Skip to main content

Webometric Network Analysis of Cybersecurity Cooperation

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2022)

Abstract

Cyberspace is slowly but surely evolving into the battlefield of the future. The rise of computational power allows not only for state-sponsored hacking groups, but for lone hackers or organizations to wreak havoc on infrastructure, either for financial or political gain. Cooperation between states, on multiple levels, is required to defend their cyber sovereignty effectively. In this paper, we will identify Cyber Emergency Response Team (CΕRT) and Cyber Security Incident Response Team (CSIRT) which are under national or governmental supervision, and we will draw comparisons between the European Union and NATO. Furthermore, we will examine whether the cooperation between European Union Member States on the aforementioned technical level is reflected on the World Wide Web. Inter-linkage and co-mention analyses have been conducted to map the organizations’ footprint on Cyberspace, using Webometric Analyst.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Deshpande, A., Pitale, P., Sanap, S.: Industrial automation using Internet of Things (IOT). Int. J. Adv. Res. Comput. Eng. Technol. 5, 266–269 (2016)

    Google Scholar 

  2. Brass, I., Sowell, J.H.: Adaptive governance for the Internet of Things: coping with emerging security risks. Regul. Gov. 11–20 (2020). https://doi.org/10.1111/rego.12343

  3. Napetvaridze, V., Chochia, A.: Cybersecurity in the making – policy and law: a case study of Georgia. Int. Comp. Law Rev. 19, 155–180 (2019). https://doi.org/10.2478/iclr-2019-0019.Summary

    Article  Google Scholar 

  4. Holmberg, K.: Webometric Network Analysis: Mapping Cooperation and Geopolitical Connections Between Local Government Administration on the Web. ABO Akademi University Press (2009)

    Google Scholar 

  5. Carrapico, H., Barrinha, A.: The EU as a coherent (Cyber)security actor? J. Common. Mark Stud. 55, 1254–1272 (2017). https://doi.org/10.1111/jcms.12575

    Article  Google Scholar 

  6. Koulas, E., et al.: Misinformation and its stakeholders in europe: a web-based analysis. In: Arai, K. (ed.) Intelligent Computing. LNNS, vol. 285, pp. 575–594. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-80129-8_41

  7. Markopoulou, D., Papakonstantinou, V., de Hert, P.: The new EU cybersecurity framework: the NIS Directive, ENISA’s role and the General Data Protection Regulation. Comput. Law Secur. Rev. 35, 105336 (2019). https://doi.org/10.1016/j.clsr.2019.06.007

    Article  Google Scholar 

  8. Koulas, E.: Defining Sovereignty and National Interest on Cyberspace: National and Supranational Paradigms. Univeristy of Macedonia (2019)

    Google Scholar 

  9. Renard, T.: EU cyber partnerships: assessing the EU strategic partnerships with third countries in the cyber domain. Eur. Polit. Soc. 19, 321–337 (2018). https://doi.org/10.1080/23745118.2018.1430720

    Article  Google Scholar 

  10. Tanczer, L.M., Brass, I., Carr, M.: CSIRTs and global cybersecurity: how technical experts support science diplomacy. Glob. Policy 9, 60–66 (2018). https://doi.org/10.1111/1758-5899.12625

    Article  Google Scholar 

  11. Pupillo, L.: EU Cybersecurity and the Paradox of Progress. CEPS Policy Insights (2018)

    Google Scholar 

  12. Chaisse, J., Bauer, C.: Cybersecurity and the protection of digital assets: assessing the role of international investment law and arbitration. Vanderbilt. J. Entertain. Technol. Law 21 (2019)

    Google Scholar 

  13. Finnemore, M., Hollis, D.B.: Constructing norms for global cybersecurity. Am. J. Int. Law 110, 425–479 (2016). https://doi.org/10.1017/s0002930000016894

    Article  Google Scholar 

  14. Chainoglou, K.: Attribution policy in cyberwar. In: Kulesza, J., Balleste, R. (eds.) Cybersecurity and Human Rights in the Age of Cyberveillance. Rowman & Littlefield, London (2016)

    Google Scholar 

  15. Chainoglou, K.: Reconceptualising self-defence in international law. King’s Law J. 18, 61–94 (2007). https://doi.org/10.1080/09615768.2007.11427664

    Article  Google Scholar 

  16. Thelwall, M.: Introduction to Webometrics: Quantitative Web Research for the Social Sciences (2009)

    Google Scholar 

  17. Acharya, S., Park, H.W.: Open data in Nepal: a webometric network analysis. Qual. Quant. 51(3), 1027–1043 (2016). https://doi.org/10.1007/s11135-016-0379-1

    Article  Google Scholar 

  18. Disney, A.: Social network analysis 101: centrality measures explained. In: Cambridge Intelligence (2019). https://cambridge-intelligence.com/keylines-faqs-social-network-analysis/. Accessed 12 Oct 2020

  19. Valente, T.W., Coronges, K., Lakon, C., Costenbader, E.: How correlated are network centrality measures? Connect (Tor) 28, 16–26 (2008)

    Google Scholar 

  20. Friedkin, N.: Theoretical foundations for centrality measures. Am J Sociol 96, 1478–1504 (1991)

    Article  Google Scholar 

  21. Freeman, L.C.: Centrality in social networks conceptual clarification. Soc. Networks 1, 215–239 (1978). https://doi.org/10.1016/0378-8733(78)90021-7

    Article  Google Scholar 

  22. Newman, M.E.J.: Ego-centered networks and the ripple effect. Soc. Networks 25, 83–95 (2003). https://doi.org/10.1016/S0378-8733(02)00039-4

    Article  Google Scholar 

  23. Rajamäki, J.: Cyber security, trust-building, and trust-management: as tools for multi-agency cooperation within the functions vital to society. In: Clark, R.M., Hakim, S. (eds.) Cyber-Physical Security. PCI, vol. 3, pp. 233–249. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-32824-9_12

    Chapter  Google Scholar 

  24. Li, J., Xu, W.W., Wang, F., et al.: Examining China’s internet policies through a bibliometric approach. J. Contemp. East Asia 17, 237–253 (2018). https://doi.org/10.17477/jcea.2018.17.2.237

  25. Lo, G.P., Russo, P., Ursino, D.: A new Social Network Analysis-based approach to extracting knowledge patterns about research activities and hubs in a set of countries. Int. J. Bus. Innov. Res. 17, 1–36 (2018)

    Article  Google Scholar 

Download references

Acknowledgments

EK is funded by the EPSRC grant EP/S022503/1, which supports the Centre for Doctoral Training in Cybersecurity delivered by UCL’s Departments of Computer Science, Security and Crime Science, and Science, Technology, Engineering and Public Policy.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Emmanouil Koulas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Koulas, E., Shah, S.I.H., Peristeras, V. (2022). Webometric Network Analysis of Cybersecurity Cooperation. In: Arai, K. (eds) Intelligent Computing. SAI 2022. Lecture Notes in Networks and Systems, vol 506. Springer, Cham. https://doi.org/10.1007/978-3-031-10461-9_7

Download citation

Publish with us

Policies and ethics