Politik der Cybersicherheit auf nationaler, europäischer und internationaler Ebene: Eine Rahmenanalyse

Chapter
Part of the Studien zur Inneren Sicherheit book series (SZIS, volume 18)

Zusammenfassung

Die Cybersicherheit wurde zu einem Bestandteil des politischen Diskurses und der Sicherheitspolitik.Aus der Sicht der Politologie stellt sie ein wichtiges Forschungsgebiet dar sowie in der Politikfeldanalyse als auch in den Sicherheitsstudien Das Ziel dieses Beitrags ist einen Grundrahmen für die Forschung der Cybersicherheit aus der Sicht des Konzepts der Sicherheitssektoren und aus der Sicht der Politikfeldanalyse zu bauen und die Hauptmerkmale der Politik der Cybersicherheit auf der staatlichen, internationalen und europäischen Ebene aufzuklären.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. Ackermann, Paul/Breit, Gotthard/Cremer, Will/Massing, Peter/Weinbrenner, Peter (1994): Politikdidaktik. Planungsfragen für den Politikunterricht . Bonn.Google Scholar
  2. Almond, Gabriel/Powell, Bingham (1966): Comparative Politics. A developmental Approach . Boston, Toronto .Google Scholar
  3. Bundesamt für Verfassungschutz (1990): Verfassungsschutzbericht 1989 . Bonn .Google Scholar
  4. Buzan, Barry/Weaver, Ole/de Wilde, Jaap (1998): Security. A New Framework for Analysis . Boulder .Google Scholar
  5. Carr, Jeffrey (2010): Inside Cyber Warfare . Sebastopol .Google Scholar
  6. Castells, Manuel (2000): The Rise of the Network Society . Oxford .Google Scholar
  7. Castells, Manuel (2004): The Power of Identity . Oxford .Google Scholar
  8. Clarke, Richard/Knake Robert, (2010): Cyber War: The Next Threat to National Security and What to Do About It . New York .Google Scholar
  9. Curran, Kevin/Concannon, Kevin/McKeever, Sean (2008): Cyber Terrorism Attacks . In: Janczewski, Lech/ Colarik, Andrew (Hg .): Cyber Warfare and Cyber Terrorism . New York .Google Scholar
  10. Denning, Dorothy (2001): Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy . In: Arquilla, John/ Ronfeldt, David (Hg .): Networks and Netwars . Santa Monica . 239–288 .Google Scholar
  11. Dye, Thomas (1976): Policy Analysis. What governments Do, Why They Do it, And What Difference It Makes . Tuscaloosa .Google Scholar
  12. Emmers, Ralf (2007): Securitization . In: Collins, Alan (Hg .): Contemporary Security Studies . Oxford . 109–125 .Google Scholar
  13. Fiala, Petr (1995): Německá politologie . [Deutsche Politikwissenschaft] Brno .Google Scholar
  14. Fiala, Petr/Schubert, Klaus (2000): Moderní analýza politiky. Uvedení do teorií a metod policy analysis . [Moderne Politikanalyse . Die Einführung in die Theorien und Methoden der policy analysis] Brno .Google Scholar
  15. Halpin, Edward F./Trevorrow, Philippa/Webb, David/Wright, Steve (Hg .) (2006): Cyberwar, Netwar and the Revolution in Military Affairs . Basingstoke .Google Scholar
  16. Héritier, Adrienne (1995): „Leaders“ and „Laggards“ in European Clean Air Policy . In: van Waarden, Frans/ Unger, Brigitte (Hg .): Convergence or Diversity? Internationalization and Economic Policy Response . Aldershot . 278–305 .Google Scholar
  17. Hough, Peter (2004): Understanding Global Security . London .Google Scholar
  18. Kameník, Jiří/Brabec, František et al . (2007): Komerční bezpečnost. Soukromá bezpečnostní činnost detektivních kanceláří a bezpečnostních agentur . [Die kommerzielle Sicherheit . Die Privatsicherheitstätigkeit der Detektivbüros und Sicherheitsagenturen] Prag .Google Scholar
  19. Kropáčová, Andrea (2011): Týmová práce pro zajištění bezpečnosti komunikačních sítí . [Teamarbeit für die Gewährleistung der Sicherheit der Kommunikationssysteme] https:// www.nic.cz/files/nic/doc/Computer_CSIRT.CZ_052011.pdf (letzer Aufruf 25 .01 .2014) .
  20. Libicki, Martin (1995): What is Information Warfare? National Defence University .Google Scholar
  21. Mareš, Miroslav/Zeman, Petr (2010): Úvod do pojetí bezpečnostních hrozeb . [Die Einleitung in die Auffassung der Sicherheitsgefährdungen] In: Smolík, Josef/ Šmíd, Tomáš (Hg .): Vybrané bezpečnostní hrozby a rizika 21. století . [Die ausgewählten Sicherheitsgefährdungen und Risiken des 21 . Jahrhunderts .] Brno . 9–19 .Google Scholar
  22. Molander, Roger C./Riddile, Andrew/Wilson, Peter A. (1996): Strategic Information Warfare. A New Face of War . Santa Monica .Google Scholar
  23. Radaelli, Claudio (2000): Whither Europeanization? Concept stretching and substantive change . In: European Integration online Papers 4 . http://eiop.or.at/eiop/texte/2000-008.htm (letzter Aufruf 25 .01 .2014) .
  24. Sofaer, Abraham, Goodman, Seymour (Hg .): (2001): Transnational Dimension of Cyber Crime and Terrorism . Stanford: Hoover Institution Press .Google Scholar
  25. The Military Balance (2011): The International Institute for Strategic Studies, London .Google Scholar
  26. Toffler, Alvin (1984): The Third Wave. New York .Google Scholar
  27. Toffler, Alvin/Toffler, Heidi Adelaide (1995): War and Anti-War: Making Sense of Today’s Global Chaos . New York .Google Scholar
  28. Zemanová, Štěpánka (2007): Výzkum europeizace – aktuální problémy a perspektivy . [Un-tersuchung der Europäisierung – aktuelle Probleme und Perspektiven] In: Mezinárodní vztahy [Internationale Beziehungen] 4 . 29–55 .Google Scholar
  29. Verzeichnis elektronischer QuellenGoogle Scholar
  30. EU (2011): Cyber security: EU prepares to set up Computer Emergency Response Team for EU Institutions . http://europa.eu/rapid/pressReleasesAction.do?reference=IP/11/694
  31. ITU (2012): GCA. A Framework for International Cooperation . Legal Measures . http://www.itu.int/osg/csd/cybersecurity/gca/legal.html
  32. ITU (2011): Understanding Cybercrime . A Guide for Developing Countries .Google Scholar
  33. Národní centrum kybernetické bezpečnosti ČR (2011): Vládní CERT. Computer Emergency response team . [Nationalzentrum der Cybersicherheit der Tschechischen Republik (2011): Staatliches CERT. Computer Emergency response team] http://www.govcert.cz/cs/govcert/
  34. Communication on Creating a Safer Information Society by Improving the Security of Information Infrastructures and Combating Computer-related Crime (COM (2000) 890 final) http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_or-ganised_crime/l33193b_en.htm
  35. Commission Communication on Network and Information Security: A proposal for an EU policy approach (COM (2001) 298 final) http://ec.europa.eu/information_society/policy/nis/strategy/index_en.htm
  36. Communications on a Strategy for a secure Information society (COM (2006) 251) http://europa.eu/legislation_summaries/information_society/internet/l24153a_en.htm
  37. Communications on Fighting spam, spyware and malicious software (COM (2006) 688) http://europa.eu/legislation_summaries/information_society/internet/l24189a_en.htm
  38. Communication from the Commission to the European Parliament, the Council and the Committee of the Regions: Towards a general policy on the fight against cyber crime . (COM (2007) 267 final) http://ec.europa.eu/home-affairs/doc_centre/crime/crime_cybercrime_en.htm
  39. Communication from the Commission to the European Parliament, the Council, the Eu-ropean Economic and Social Committee and the Committee of the Regions on Critical Information Infrastructure Protection – „Protecting Europe from large scale cyber-attacks and disuptions: enhancing preparedness, security and resilience (COM (2009) 149 final) http://ec.europa.eu/home-affairs/doc_centre/crime/crime_cybercrime_en.htm
  40. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on Critical Information Infrastructure Protection „Achievements and next steps: towards global cyber-security“ (COM (2011) 163 final) http://ec.europa.eu/home-affairs/doc_centre/crime/crime_cybercrime_en.htm
  41. Communication from the Commission to the Council and the European Parliament . Tackling Crime in our Digital Age: Establishing a European Cybercrime Centre . (COM (2012) 140 final) http://ec.europa.eu/home-affairs/doc_centre/crime/crime_cybercrime_en.htm
  42. Consolidated versions of the Treaty on European Union and the Treaty on the Functioning of the European Union . http://eur-lex.europa.eu/en/treaties/index.htm
  43. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 con-cerning the processing of personal data and the protection of privacy in the electronic communications sector http://europa.eu/legislation_summaries/information_society/legislative_framework/l24120_en.ht
  44. Directive 2008/114/EC on the Identification and Designation of European Critical Infra-structures http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_terrorism/jl0013_en.htm
  45. Framework Decision 2005/222/JHA on attacks against information systems http://europa.eu/legislation_summaries/information_society/internet/l33193_en.htm
  46. Framework Decision 2001/413/JHA on combating fraud and counterfeiting of non-cash means of payment http://europa.eu/legislation_summaries/fight_against_fraud/fight_against_counterfeiting/l24212_en.htm
  47. Framework Decision 2004/68/JHA on sexual exploitation of children http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_trafficking_in_hu-man_beings/l33138_en.htm Google Scholar
  48. Proposal for a Directive of the European Parliament and of the Council on attacks against information systems and repealing Council Framework Decision 2005/222/JHA . http://eur-lex.europa.eu/SECMonth.do?year=2010&month=09 Google Scholar
  49. Regulation (EC) No 460/2004 of the European Parliament and of the Council of 10 March 2004 establishing the European Network and Information Security Agency http://europa.eu/legislation_summaries/information_society/internet/l24153_en.htm Google Scholar
  50. The EU Internal Security Strategy in Action: Five steps towards a more secure Europe . http://ec.europa.eu/home-affairs/policies/iss/internal_security_strategy_en.htm Google Scholar
  51. The Stockholm programme – an open and secure Europe serving and protecting citizens (2010/C115/01) . http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52010X G0504%2801%29:EN:NOTGoogle Scholar
  52. ni-k-navrhu-vecneho-zameru-zakona-o-kyberneticke-bezpecnosti-/ Věcný záměr zákona o kybernetické bezpečnosti.[Gesetzesentwurf zur Cybersicherheit] . http://www.nbu.cz/cs/aktuality/592-pripominkove-rize

Copyright information

© Springer Fachmedien Wiesbaden 2015

Authors and Affiliations

  • Martin Bastl
    • 1
  • Miroslav Mareš
    • 1
  • Kateřina Tvrdá
    • 1
  1. 1.BrnoDeutschland

Personalised recommendations