Abstract
This chapter focuses on the international cybersecurity cooperation dilemma. Cybersecurity is a common concern within the international community. With the breakneck development of the Internet, countries have gradually formed cooperation mainly involving models of international conferences, international organizations, and international treaties. Despite this, international cybersecurity cooperation is still insufficient, mainly due to fragmented mechanisms, poor effectiveness, and camp-based confrontations. From a realist point of view, these problems arise from objective factors such as differences in willingness, interests, and demands, amplified by gaps in strength, cost sharing, benefit distribution, and technical uncertainties. From the perspective of constructivism, there are also contributing factors such as misperceptions caused by stereotypes and misperceptions inherent to the characteristics of cyberspace. EU-South Korea cybersecurity cooperation should be open and inclusive to eliminate misperceptions, develop a tailor-made framework for cybersecurity cooperation, establish a dedicated cybersecurity cooperation mechanism, and pursue greater autonomy in the cyberspace of confrontation between camps. In their cooperation there is room for the EU and South Korea to play a greater role in cybersecurity.
Keywords
- Cybersecurity
- International cooperation
- EU-South Korea relations
- Northeast Asian cybersecurity
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Among these, WSIS, IGF, UNGGE, GCCS, London Process, ISOC, WIC and CIGA are comprehensive meetings to discuss international Internet governance, cybersecurity, and international law in cyberspace; IEG, GCA, ICSPA, SCO, and AALCO merely focus on cybercrime; CIGA, GCTF, and IMPACT focus on cyberterrorism.
- 2.
The ITU is a specialized agency of the United Nations responsible for all matters related to information and communication technologies; CSTD, a subsidiary body of the Economic and Social Council (ECOSOC), examines specific issues on science and technology for development; ICPO is an international organization that facilitates worldwide police cooperation and crime control.
- 3.
OECD, OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security, OECD.org, accessed June 25, 2021, https://www.oecd.org/digital/ieconomy/oecdguidelinesforthesecurityofinformationsystemsandnetworkstowardsacultureofsecurity.htm.
- 4.
Abraham D. Sofaer, Seymour E. Goodman, Proposal for an International Convention on Cyber Crime and Terrorism, CISAC, accessed June 25, 2021, https://cisac.fsi.stanford.edu/publications/proposal_for_an_international_convention_on_cyber_crime_and_terrorism_a.
- 5.
Eileen Donahoe, “Governance Challenges in the Global Digital Ecosystem,” In Innovations in Global Governance: Peace-Building, Human Rights, Internet Governance and Cybersecurity, and Climate Change, Council on Foreign Relations, accessed April 5, 2021, 24–28, https://www.cfr.org/report/innovations-global-governance.
- 6.
Thierry Tardy, “Revisiting the EU’s Security Partnerships,” European Union Institute for Security Studies (EUISS), accessed April 5, 2021, https://www.iss.europa.eu/content/revisiting-eu%E2%80%99s-security-partnerships.
- 7.
He Ye, “Effectiveness Analysis of Global Cybersecurity Governance Mechanism,” (Master’s thesis, China Foreign Affairs University, 2015), 22–24.
- 8.
Lu Chuanying, “Security Dilemmas Faced by Major Power in Cyberspace: A Case Study of China-Europe Cyber Cooperation,” Chinese Journal of European Studies, no.2 (2019): 114.
- 9.
Thomas Renard, “EU cyber partnerships: Assessing the EU strategic partnerships with third countries in the cyber domain,” European Politics and Society 19, no.3 (2018): 321–337.
- 10.
UNGGE refers to the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security.
- 11.
Agreement was reached in 2021. For a discussion on the failure of UNGGE earlier, see also the chapter of Yoo Joonkoo in this volume.
- 12.
Jacqueline Eggenschwiler, “A Typology of Cybersecurity Governance Models,” St Antony’s International Review 13, no. 2 (2018): 64–78.
- 13.
Cai Cuihong, “Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation”,China Quarterly of International Strategic Studies1, no.3 (2015). For a discussion on China’s cyber strategy, see also the chapter of Mason Richey in this volume.
- 14.
Lin Jing, “The Obstacles of International Cooperation Regarding Safeguarding Cybersecurity and China’s Strategies,” Journal of Xi’an Jiaotong University (Social Sciences) 37, no. 2 (March 2017): 80–81.
- 15.
Ibid., 80–81.
- 16.
Lu Chuanying, “Cyberspace Security Dilemma and the Construction of Governance Institution,” 52–53.
- 17.
Robert Jervis, Perception and Misperception in International Politics (Princeton, UK: Princeton University Press, 2017), 143–144.
- 18.
Wang Congyue, “Inheritance, Changes and Reflections on US-EU Cyber Security Cooperation in the Trump Era,” Foreign Theoretical Trends, no.7 (2019): 106–116.
- 19.
George Christou, “Transatlantic Cooperation in Cybersecurity: Converging on Security as Resilience?” in Cybersecurity in the European Union (London: Palgrave Macmillan Press, 2016).
- 20.
“ENISA Threat Landscape Report 2018,” ENISA, accessed April 5, 2021, shttps://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2018.
- 21.
Joint Statement of the Russian Federation and the People’s Republic of China on the International Relations Entering a New Era and the Global Sustainable Development, February 4, 2022, http://en.kremlin.ru/supplement/5770
- 22.
“Creative destruction” is a concept in economics raised by Joseph A. Schumpeter. It describes the “process of industrial mutation that continuously revolutionizes the economic structure from within, incessantly destroying the old one, incessantly creating a new one.”
- 23.
Lu Chuanying, “Security Dilemmas Faced by Major Power in Cyberspace: A Case Study of China-Europe Cyber Cooperation,” 122.
- 24.
Thomas Rid and Ben Buchanan, “Attributing Cyber Attacks,” The Journal of Strategic Studies 38, no. 1–2 (2015): 4–37.
- 25.
John H. Herz, “Idealist Internationalism and Security Dilemma,” World Politics, no. 2 (1950), 157–158.
- 26.
For a discussion on this, see also the chapter of Michael Reiterer in this volume.
- 27.
U.S. Department of Defense, “Joint Communique of the 52nd U.S.-Republic of Korea Security Consultative Meeting”, accessed July 5, 2021, https://www.defense.gov/Newsroom/Releases/Release/Article/2381879/joint-communique-of-the-52nd-us-republic-of-korea-security-consultative-meeting/.
References
Cai, Cuihong. “Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation”, China Quarterly of International Strategic Studies 1, no. 3 (2015).
Christou, George. “Transatlantic Cooperation in Cybersecurity: Converging on Security as Resilience?” in Cybersecurity in the European Union, London: Palgrave Macmillan Press, 2016.
Donahoe, Eileen. “Governance Challenges in the Global Digital Ecosystem,” In Innovations in Global Governance: Peace-Building, Human Rights, Internet Governance and Cybersecurity, and Climate Change, Council on Foreign Relations, 24–28. https://www.cfr.org/report/innovations-global-governance (accessed April 5, 2021).
Eggenschwiler, Jacqueline. “A Typology of Cybersecurity Governance Models,” St Antony’s International Review 13, no. 2 (2018): 64–78.
Herz, John H. “Idealist Internationalism and Security Dilemma,” World Politics, no. 2 (1950): 157–158.
He Ye. “Effectiveness Analysis of Global Cybersecurity Governance Mechanism” (Master’s thesis, China Foreign Affairs University, 2015), 22–24.
Jervis, Robert. Perception and Misperception in International Politics (Princeton, UK: Princeton University Press, 2017), 143–144.
Lin Jing. “The Obstacles of International Cooperation Regarding Safeguarding Cybersecurity and China’s Strategies,” Journal of Xi’an Jiaotong University (Social Sciences) 37, no. 2 (March 2017): 80–81.
Lu Chuanying. “Cyberspace Security Dilemma and the Construction of Governance Institution,” Contemporary International Relations, no. 11 (2018): 52–53.
OECD. OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security, OECD.org. https://www.oecd.org/digital/ieconomy/oecdguidelinesforthesecurityofinformationsystemsandnetworkstowardsacultureofsecurity.htm (accessed June 25, 2021).
Renard, Thomas. “EU cyber partnerships: Assessing the EU strategic partnerships with third countries in the cyber domain,” European Politics and Society 19, no. 3 (2018): 321–337.
Rid, Thomas, and Ben Buchanan. “Attributing Cyber Attacks,” The Journal of Strategic Studies, 38, 2015, no. 1–2 (2015): 4–37.
Sofaer, Abraham D., and Seymour E. Goodman. Proposal for an International Convention on Cyber Crime and Terrorism, CISAC. https://cisac.fsi.stanford.edu/publications/proposal_for_an_international_convention_on_cyber_crime_and_terrorism_a (accessed June 25, 2021).
Tardy, Thierry. “Revisiting the EU’s Security Partnerships,” European Union Institute for Security Studies (EUISS). https://www.iss.europa.eu/content/revisiting-eu%E2%80%99s-security-partnerships (accessed April 5, 2021).
U.S. Department of Defense. “Joint Communique of the 52nd U.S.-Republic of Korea Security Consultative Meeting”. https://www.defense.gov/Newsroom/Releases/Release/Article/2381879/joint-communique-of-the-52nd-us-republic-of-korea-security-consultative-meeting/ (accessed July 5, 2021).
Wang Congyue. “Inheritance, Changes and Reflections on US-EU Cyber Security Cooperation in the Trump Era,” Foreign Theoretical Trends, no. 7 (2019): 106–116.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Cai, C. (2022). The International Cybersecurity Cooperation Dilemma and Implications for EU-South Korea Relations. In: Boulet, G., Reiterer, M., Pardo, R.P. (eds) Cybersecurity Policy in the EU and South Korea from Consultation to Action. New Security Challenges. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-08384-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-031-08384-6_13
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-031-08383-9
Online ISBN: 978-3-031-08384-6
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)