Skip to main content
Top

2022 | OriginalPaper | Chapter

The International Cybersecurity Cooperation Dilemma and Implications for EU-South Korea Relations

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter focuses on the international cybersecurity cooperation dilemma. Cybersecurity is a common concern within the international community. With the breakneck development of the Internet, countries have gradually formed cooperation mainly involving models of international conferences, international organizations, and international treaties. Despite this, international cybersecurity cooperation is still insufficient, mainly due to fragmented mechanisms, poor effectiveness, and camp-based confrontations. From a realist point of view, these problems arise from objective factors such as differences in willingness, interests, and demands, amplified by gaps in strength, cost sharing, benefit distribution, and technical uncertainties. From the perspective of constructivism, there are also contributing factors such as misperceptions caused by stereotypes and misperceptions inherent to the characteristics of cyberspace. EU-South Korea cybersecurity cooperation should be open and inclusive to eliminate misperceptions, develop a tailor-made framework for cybersecurity cooperation, establish a dedicated cybersecurity cooperation mechanism, and pursue greater autonomy in the cyberspace of confrontation between camps. In their cooperation there is room for the EU and South Korea to play a greater role in cybersecurity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Among these, WSIS, IGF, UNGGE, GCCS, London Process, ISOC, WIC and CIGA are comprehensive meetings to discuss international Internet governance, cybersecurity, and international law in cyberspace; IEG, GCA, ICSPA, SCO, and AALCO merely focus on cybercrime; CIGA, GCTF, and IMPACT focus on cyberterrorism.
 
2
The ITU is a specialized agency of the United Nations responsible for all matters related to information and communication technologies; CSTD, a subsidiary body of the Economic and Social Council (ECOSOC), examines specific issues on science and technology for development; ICPO is an international organization that facilitates worldwide police cooperation and crime control.
 
3
OECD, OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security, OECD.​org, accessed June 25, 2021, https://​www.​oecd.​org/​digital/​ieconomy/​oecdguidelinesfo​rthesecurityofin​formationsystems​andnetworkstowar​dsacultureofsecu​rity.​htm.
 
4
Abraham D. Sofaer, Seymour E. Goodman, Proposal for an International Convention on Cyber Crime and Terrorism, CISAC, accessed June 25, 2021, https://​cisac.​fsi.​stanford.​edu/​publications/​proposal_​for_​an_​international_​convention_​on_​cyber_​crime_​and_​terrorism_​a.
 
5
Eileen Donahoe, “Governance Challenges in the Global Digital Ecosystem,” In Innovations in Global Governance: Peace-Building, Human Rights, Internet Governance and Cybersecurity, and Climate Change, Council on Foreign Relations, accessed April 5, 2021, 24–28, https://​www.​cfr.​org/​report/​innovations-global-governance.
 
6
Thierry Tardy, “Revisiting the EU’s Security Partnerships,” European Union Institute for Security Studies (EUISS), accessed April 5, 2021, https://​www.​iss.​europa.​eu/​content/​revisiting-eu%E2%80%99s-security-partnerships.
 
7
He Ye, “Effectiveness Analysis of Global Cybersecurity Governance Mechanism,” (Master’s thesis, China Foreign Affairs University, 2015), 22–24.
 
8
Lu Chuanying, “Security Dilemmas Faced by Major Power in Cyberspace: A Case Study of China-Europe Cyber Cooperation,” Chinese Journal of European Studies, no.2 (2019): 114.
 
9
Thomas Renard, “EU cyber partnerships: Assessing the EU strategic partnerships with third countries in the cyber domain,” European Politics and Society 19, no.3 (2018): 321–337.
 
10
UNGGE refers to the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security.
 
11
Agreement was reached in 2021. For a discussion on the failure of UNGGE earlier, see also the chapter of Yoo Joonkoo in this volume.
 
12
Jacqueline Eggenschwiler, “A Typology of Cybersecurity Governance Models,” St Antony’s International Review 13, no. 2 (2018): 64–78.
 
14
Lin Jing, “The Obstacles of International Cooperation Regarding Safeguarding Cybersecurity and China’s Strategies,” Journal of Xi’an Jiaotong University (Social Sciences) 37, no. 2 (March 2017): 80–81.
 
15
Ibid., 80–81.
 
16
Lu Chuanying, “Cyberspace Security Dilemma and the Construction of Governance Institution,” 52–53.
 
17
Robert Jervis, Perception and Misperception in International Politics (Princeton, UK: Princeton University Press, 2017), 143–144.
 
18
Wang Congyue, “Inheritance, Changes and Reflections on US-EU Cyber Security Cooperation in the Trump Era,” Foreign Theoretical Trends, no.7 (2019): 106–116.
 
19
George Christou, “Transatlantic Cooperation in Cybersecurity: Converging on Security as Resilience?” in Cybersecurity in the European Union (London: Palgrave Macmillan Press, 2016).
 
20
“ENISA Threat Landscape Report 2018,” ENISA, accessed April 5, 2021, shttps://www.​enisa.​europa.​eu/​publications/​enisa-threat-landscape-report-2018.
 
21
Joint Statement of the Russian Federation and the People’s Republic of China on the International Relations Entering a New Era and the Global Sustainable Development, February 4, 2022, http://​en.​kremlin.​ru/​supplement/​5770
 
22
“Creative destruction” is a concept in economics raised by Joseph A. Schumpeter. It describes the “process of industrial mutation that continuously revolutionizes the economic structure from within, incessantly destroying the old one, incessantly creating a new one.”
 
23
Lu Chuanying, “Security Dilemmas Faced by Major Power in Cyberspace: A Case Study of China-Europe Cyber Cooperation,” 122.
 
24
Thomas Rid and Ben Buchanan, “Attributing Cyber Attacks,” The Journal of Strategic Studies 38, no. 1–2 (2015): 4–37.
 
25
John H. Herz, “Idealist Internationalism and Security Dilemma,” World Politics, no. 2 (1950), 157–158.
 
26
For a discussion on this, see also the chapter of Michael Reiterer in this volume.
 
27
U.S. Department of Defense, “Joint Communique of the 52nd U.S.-Republic of Korea Security Consultative Meeting”, accessed July 5, 2021, https://​www.​defense.​gov/​Newsroom/​Releases/​Release/​Article/​2381879/​joint-communique-of-the-52nd-us-republic-of-korea-security-consultative-meeting/​.
 
Literature
go back to reference Cai, Cuihong. “Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation”, China Quarterly of International Strategic Studies 1, no. 3 (2015). Cai, Cuihong. “Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation”, China Quarterly of International Strategic Studies 1, no. 3 (2015).
go back to reference Christou, George. “Transatlantic Cooperation in Cybersecurity: Converging on Security as Resilience?” in Cybersecurity in the European Union, London: Palgrave Macmillan Press, 2016. Christou, George. “Transatlantic Cooperation in Cybersecurity: Converging on Security as Resilience?” in Cybersecurity in the European Union, London: Palgrave Macmillan Press, 2016.
go back to reference Eggenschwiler, Jacqueline. “A Typology of Cybersecurity Governance Models,” St Antony’s International Review 13, no. 2 (2018): 64–78. Eggenschwiler, Jacqueline. “A Typology of Cybersecurity Governance Models,” St Antony’s International Review 13, no. 2 (2018): 64–78.
go back to reference Herz, John H. “Idealist Internationalism and Security Dilemma,” World Politics, no. 2 (1950): 157–158. Herz, John H. “Idealist Internationalism and Security Dilemma,” World Politics, no. 2 (1950): 157–158.
go back to reference He Ye. “Effectiveness Analysis of Global Cybersecurity Governance Mechanism” (Master’s thesis, China Foreign Affairs University, 2015), 22–24. He Ye. “Effectiveness Analysis of Global Cybersecurity Governance Mechanism” (Master’s thesis, China Foreign Affairs University, 2015), 22–24.
go back to reference Jervis, Robert. Perception and Misperception in International Politics (Princeton, UK: Princeton University Press, 2017), 143–144. Jervis, Robert. Perception and Misperception in International Politics (Princeton, UK: Princeton University Press, 2017), 143–144.
go back to reference Lin Jing. “The Obstacles of International Cooperation Regarding Safeguarding Cybersecurity and China’s Strategies,” Journal of Xi’an Jiaotong University (Social Sciences) 37, no. 2 (March 2017): 80–81. Lin Jing. “The Obstacles of International Cooperation Regarding Safeguarding Cybersecurity and China’s Strategies,” Journal of Xi’an Jiaotong University (Social Sciences) 37, no. 2 (March 2017): 80–81.
go back to reference Lu Chuanying. “Cyberspace Security Dilemma and the Construction of Governance Institution,” Contemporary International Relations, no. 11 (2018): 52–53. Lu Chuanying. “Cyberspace Security Dilemma and the Construction of Governance Institution,” Contemporary International Relations, no. 11 (2018): 52–53.
go back to reference Renard, Thomas. “EU cyber partnerships: Assessing the EU strategic partnerships with third countries in the cyber domain,” European Politics and Society 19, no. 3 (2018): 321–337. Renard, Thomas. “EU cyber partnerships: Assessing the EU strategic partnerships with third countries in the cyber domain,” European Politics and Society 19, no. 3 (2018): 321–337.
go back to reference Rid, Thomas, and Ben Buchanan. “Attributing Cyber Attacks,” The Journal of Strategic Studies, 38, 2015, no. 1–2 (2015): 4–37. Rid, Thomas, and Ben Buchanan. “Attributing Cyber Attacks,” The Journal of Strategic Studies, 38, 2015, no. 1–2 (2015): 4–37.
go back to reference Wang Congyue. “Inheritance, Changes and Reflections on US-EU Cyber Security Cooperation in the Trump Era,” Foreign Theoretical Trends, no. 7 (2019): 106–116. Wang Congyue. “Inheritance, Changes and Reflections on US-EU Cyber Security Cooperation in the Trump Era,” Foreign Theoretical Trends, no. 7 (2019): 106–116.
Metadata
Title
The International Cybersecurity Cooperation Dilemma and Implications for EU-South Korea Relations
Author
Cuihong Cai
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-08384-6_13

Premium Partner