P. – Leupold, A. – Schmidtke, H. (2016): Introduction: The Differentiated Politicisation of European Governance. West European Politics 39(1): 3–22.10.1080/01402382.2015.1081505 Search in Google Scholar

Dunlap, C. (2011): Perspectives for cyber strategists on law for cyberwar. Strategic Studies Quarterly 5(1): 84. Search in Google Scholar

Egloff, F. (2017): Cybersecurity and the Age of Privateering. In: Understanding Cyber Conflict. 14 Analogies, edited by George Perkovich and Ariel E. Levite. Georgetown: Georgetown University Press, 231–247. Search in Google Scholar

ENISA (2016): Definition of Cybersecurity – Gaps and overlaps in standardisation: available at: https://www.enisa.europa.eu/publications/definition-of-cybersecurity (12 April 2022). Search in Google Scholar

European Commission (2020): The EU’s Cybersecurity Strategy for the Digital Decade: avail-ableat:https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital--decade-0 (8 April 2022). Search in Google Scholar

European Parliament (2019): EU Cybersecurity Act i.e.: Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013: available at: https://eur-lex.europa.eu/eli/reg/2019/881/oj (10 April 2022). Search in Google Scholar

Farwell, J.P. – Rohozinski, R. (2011): Stuxnet and the Future of Cyber War. Survival 53(1): 23–40.10.1080/00396338.2011.555586 Search in Google Scholar

Fontana, I. (2017): Disentangling the cyber politics-cyber security nexus: the new challenge of global politics. Global Affairs 3(1): 2–4.10.1080/23340460.2017.1320059 Search in Google Scholar

Goldman, E. – Warner, M. (2017): Why a Digital Pearl Harbor Makes Sense and Is Possible. In: George Perkovich and Ariel E. Levite Understanding Cyber Conflict. 14 Analogies G. Georgetown, Georgetown University Press, 147–157. Search in Google Scholar

HershOctober, S.M. (2010): The Online Threat, Should we be worried about a cyber war? available at: https://www.newyorker.com/magazine/2010/11/01/the-online-threat (29 June 2020). Search in Google Scholar

Hoath, P. – Mulhall, T. (1998): ‘Hacking: Motivation and Deterrence’, Computer Fraud and Security 4: 16–19.10.1016/S1361-3723(97)86611-0 Search in Google Scholar

Hungary 2013 (2013): National Cyber Security Strategy of Hungary 2013. available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022). Search in Google Scholar

Jordan, T. and P. A. Taylor (2014): Hacktivism and Cyberwars Rebels with a cause?, London, New York: Routledge. Search in Google Scholar

Kulesza, J. (2009): State responsibility for cyber-attacks on international peace and security. Polish Yearbook of International Law 29: 139–151. Search in Google Scholar

Lakomy, M. (2010): Znaczenie cyberprzestrzeni dla bezpieczeństwa państw na początku XXI wieku. Stosunki Międzynarodowe – International Relations 3(4): 59. Search in Google Scholar

Lasota, A. (2014): Cyberatak jako wstęp do cyberwojny. Studia Mazowieckie, 4: 65–78. Search in Google Scholar

Lin, H. (2012): Escalation dynamics and conflict termination in cyberspace. Strategic studies quarterly 6(3): 48. Search in Google Scholar

Lisiak-Felicka, D. (2017): Information Security Incidents: A comparison between the Czech Republic and Poland, 20th International Scientific Conference. Economic and Social Development, Prague. Search in Google Scholar

Mačák, K. (2016): Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of cyber operations by non-state actors. Journal of Conflict and Security Law 21(3): 408. Search in Google Scholar

Madej, M. (2009): Rewolucja informatyczna – istota, przejawy oraz wpływ na postrzeganie bezpieczeństwa państw i systemu międzynarodowego. In: Marek Madej and Marcin Terlikowski Bezpieczeństwo teleinformatyczne państwa, Warsaw: Polski Instytut Spraw Międzynarodowych, 17–40. Search in Google Scholar

Maness, R.C. – Valeriano, B. (2016): Cyber Spillover Conflicts: Transitions from Cyber Conflict to Conventional Foreign Policy Disputes?, Conflict, Security and Technology. In: Karsten Friis and Jens Ringsmose: Conflict in Cyber Space. Theoretical, Strategic and Legal Perspectives. London: Routledge, 45–64. Search in Google Scholar

MEDEA (2017): The 5th International Interdisciplinary Symposium On Art, Science, Technology Medea 2017. Available at: https://uap.edu.pl/wp-content/uploads/2017/09/Medea-2017-eng.pdf (21 June 2020). Search in Google Scholar

Minarik, T. (2016): National Cyber Security Organization: Czech Republic: available at: https://ccdcoe.org/multimedia/national-cyber-security-organisation-czech-republic.html (29January 2020). Search in Google Scholar

NIST (2020): NIST Cybersecurity Framework: available at: https://www.nist.gov/cyberframework (10 April 2022). Search in Google Scholar

Nye, J. (2011): Nuclear lessons for cyber security? Strategic Studies Quarterly 5(4): 21.10.21236/ADA553620 Search in Google Scholar

Nye, J. (2017): Deterrence and Dissuasion in Cyberspace. International Security 41(3): 51.10.1162/ISEC_a_00266 Search in Google Scholar

Nye, J. and J. S. Nye (2011): Nuclear lessons for cyber security? Strategic studies quarterly 5(4): 22.10.21236/ADA553620 Search in Google Scholar

Paganini, P. (2016): The website of the Hungarian Government temporarily shut by cyber-attack: available at: from https://securityaffairs.co/wordpress/45898/hacking/hungarian--government-website.html (18 June 2020). Search in Google Scholar

Poland 2019–2024 (2019): Poland’s Cyber Security Strategy 2019–2024: available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022). Search in Google Scholar

Procner, W. (2015): Wywiad i kontrwywiad w procesie strategicznej dezinformacji. Secretum 1(2): 40–57. Search in Google Scholar

Rid, T. – Buchanan, B. (2015): Attributing Cyber Attacks. Journal of Strategic Studies 38(2): 7.10.1080/01402390.2014.977382 Search in Google Scholar

Sanger, D. (2017): Cyber, Drones, and Secrecy. In: Understanding Cyber Conflict. 14 Analogies, edited by George Perkovich and Ariel E. Levite. Georgetown: Georgetown University Press, 61–78. Search in Google Scholar

Schmitt, M. N. – Watts, S. (2016): Beyond State-centrism: International Law and Non-state Actors in Cyberspace. Journal of Conflict and Security Law 21(3): 595–611.10.1093/jcsl/krw019 Search in Google Scholar

Slovakia 2021–2025 (2021): The National Cybersecurity Strategy 2021–2025: available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022). Search in Google Scholar

Sparks, C. (2003): Are the Western Media Really That Interested in China? Javnost – The Public 10(4): 93–108.10.1080/13183222.2003.11008843 Search in Google Scholar

Trim, P. – Upton, D. (2016): Cyber Security Culture. Counteracting Cyber Threats through Organizational Learning and Training, New York: Routledge.10.4324/9781315575681 Search in Google Scholar

Valeriano, B. – Maness, R.C. (2014): The Dynamics of Cyber Conflict between Rival Antagonists, 2001–2011. Journal of Peace Research 51(3): 347–360.10.1177/0022343313518940 Search in Google Scholar

Warner, J. – Chapin, E. Matfess. H. (2019): Suicide Squads: The Logic of Linked Suicide Bombings. Security Studies 28 (1): 8–9.10.1080/09636412.2018.1508632 Search in Google Scholar

eISSN:
1801-3422
Langue:
Anglais
Périodicité:
2 fois par an
Sujets de la revue:
Social Sciences, Political Science, other, International Relations