Have a personal or library account? Click to login
Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective Cover

Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective

Open Access
|Dec 2021

References

  1. Abott, Rich (2015): U.K. Agrees With China Not To Support Cyber Theft Of Intellectual Property, Defense Daily (29 October): available at https://www.defensedaily.com/u-k-agrees-with-china--not-to-support-cyber-theft-of-intellectual-property-2/uncategorized/(31 May 2021).
  2. Bergenas, Johan (2008): The role of regional and sub-regional organizations in implementing UN Security Council Resolution 1540: a preliminary assessment of the African continent: available at http://www.vertic.org/media/assets/nim_docs/background%20articles/UNIDIR%20Scheinman%201540%20pdf2-act341.pdf (31 May 2021).
  3. Buchan, Russell (2018): Cyber Espionage and International Law, Hart Publishing.
  4. Cabada Ladislav (2018): Visegrad Group in the Context of Other Central European Cooperation Formats. Politics in Central Europe, Vol. 13, No. 2, 165–179.10.2478/pce-2018-0014
  5. Cowan, Paris (2017): Australia, China agree to oppose cyber IP theft, IT News (24 April): avail-ableathttps://www.itnews.com.au/news/australia-china-ink-agreement-to-stop-industrial--hacking-459387#:~ (31 May 2021).
  6. Crawford, James (1997): Universalism and regionalism from the perspective of the work of the International Law Commission, in United Nations, ed., International Law on the Eve of the Twenty-fist Century. Views from the International Law Commission, 99–122, United Nations.
  7. Eder, Marton (2021): Hungary says vaccine registration website under cyber attack, Bloomberg Blog (19 February): available at https://www.bloomberg.com/news/articles/2021-02-19/hungary-says-vaccine-registration-website-under-cyber-attack (31May2021).
  8. European Union Intellectual Property Office (2018): The baseline of trade secrets litigation in the EU member states, EUIPO: available at https://euipo.europa.eu/tunnel-web/secure/webdav/guest/document_library/observatory/documents/reports/2018_Baseline_of_Trade_Secrets_Litigations_in_EU_Member_States/2018_Baseline_of_Trade_Secrets_Litigations_in_EU_Member_States_EN.pdf (31 May 2021.)
  9. Fidler, David P. (2020a): Cybersecurity in the Time of COVID-19, Council on Foreign Relations Blog (30 March): available at https://www.cfr.org/blog/cybersecurity-time-covid-19 (31 May 2021).
  10. Fidler, David P. (2020b): 2020 in Review: The COVID-19 Pandemic and Cyberspace, Council on Foreign Relations Blog (14 December): available at https://www.cfr.org/blog/2020-review--covid-19-pandemic-and-cyberspace (31 May 2021).
  11. Garcia-Mora, Manuel R, (1964: Treason, Sedition and Espionage as Political Offenses Under the Law of Extradition, U. PITT.L. REV. 26 (65): 79–80.
  12. Gebhard, Carmen (2013): Sub-Regional cooperation in Central Europe – past, present and future, AARMS 12 (1): 25–38.10.32565/aarms.2013.1.3
  13. Górka, Marek (2018): The Cybersecurity Strategy of the Visegrad Group Countries, Politics in Central Europe 14 (2): 75–98.10.2478/pce-2018-0010
  14. Hua, Jian (2015): Industrial Cyber Espionage, Journal of Management Systems 25 (3): 67–81
  15. Jančárková, Taťána – Minárik, Tomáš (2019): Scenario 09: Economic cyber espionage, Cyber Law Toolkit: available at https://cyberlaw.ccdcoe.org/wiki/Scenario_09:_Economic_cyber_espionage (31 May 2021).
  16. Joubert, Vincent (2010): Getting the essence of cyberspace: a theoretical framework to face cyber issues, in Czosseck – Podins, eds, Conference on Cyber Conflict. Proceedings 2010, 111–124, CCD COE Publications.
  17. Kaan Pehlivan, Oğuz (2019): Confronting Cyberespionage Under International Law, Routledge.10.4324/9781351106016
  18. Kenety, Brian (2020): ČSÚ: nearly 1 in 5 Czech companies faced cyberattack in 2018, Radio Prague International (13 January): available at https://www.radio.cz/en/section/business/csu-nearly-1-in-5-czech-companies-faced-cyberattack-in-2018 (3September2021).
  19. Kolbasuk McGee, Marianne (2018): U.S., China Reach Cyber Agreement, Bank Info Security (25 September): available at https://www.bankinfosecurity.com/us-china-a-8553 (31 May 2021).
  20. Legal Week Intelligence – CMS (2018): The Cybersecurity Challenge in Central and Eastern Europe. Are multinational companies prepared?, CMS Publication: available at https://cms.law/en/hun/publication/the-cybersecurity-challenge-in-central-and-eastern-europe(31May2021).
  21. Lennon, Mike (2013): TeamSpy – A Decade-long Cyber Espionage Operation Targeting Eastern Europe, Security Week (20 March): available at https://www.securityweek.com/teamspy--decade-long-cyber-espionage-operation-targeting-eastern-europe(31May2021).
  22. Lotrionte, Catherine (2015): Countering State-Sponsored Cyber Economic Espionage Under International Law, North Carolina Journal of International Law and Commercial Regulation 40: 443–541.
  23. Magen, Sharon (2017): Cybersecurity and Economic Espionage: The Case of Chinese Investments in the Middle East, Cyber, Intelligence, and Security 1 (3): 3–18.
  24. Nasheri, Hedieh (2003): The Intersection of Technology Crimes and Cyberspace in Europe: The Case of Hungary, Information & Communications Technology Law 12 (1): 25–48.10.1080/1360083032000052241
  25. Panyi, Szabolcs (2021a): How Orbán’s Eastern Opening brought Chinese spy games to Budapest, Direkt36 (14 March): available at https://www.direkt36.hu/en/kemjatszmakat-hozott--budapestre-orban-kinai-nyitasa/ (31May2021).
  26. Panyi, Szabolcs (2021b): Hungary could turn into China’s trojan horse in Europe, Reporting Democracy (9 April): available at https://balkaninsight.com/2021/04/09/hungary-could-turn--into-chinas-trojan-horse-in-europe(31May2021).
  27. PRI (2018): Investor-company dialogue on cyber security: five emerging findings, PRI - Governance Issues (24 September): available at https://www.unpri.org/governance-issues/investor--company-dialogue-on-cyber-security-five-emerging-findings/3664.article(31May2021).
  28. PricewaterhouseCoopers (2018): Study on the scale and impact of industrial espionage and theft of trade secrets through cyber, Study prepared for the European Commission (18 December): available at https://ec.europa.eu/docsroom/documents/34841 (31 May 2021).
  29. Ravishankar, Vaishnavi – Mooney, Olivia – Hader, Nora (2018): Stepping up governance on cyber security. What is corporate disclosure telling investors?, Principles for Responsible Investment, UNEP Finance Initiative, UN Global Compact: available at https://www.unpri.org/download?ac=5134 (31 May 2021).
  30. Reynolds, Paul (2004): The World’s Second Oldest Profession, BBC News (26 February): available at https://perma.cc/B9KM-E5E5 (3 September 2021).
  31. Rudka, Andrzej (1997): Central Europe: regional cooperation and beyond, in Hayashi, Tadayuki, ed., The emerging new regional order in Central and Eastern Europe, 193–209, Hokkaido University.
  32. Shackelford, Scott J. et al. (2015): Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets Through Bilateral Investment Treaties, American Business Law Journal 52 (1): 1–74.10.1111/ablj.12041
  33. Schmitt, Michael – Vihul, Liis (2017): Tallinn Manual 2.0 on the international law applicable to cyber operations, Cambridge University Press.10.1017/9781316822524
  34. Strážay, Tomas (2011): Visegrád – arrival, survival, revival. Selected V4 Bibliography, Visegrad Group: available at http://www.visegradgroup.eu/documents/bibliography/visegradarrival--survival-120628 (31 May 2021).
  35. Strážay, Tomas (2019): When pragmatism wins: Slovakia in the Visegrád group, in Brezáni, Peter, ed., Yearbook of Slovakia’s foreign policy 2018, 67–74, Research Center of the Slovak Foreign Policy Association.
  36. Tasheva, Iva (2017): European cybersecurity policy. Trends and prospects, European Policy Centre – Policy Brief (8 June): available at https://www.epc.eu/pub_details.php?cat_id=3&pub_id=7739 (3 September 2021).
  37. UNODC (2018): Cyberespionage, E4J University Module Series: Cybercrime: available at https://www.unodc.org/e4j/en/cybercrime/module-14/key-issues/cyberespionage.html (31 May 2021).
  38. Van Arnam, Robert C. (2001): Business War: Economic Espionage in the United States and the European Union and the Need for Greater Trade Secret Protection, North Carolina Journal of International Law 27: 95–139.
  39. Wielgos, Alexander (2019): V4 in Changeful Espionage, The Warsaw Institute Review (4 November) available at https://warsawinstitute.org/v4-changeful-espionage (31 May 2021).
  40. Wołek, Artur (2013): Precipices beneath summits? The Visegrád cooperation seen from middle policy levels, in Marušiak, Juraj et al., eds., Internal cohesion of the Visegrád group, 86–99, VEDA.
  41. Zachová, Aneta et al. (2018): Is Visegrad group ready for cyber-attacks?, Visegrad.info (7 May): availableathttps://visegradinfo.eu/index.php/collaborative/560-is-visegrad-group-ready--for-cyberattack (31 May 2021).
DOI: https://doi.org/10.2478/pce-2021-0037 | Journal eISSN: 2787-9038 | Journal ISSN: 1801-3422
Language: English
Page range: 697 - 721
Published on: Dec 30, 2021
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2021 Federica Cristani, published by Metropolitan University Prague
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.