Cyber Diplomacy
Author(s): DRAGOMIR, Andreea
Author(s) keywords: cross-border nature of cyberspace, cyber diplomacy, cyber security, cybercrime, cyberspace
Reference keywords: cyber diplomacy, cybersecurity, cyberspace
Abstract:
The article aims to highlight issues related to the risks to both the European Union and the Member States, but at the same time seeks to highlight current legislative and political approaches applicable in cyberspace. This set of tools used in cyber diplomacy includes the concepts of cooperation and diplomatic dialogue (common cyber network of EU states, common cyber defense unit) but also measures to prevent cyber-attacks (European Union Cyber Security Strategy), as well as sanctions. Throughout this presentation, the main idea is supported by the cross-border nature of cyberspace.
References:
[1]. Voicu Adriana, Securitatea cibernetică, prioritate absolută a prezentului, Conf. Int'l Dr. 229 /2014, pag. 229 - 238, Available on HeinOnline database.
[2]. Popescu Vasile Florin, Securitatea cibernetică a infrastructurilor critice într-o lume din ce în ce mai conectată, Buletinul Universității Naționale de Apărare „Carol I”, Vol. 6 No. 3 (2019), București, Septembrie 2019, Available on https://revista.unap.ro/index.php/revista/article/view/628.
[3]. Cyberspace is defined by the act of H.G. (Governmental Decision) no. 271/23, May 2013, as: “the virtual environment, generated by the cyber infrastructures, including the information content processed, stored or transmitted, as well as the actions carried out by the users in it”.
[4]. Barston, R., Modern Diplomacy. In N. L. Djelantik, Praktek, Diplomasi Antara Teori dan Praktek, Yogyakarta: GrahaIlmu, 2008, p. 4.
[5]. Barrinha André & Thomas Renard, Cyber-diplomacy: the making of an international society in the digital age, Published online: 28 Dec 2017, Pages 353-364, Available on: https://www.tandfonline.com/doi/full/10.1080/23340460.2017.1414924.
[6]. Syawfi, I., Activitățile diplomatice de apărare ale Indoneziei în îndeplinirea obiectivelor de apărare ale Indoneziei (2003-2008). Jakarta: Universitas Indonesia, 2009, Available on: http://jurnal.idu.ac.id/index.php/JPBH/article/view/441/0.
[7]. Council UE, Draft Council Conclusions on Cyber Diplomacy 6122/15, 2015, Available on: https://data.consilium.europa.eu/doc/document/ST-6122-2015-INIT/en/pdf.
[8]. European Parliament And The Council, The EU's Cybersecurity Strategy for the Digital Decade, Bruxelles, 16.12.2020 JOIN(2020) 18 final, Available on: https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=JOIN:2020:0018:FIN:EN:PDF.
[9]. European Parliament And The Council, The EU's Cybersecurity Strategy for the Digital Decade, Bruxelles, 16.12.2020 JOIN(2020) 18 final, Available on: https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=JOIN:2020:0018:FIN:EN:PDF.
[10]. European Commission, Shaping Europe's digital future, COM(2020) 67 final, Available on: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020DC0067&from=ro.
[11]. European Commission Europe's moment: Repair and Prepare for the Next Generation, COM(2020) 98 final, Available on: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020DC0456&from=RO.
[12]. European Commission, The Eu Security Union Strategy 2020-2025, COM(2020) 605, Available on: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020DC0605&from=RO.
[13]. European Council, the Strategic Agenda of the European Council for the period 2019-2024, Available on: https://www.consilium.europa.eu/media/39914/a-new-strategic-agenda-2019-2024.pdf.
[14]. ENISA is a centre of expertise for cyber security in Europe, Available on: https://europa.eu/european-union/about-eu/agencies/enisa_en.
[15]. The European Parliament And The Council, Directive (EU) 2016/1148 concerning measures for a high common level of security of network and information systems across the Union, Available on: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L1148&from=RO.
[16]. The European Parliament And The Council, Directive (EU) 2016/1148 concerning measures for a high common level of security of network and information systems across the Union, Available on: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L1148&from=RO.
[17]. ENISA's Regulation is the Regulation (EU) 2019/881 of the European Parliament and of the EU Council of 17 April 2019 (Cybersecurity Act) on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013, Available on: https://www.enisa.europa.eu/.
[18]. Council, Decision concerning restrictive measures against cyber-attacks threatening the Union or its Member States, Bruxelles, 14 mai 2019, 7299/19, Available on: https://data.consilium.europa.eu/doc/document/ST-7299-2019-INIT/en/pdf.
[19]. Council, Decision (CFSP) 2020/1127of 30 July 2020 amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States, Available on: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32020D1127&from=RO.
[20]. European Commission, Communication From The Commission To The European Parliament, The Council, The European Economic And Social Committee And The Committee Of The Regions on the EU Strategy to tackle Organised Crime 2021-2025, Brussels, 14.4.2021, COM(2021) 170 final, Available on: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52021DC0170&from=EN.
[21]. European Commission, Communication From The Commission To The European Parliament, The Council, The European Economic And Social Committee And The Committee Of The Regions EU strategy for a more effective fight against child sexual abuse.
[22]. The European Parliament And The Council 2013/40/UE, Brussels, 24.7.2020, COM(2020) 607 final, Available on: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020DC0607&qid=1613668526322&from=RO.
[23]. The European Parliament And The Council, Directive 2011/92/Eu Of The European Parliament And Of The Council of 13 December 2011 on combating the sexual abuse and sexual exploitation of children and child pornography, and replacing Council Framework Decision 2004/68/JHA, Available on: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32011L0093&from=RO.
[24]. European Commission, Commission Implementing Decision of 5.5.2020 on the financing of the 2020 Partnership Instrument Annual Action Programme for cooperation with third countries to be financed from the general budget of the European Union, Brussels, 5.5.2020, C(2020) 2779 final, Available on: https://ec.europa.eu/fpi/system/files/2021-05/27_Partnership%20Instrument%202020.pdf.
[25]. The European Parliament And The Council, Directive (EU) 2018/1972 establishing the European Electronic Communications Code, Available on: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32018L1972&from=EN.
[26]. European Commission, Communication From The Commission To The European Parliament And The Council, First Progress Report on the EU Security Union Strategy, Brussels, 9.12.2020 COM(2020) 797 final, Available on: https://data.consilium.europa.eu/doc/document/ST-14019-2020-INIT/en/pdf.
[27]. Ana Badea-Mihalcea, Atacuri neconvenţionale. Dezacorduri cibernetice, Revista Intelligence, iulie 2020, Available on: https://intelligence.sri.ro/atacuri-neconventionale-dezacorduri-cibernetice/.
Article Title: Cyber Diplomacy
Author(s): DRAGOMIR, Andreea
Date of Publication: 2021-12-28
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2021.02.05
Issue: Volume 10, Issue 2, Year 2021
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 37-50 (14 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.