Have a personal or library account? Click to login
Catalysts of Cyber Threats on the Example of Visegrad Group Countries Cover

Catalysts of Cyber Threats on the Example of Visegrad Group Countries

By: Marek Górka  
Open Access
|Oct 2022

References

  1. Aleksandrowicz, T. R. – K. Liedel (2014): ‘Społeczeństwo informacyjne – sieć – cyberprzestrzeń. Nowe zagrożenia’, in K. Liedel, P. Piasecka and T.R. Aleksandrowicz (eds.), Sieciocentryczne bezpieczeństwo. Wojna, pokój i terroryzm w epoce informacji, Warsaw: Difin, 9–38.
  2. Aradau, C. (2010): Security That Matters: Critical Infrastructure and Objects of Protection. Security Dialogue 4(5): 491–514.10.1177/0967010610382687
  3. Axelrod, R. – Iliev, R. (2014): Timing of cyber conflict. PNAS 111(4): 1298–1303.10.1073/pnas.1322638111
  4. Carr, M. (2016): US Power and the Internet in International Relations. The Irony of the Information Age, London: Palgrave Macmillan.10.1057/9781137550248
  5. CFR (2020): Cyber Operations Tracker. Available at https://www.cfr.org/interactive/cyber--operations (June 21 2020).
  6. Chamonikolas, K. (2016): Czech Republic Says Russian Hackers Were ‘Very Active’ There in 2016. Available at https://www.bloomberg.com/news/articles/2017-10-24/russian-fancy-bear--hackers-seen-very-active-in-prague-in-2016(18June2020).
  7. Christou, G. (2015): Cybersecurity in the European Union. Resilience and Adaptability in Governance Policy, London: Palgrave Macmillan.
  8. CSIC (2020): Significant Cyber Incidents. Available at https://www.csis.org/programs/cybersecurity-and-gov-ernance/technology-policy-program/other-projects-cybersecurity (29 June 2020).
  9. cyberdefence24 (2015): Perpetrator of cyber attack on Plus Bank in hands of police. Available at https://www.cyberdefence24.pl/sprawca-cyberataku-na-plus-bank-w-rekach-policji (18 June 2020).
  10. Czech Republic 2018–2022 (2018): Cyber Defence Strategy of the Czech Republic 2018–2022. available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022).
  11. de Wilde, P. – Leupold, A. – Schmidtke, H. (2016): Introduction: The Differentiated Politicisation of European Governance. West European Politics 39(1): 3–22.10.1080/01402382.2015.1081505
  12. Dunlap, C. (2011): Perspectives for cyber strategists on law for cyberwar. Strategic Studies Quarterly 5(1): 84.
  13. Egloff, F. (2017): Cybersecurity and the Age of Privateering. In: Understanding Cyber Conflict. 14 Analogies, edited by George Perkovich and Ariel E. Levite. Georgetown: Georgetown University Press, 231–247.
  14. ENISA (2016): Definition of Cybersecurity – Gaps and overlaps in standardisation: available at: https://www.enisa.europa.eu/publications/definition-of-cybersecurity (12 April 2022).
  15. European Commission (2020): The EU’s Cybersecurity Strategy for the Digital Decade: avail-ableat:https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital--decade-0 (8 April 2022).
  16. European Parliament (2019): EU Cybersecurity Act i.e.: Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013: available at: https://eur-lex.europa.eu/eli/reg/2019/881/oj (10 April 2022).
  17. Farwell, J.P. – Rohozinski, R. (2011): Stuxnet and the Future of Cyber War. Survival 53(1): 23–40.10.1080/00396338.2011.555586
  18. Fontana, I. (2017): Disentangling the cyber politics-cyber security nexus: the new challenge of global politics. Global Affairs 3(1): 2–4.10.1080/23340460.2017.1320059
  19. Goldman, E. – Warner, M. (2017): Why a Digital Pearl Harbor Makes Sense and Is Possible. In: George Perkovich and Ariel E. Levite Understanding Cyber Conflict. 14 Analogies G. Georgetown, Georgetown University Press, 147–157.
  20. HershOctober, S.M. (2010): The Online Threat, Should we be worried about a cyber war? available at: https://www.newyorker.com/magazine/2010/11/01/the-online-threat (29 June 2020).
  21. Hoath, P. – Mulhall, T. (1998): ‘Hacking: Motivation and Deterrence’, Computer Fraud and Security 4: 16–19.10.1016/S1361-3723(97)86611-0
  22. Hungary 2013 (2013): National Cyber Security Strategy of Hungary 2013. available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022).
  23. Jordan, T. and P. A. Taylor (2014): Hacktivism and Cyberwars Rebels with a cause?, London, New York: Routledge.
  24. Kulesza, J. (2009): State responsibility for cyber-attacks on international peace and security. Polish Yearbook of International Law 29: 139–151.
  25. Lakomy, M. (2010): Znaczenie cyberprzestrzeni dla bezpieczeństwa państw na początku XXI wieku. Stosunki Międzynarodowe – International Relations 3(4): 59.
  26. Lasota, A. (2014): Cyberatak jako wstęp do cyberwojny. Studia Mazowieckie, 4: 65–78.
  27. Lin, H. (2012): Escalation dynamics and conflict termination in cyberspace. Strategic studies quarterly 6(3): 48.
  28. Lisiak-Felicka, D. (2017): Information Security Incidents: A comparison between the Czech Republic and Poland, 20th International Scientific Conference. Economic and Social Development, Prague.
  29. Mačák, K. (2016): Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of cyber operations by non-state actors. Journal of Conflict and Security Law 21(3): 408.
  30. Madej, M. (2009): Rewolucja informatyczna – istota, przejawy oraz wpływ na postrzeganie bezpieczeństwa państw i systemu międzynarodowego. In: Marek Madej and Marcin Terlikowski Bezpieczeństwo teleinformatyczne państwa, Warsaw: Polski Instytut Spraw Międzynarodowych, 17–40.
  31. Maness, R.C. – Valeriano, B. (2016): Cyber Spillover Conflicts: Transitions from Cyber Conflict to Conventional Foreign Policy Disputes?, Conflict, Security and Technology. In: Karsten Friis and Jens Ringsmose: Conflict in Cyber Space. Theoretical, Strategic and Legal Perspectives. London: Routledge, 45–64.
  32. MEDEA (2017): The 5th International Interdisciplinary Symposium On Art, Science, Technology Medea 2017. Available at: https://uap.edu.pl/wp-content/uploads/2017/09/Medea-2017-eng.pdf (21 June 2020).
  33. Minarik, T. (2016): National Cyber Security Organization: Czech Republic: available at: https://ccdcoe.org/multimedia/national-cyber-security-organisation-czech-republic.html (29January 2020).
  34. NIST (2020): NIST Cybersecurity Framework: available at: https://www.nist.gov/cyberframework (10 April 2022).
  35. Nye, J. (2011): Nuclear lessons for cyber security? Strategic Studies Quarterly 5(4): 21.10.21236/ADA553620
  36. Nye, J. (2017): Deterrence and Dissuasion in Cyberspace. International Security 41(3): 51.10.1162/ISEC_a_00266
  37. Nye, J. and J. S. Nye (2011): Nuclear lessons for cyber security? Strategic studies quarterly 5(4): 22.10.21236/ADA553620
  38. Paganini, P. (2016): The website of the Hungarian Government temporarily shut by cyber-attack: available at: from https://securityaffairs.co/wordpress/45898/hacking/hungarian--government-website.html (18 June 2020).
  39. Poland 2019–2024 (2019): Poland’s Cyber Security Strategy 2019–2024: available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022).
  40. Procner, W. (2015): Wywiad i kontrwywiad w procesie strategicznej dezinformacji. Secretum 1(2): 40–57.
  41. Rid, T. – Buchanan, B. (2015): Attributing Cyber Attacks. Journal of Strategic Studies 38(2): 7.10.1080/01402390.2014.977382
  42. Sanger, D. (2017): Cyber, Drones, and Secrecy. In: Understanding Cyber Conflict. 14 Analogies, edited by George Perkovich and Ariel E. Levite. Georgetown: Georgetown University Press, 61–78.
  43. Schmitt, M. N. – Watts, S. (2016): Beyond State-centrism: International Law and Non-state Actors in Cyberspace. Journal of Conflict and Security Law 21(3): 595–611.10.1093/jcsl/krw019
  44. Slovakia 2021–2025 (2021): The National Cybersecurity Strategy 2021–2025: available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022).
  45. Sparks, C. (2003): Are the Western Media Really That Interested in China? Javnost – The Public 10(4): 93–108.10.1080/13183222.2003.11008843
  46. Trim, P. – Upton, D. (2016): Cyber Security Culture. Counteracting Cyber Threats through Organizational Learning and Training, New York: Routledge.10.4324/9781315575681
  47. Valeriano, B. – Maness, R.C. (2014): The Dynamics of Cyber Conflict between Rival Antagonists, 2001–2011. Journal of Peace Research 51(3): 347–360.10.1177/0022343313518940
  48. Warner, J. – Chapin, E. Matfess. H. (2019): Suicide Squads: The Logic of Linked Suicide Bombings. Security Studies 28 (1): 8–9.10.1080/09636412.2018.1508632
DOI: https://doi.org/10.2478/pce-2022-0014 | Journal eISSN: 2787-9038 | Journal ISSN: 1801-3422
Language: English
Page range: 317 - 342
Published on: Oct 13, 2022
Published by: Metropolitan University Prague
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2022 Marek Górka, published by Metropolitan University Prague
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.