首页 > 最新文献

European Security最新文献

英文 中文
Formatting European security integration through database interoperability 通过数据库互操作性格式化欧洲安全集成
IF 1.6 2区 社会学 Q1 AREA STUDIES Pub Date : 2022-07-03 DOI: 10.1080/09662839.2022.2101886
R. Bellanova, Georgios Glouftsios
ABSTRACT In this article, we explore the security politics of EU database interoperability, inquiring how knowledge infrastructures underpin European security integration. Sitting at the intersection of Science and Technology Studies (STS) and critical approaches to European security, we unpack the co-constitutive relation between database anxieties and interoperability mechanisms. By database anxieties, we refer to what European institutions identify as the main epistemic and operational concerns that emerge from the current use of databases by security authorities across Europe. These anxieties are expected to be resolved by mechanisms that foster interoperability. We argue that the relation between database anxieties and interoperability mechanisms shapes the novel conditions of possibility for European security integration in a datafied world. While far-reaching in technological terms, interoperability is not about introducing a new overarching system, but about the management, re-organisation and re-purposing of datasets. Such formatting matters politically because it eventually informs sovereign acts of policing and mobility control.
摘要在本文中,我们探讨了欧盟数据库互操作性的安全政治,探讨了知识基础设施如何支撑欧洲安全集成。站在科学技术研究(STS)和欧洲安全关键方法的交叉点上,我们揭示了数据库焦虑和互操作性机制之间的共同构成关系。关于数据库焦虑,我们指的是欧洲机构认为的欧洲安全当局目前使用数据库所产生的主要认识和操作问题。这些焦虑有望通过促进互操作性的机制来解决。我们认为,数据库焦虑和互操作性机制之间的关系为数据化世界中的欧洲安全一体化创造了新的可能性条件。虽然在技术方面意义深远,但互操作性并不是引入一个新的总体系统,而是数据集的管理、重组和重新利用。这种格式在政治上很重要,因为它最终会为警务和流动控制的主权行为提供信息。
{"title":"Formatting European security integration through database interoperability","authors":"R. Bellanova, Georgios Glouftsios","doi":"10.1080/09662839.2022.2101886","DOIUrl":"https://doi.org/10.1080/09662839.2022.2101886","url":null,"abstract":"ABSTRACT In this article, we explore the security politics of EU database interoperability, inquiring how knowledge infrastructures underpin European security integration. Sitting at the intersection of Science and Technology Studies (STS) and critical approaches to European security, we unpack the co-constitutive relation between database anxieties and interoperability mechanisms. By database anxieties, we refer to what European institutions identify as the main epistemic and operational concerns that emerge from the current use of databases by security authorities across Europe. These anxieties are expected to be resolved by mechanisms that foster interoperability. We argue that the relation between database anxieties and interoperability mechanisms shapes the novel conditions of possibility for European security integration in a datafied world. While far-reaching in technological terms, interoperability is not about introducing a new overarching system, but about the management, re-organisation and re-purposing of datasets. Such formatting matters politically because it eventually informs sovereign acts of policing and mobility control.","PeriodicalId":46331,"journal":{"name":"European Security","volume":"31 1","pages":"454 - 474"},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46532436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Border security and the digitalisation of sovereignty: insights from EU borderwork 边境安全与主权数字化:来自欧盟边境工作的见解
IF 1.6 2区 社会学 Q1 AREA STUDIES Pub Date : 2022-07-03 DOI: 10.1080/09662839.2022.2101884
Bruno Oliveira Martins, Kristoffer Lidén, Maria Gabrielsen Jumbert
ABSTRACT The European Union’s effort at controlling its external borders is an endeavour that increasingly relies on digital systems: from tools for information gathering and surveillance to systems for communicating between different agencies and across member states. This makes EU borders a key site for the politics of “digital sovereignty” – of controlling digital data, software and infrastructures. In this article, we propose a new understanding of how the concepts of digital and sovereignty interplay: sovereignty by digital means, sovereignty of the digital, and sovereignty over the digital. We do it by analysing three key manifestations within the EU’s borderwork: firstly, the expansion of EURODAC to include facial biometric data; secondly, the creation of the (future) shared Biometric Matching System (sBMS); and thirdly, the EU-funded West Africa Police Information System (WAPIS). These databases and systems exemplify three transformations of EU borderwork that invoke different dimensions of digital sovereignty: expansion of techniques for governing migration; interoperability of EU databases facilitating the internalisation of borders through domestic policing; and extra-territorialization of borderwork beyond the geographic limits of the EU.
摘要欧盟控制外部边界的努力越来越依赖数字系统:从信息收集和监控工具到不同机构之间和成员国之间的通信系统。这使得欧盟边界成为“数字主权”政治的关键场所,即控制数字数据、软件和基础设施。在这篇文章中,我们对数字和主权的概念如何相互作用提出了新的理解:通过数字手段的主权、数字的主权和对数字的主权。我们通过分析欧盟边界工作中的三个关键表现来做到这一点:首先,将EURODAC扩展到包括面部生物特征数据;其次,创建(未来)共享的生物特征匹配系统(sBMS);第三,欧盟资助的西非警察信息系统。这些数据库和系统举例说明了欧盟边界工作的三种转变,它们唤起了数字主权的不同维度:移民管理技术的扩展;欧盟数据库的互操作性,通过国内治安促进边界内部化;以及超出欧盟地理范围的边境工作的域外化。
{"title":"Border security and the digitalisation of sovereignty: insights from EU borderwork","authors":"Bruno Oliveira Martins, Kristoffer Lidén, Maria Gabrielsen Jumbert","doi":"10.1080/09662839.2022.2101884","DOIUrl":"https://doi.org/10.1080/09662839.2022.2101884","url":null,"abstract":"ABSTRACT The European Union’s effort at controlling its external borders is an endeavour that increasingly relies on digital systems: from tools for information gathering and surveillance to systems for communicating between different agencies and across member states. This makes EU borders a key site for the politics of “digital sovereignty” – of controlling digital data, software and infrastructures. In this article, we propose a new understanding of how the concepts of digital and sovereignty interplay: sovereignty by digital means, sovereignty of the digital, and sovereignty over the digital. We do it by analysing three key manifestations within the EU’s borderwork: firstly, the expansion of EURODAC to include facial biometric data; secondly, the creation of the (future) shared Biometric Matching System (sBMS); and thirdly, the EU-funded West Africa Police Information System (WAPIS). These databases and systems exemplify three transformations of EU borderwork that invoke different dimensions of digital sovereignty: expansion of techniques for governing migration; interoperability of EU databases facilitating the internalisation of borders through domestic policing; and extra-territorialization of borderwork beyond the geographic limits of the EU.","PeriodicalId":46331,"journal":{"name":"European Security","volume":"31 1","pages":"475 - 494"},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49349920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Artificial intelligence and EU security: the false promise of digital sovereignty 人工智能与欧盟安全:数字主权的虚假承诺
IF 1.6 2区 社会学 Q1 AREA STUDIES Pub Date : 2022-07-03 DOI: 10.1080/09662839.2022.2101885
Andrea Calderaro, Stella Blumfelde
ABSTRACT EU Digital Sovereignty has emerged as a priority for the EU Cyber Agenda to build free and safe, yet resilient cyberspace. In a traditional regulatory fashion, the EU has therefore sought to gain more control over third country-based digital intermediaries through legislative solutions regulating its internal market. Although potentially effective in shielding EU citizens from data exploitation by internet giants, this protectionist strategy tells us little about the EU’s ability to develop Digital Sovereignty, beyond its capacity to react to the external tech industry. Given the growing hybridisation of warfare, building on the increasing integration of artificial intelligence (AI) in the security domain, leadership in advancing AI-related technology has a significant impact on countries’ defence capacity. By framing AI as the intrinsic functioning of algorithms, data mining and computational capacity, we question what tools the EU could rely on to gain sovereignty in each of these dimensions of AI. By focusing on AI from an EU Foreign Policy perspective, we conclude that contrary to the growing narrative, given the absence of a leading AI industry and a coherent defence strategy, the EU has few tools to become a global leader in advancing standards of AI beyond its regulatory capacity.
摘要欧盟数字主权已成为欧盟网络议程的优先事项,以建设自由、安全但有弹性的网络空间。因此,以传统的监管方式,欧盟试图通过监管其内部市场的立法解决方案,对第三国的数字中介机构获得更多的控制权。尽管这一保护主义战略在保护欧盟公民免受互联网巨头的数据利用方面可能有效,但除了对外部科技行业做出反应的能力之外,它几乎没有告诉我们欧盟发展数字主权的能力。鉴于战争的日益复杂化,在人工智能日益融入安全领域的基础上,在推进人工智能相关技术方面的领导地位对各国的国防能力产生了重大影响。通过将人工智能定义为算法、数据挖掘和计算能力的内在功能,我们质疑欧盟可以依靠什么工具来获得人工智能各个方面的主权。通过从欧盟外交政策的角度关注人工智能,我们得出的结论是,与日益增长的说法相反,鉴于缺乏领先的人工智能产业和连贯的国防战略,欧盟几乎没有什么工具可以成为将人工智能标准提高到其监管能力之外的全球领导者。
{"title":"Artificial intelligence and EU security: the false promise of digital sovereignty","authors":"Andrea Calderaro, Stella Blumfelde","doi":"10.1080/09662839.2022.2101885","DOIUrl":"https://doi.org/10.1080/09662839.2022.2101885","url":null,"abstract":"ABSTRACT EU Digital Sovereignty has emerged as a priority for the EU Cyber Agenda to build free and safe, yet resilient cyberspace. In a traditional regulatory fashion, the EU has therefore sought to gain more control over third country-based digital intermediaries through legislative solutions regulating its internal market. Although potentially effective in shielding EU citizens from data exploitation by internet giants, this protectionist strategy tells us little about the EU’s ability to develop Digital Sovereignty, beyond its capacity to react to the external tech industry. Given the growing hybridisation of warfare, building on the increasing integration of artificial intelligence (AI) in the security domain, leadership in advancing AI-related technology has a significant impact on countries’ defence capacity. By framing AI as the intrinsic functioning of algorithms, data mining and computational capacity, we question what tools the EU could rely on to gain sovereignty in each of these dimensions of AI. By focusing on AI from an EU Foreign Policy perspective, we conclude that contrary to the growing narrative, given the absence of a leading AI industry and a coherent defence strategy, the EU has few tools to become a global leader in advancing standards of AI beyond its regulatory capacity.","PeriodicalId":46331,"journal":{"name":"European Security","volume":"31 1","pages":"415 - 434"},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43449617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The EU’s hegemonic imaginaries: from European strategic autonomy in defence to technological sovereignty 欧盟的霸权想象:从欧洲防务战略自主到技术主权
IF 1.6 2区 社会学 Q1 AREA STUDIES Pub Date : 2022-07-03 DOI: 10.1080/09662839.2022.2103370
Raluca Csernatoni
ABSTRACT Discourses around “strategic autonomy” and “sovereignty”, traditionally used at the state level, have been recently circulated within the EU supranational context regarding the European defence technological and industrial base, dual-use and disruptive research and innovation, and advances in the tech and digital domains. This article explores whether a high-politics logic intrinsic to “strategic autonomy” and “sovereignty” has been transplanted at the EU-level to enhance the strategic priority of various lower-politics policy fields across tech and digital policy initiatives and instruments. This logic has the hegemonic effect of shaping collective thinking and opening windows of opportunity for EU policymaking, by mainstreaming a security imaginary into broader technological governance processes. The article examines the EU’s scaled-up rhetoric around floating signifiers such as “strategic autonomy” and “technological sovereignty”, as well as the diffusion of overlapping “sovereignty” agendas enacted transversely in the defence, tech and digital sectors. The argument is that their meaning is not yet fixed but articulated via hegemonic interventions across different interconnected policy fields. This makes for conceptual “travelling” and “stretching” with a potential impact on the future of European security integration, by creating of a more unified security imaginary of the EU as a strategically independent and technologically sovereign space.
围绕“战略自治”和“主权”的话语,传统上用于国家层面,最近在欧盟超国家背景下流传,涉及欧洲国防技术和工业基础,两用和颠覆性研究和创新,以及技术和数字领域的进步。本文探讨了“战略自治”和“主权”所固有的高政治逻辑是否已被移植到欧盟层面,以提高技术和数字政策举措和工具等各种低政治政策领域的战略优先性。这种逻辑具有霸权效应,通过将安全设想纳入更广泛的技术治理过程的主流,塑造集体思维,为欧盟政策制定打开机会之窗。本文探讨了欧盟围绕“战略自主”和“技术主权”等浮动指标的扩大修辞,以及在国防、科技和数字领域横向制定的重叠“主权”议程的扩散。他们的论点是,它们的意义尚未确定,而是通过在不同相互关联的政策领域的霸权干预来表达的。这导致了概念上的“旅行”和“延伸”,对欧洲安全一体化的未来有潜在影响,因为它创造了一个更统一的安全想象,即欧盟是一个战略上独立、技术上主权的空间。
{"title":"The EU’s hegemonic imaginaries: from European strategic autonomy in defence to technological sovereignty","authors":"Raluca Csernatoni","doi":"10.1080/09662839.2022.2103370","DOIUrl":"https://doi.org/10.1080/09662839.2022.2103370","url":null,"abstract":"ABSTRACT Discourses around “strategic autonomy” and “sovereignty”, traditionally used at the state level, have been recently circulated within the EU supranational context regarding the European defence technological and industrial base, dual-use and disruptive research and innovation, and advances in the tech and digital domains. This article explores whether a high-politics logic intrinsic to “strategic autonomy” and “sovereignty” has been transplanted at the EU-level to enhance the strategic priority of various lower-politics policy fields across tech and digital policy initiatives and instruments. This logic has the hegemonic effect of shaping collective thinking and opening windows of opportunity for EU policymaking, by mainstreaming a security imaginary into broader technological governance processes. The article examines the EU’s scaled-up rhetoric around floating signifiers such as “strategic autonomy” and “technological sovereignty”, as well as the diffusion of overlapping “sovereignty” agendas enacted transversely in the defence, tech and digital sectors. The argument is that their meaning is not yet fixed but articulated via hegemonic interventions across different interconnected policy fields. This makes for conceptual “travelling” and “stretching” with a potential impact on the future of European security integration, by creating of a more unified security imaginary of the EU as a strategically independent and technologically sovereign space.","PeriodicalId":46331,"journal":{"name":"European Security","volume":"31 1","pages":"395 - 414"},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48380301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The EU, sanctions and regional leadership 欧盟、制裁和地区领导
IF 1.6 2区 社会学 Q1 AREA STUDIES Pub Date : 2022-06-21 DOI: 10.1080/09662839.2022.2085997
P. Cardwell, E. Moret
ABSTRACT Sanctions have become the “go to” mechanism for addressing foreign and security challenges in the international arena. The European Union’s willingness to impose autonomous (or unilateral) restrictive measures on third countries, and in particular on Russia, has come to the fore at a time when the uptake of new sanctions through the United Nations (UN) framework has stalled. This trend appears to reflect a growing ability to forge consensus among the EU's Member States and use its economic power to support its foreign policy goals. This article considers the extent to which the EU has succeeded in forging a leadership role in sanctions for itself among non-EU states. It examines the alignment or adoption by non-Member States with its sanctions regimes and finds that the EU has a demonstrable claim to regional, if not yet global, leadership.
摘要制裁已成为应对国际舞台上外交和安全挑战的“首选”机制。在通过联合国框架实施新制裁的行动停滞不前之际,欧盟对第三国,特别是对俄罗斯实施自主(或单方面)限制措施的意愿凸显出来。这一趋势似乎反映出欧盟成员国之间达成共识的能力日益增强,并利用其经济实力支持其外交政策目标。本文考虑了欧盟在非欧盟国家中成功地在制裁中发挥领导作用的程度。它审查了非成员国与其制裁制度的一致性或通过性,并发现欧盟对地区领导权(如果还不是全球领导权的话)有着明显的要求。
{"title":"The EU, sanctions and regional leadership","authors":"P. Cardwell, E. Moret","doi":"10.1080/09662839.2022.2085997","DOIUrl":"https://doi.org/10.1080/09662839.2022.2085997","url":null,"abstract":"ABSTRACT Sanctions have become the “go to” mechanism for addressing foreign and security challenges in the international arena. The European Union’s willingness to impose autonomous (or unilateral) restrictive measures on third countries, and in particular on Russia, has come to the fore at a time when the uptake of new sanctions through the United Nations (UN) framework has stalled. This trend appears to reflect a growing ability to forge consensus among the EU's Member States and use its economic power to support its foreign policy goals. This article considers the extent to which the EU has succeeded in forging a leadership role in sanctions for itself among non-EU states. It examines the alignment or adoption by non-Member States with its sanctions regimes and finds that the EU has a demonstrable claim to regional, if not yet global, leadership.","PeriodicalId":46331,"journal":{"name":"European Security","volume":"32 1","pages":"1 - 21"},"PeriodicalIF":1.6,"publicationDate":"2022-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47222566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Interpreting cyber-energy-security events: experts, social imaginaries, and policy discourses around the 2016 Ukraine blackout 解读网络能源安全事件:2016年乌克兰停电事件前后的专家、社会想象和政策话语
IF 1.6 2区 社会学 Q1 AREA STUDIES Pub Date : 2022-06-16 DOI: 10.1080/09662839.2022.2082838
Lars Gjesvik, Kacper Szulecki
ABSTRACT The digitalisation of the energy system brings out the question of cyber threats. How this area is perceived and how cyber-security policy in the energy sector develops is driven by the most spectacular cyber-incidents. How do these events shape public perceptions about the dangers of digitalisation? To understand this, we look at the 2016 CrashOverride cyberattack on Ukraine’s grid. Hypothesising that cyber-energy security incidents are interpreted in the context of socio-technical imaginaries of the energy sector and security imaginaries linked to foreign policy, we distil four discourses that emerged around the Ukraine attack among Western experts and commentators. One represented it as evidence of an accelerating race towards disaster, another as merely a tip of the iceberg. The third portrayed it as less catastrophic than initially suggested, while the last one as part of Russia’s cyber strategy. Not all of these were picked up by the broader public debate in Western security circles, and only the more alarmist discourses had a visible impact beyond niche communities.
能源系统的数字化带来了网络威胁的问题。如何看待这一领域,以及能源部门的网络安全政策如何发展,都是由最引人注目的网络事件驱动的。这些事件如何影响公众对数字化危险的看法?为了理解这一点,我们来看看2016年对乌克兰电网的CrashOverride网络攻击。假设网络能源安全事件是在能源部门的社会技术想象和与外交政策相关的安全想象的背景下解释的,我们提炼了西方专家和评论员围绕乌克兰袭击出现的四种话语。有人认为这是人类加速走向灾难的证据,有人则认为这只是冰山一角。第三篇文章将其描述为没有最初认为的那么灾难性,而最后一篇文章则将其描述为俄罗斯网络战略的一部分。并不是所有这些都被西方安全圈更广泛的公众辩论所接受,只有更危言耸听的话语在小众社区之外产生了明显的影响。
{"title":"Interpreting cyber-energy-security events: experts, social imaginaries, and policy discourses around the 2016 Ukraine blackout","authors":"Lars Gjesvik, Kacper Szulecki","doi":"10.1080/09662839.2022.2082838","DOIUrl":"https://doi.org/10.1080/09662839.2022.2082838","url":null,"abstract":"ABSTRACT The digitalisation of the energy system brings out the question of cyber threats. How this area is perceived and how cyber-security policy in the energy sector develops is driven by the most spectacular cyber-incidents. How do these events shape public perceptions about the dangers of digitalisation? To understand this, we look at the 2016 CrashOverride cyberattack on Ukraine’s grid. Hypothesising that cyber-energy security incidents are interpreted in the context of socio-technical imaginaries of the energy sector and security imaginaries linked to foreign policy, we distil four discourses that emerged around the Ukraine attack among Western experts and commentators. One represented it as evidence of an accelerating race towards disaster, another as merely a tip of the iceberg. The third portrayed it as less catastrophic than initially suggested, while the last one as part of Russia’s cyber strategy. Not all of these were picked up by the broader public debate in Western security circles, and only the more alarmist discourses had a visible impact beyond niche communities.","PeriodicalId":46331,"journal":{"name":"European Security","volume":"32 1","pages":"104 - 124"},"PeriodicalIF":1.6,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48787154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Positioning member states in EU-NATO security cooperation: towards a typology 欧盟-北约安全合作中成员国的定位:走向类型
IF 1.6 2区 社会学 Q1 AREA STUDIES Pub Date : 2022-05-26 DOI: 10.1080/09662839.2022.2076558
Nele Marianne Ewers-Peters
ABSTRACT With the growing density and the plethora of security organisations on the regional and international level, the research programme on interorganisational relations has received increasing scholarly attention. The complexity of European security – in light of the Ukraine conflict since 2014, Russia’s more assertive foreign policy behaviour, and on-going crisis management operations in the Africa, the Mediterranean Sea and Middle East – has revived EU-NATO cooperation. The analysis from the perspective of member states and how they can be positioned in the EU-NATO interorganisational relations, however, has received little exploration. This article, therefore, addresses the roles and positions of member states within the relations between the EU and NATO as Europe’s prime security organisations. Member states have numerous political strategies at their disposal to trigger, strengthen or obstruct interorganisational relations, ranging from forum-shopping to hostage-taking and brokering. Drawing on insights from regime theory, network analysis, organisation theory and interorganisationalism, this article proposes a typology of member states in EU-NATO cooperation. Against the backdrop of this special relationship, the typology is developed which aims to detect and illustrate member states’ positions and strategies.
摘要随着地区和国际安全组织的日益密集和过多,组织间关系研究项目越来越受到学术界的关注。欧洲安全的复杂性——鉴于2014年以来的乌克兰冲突、俄罗斯更加自信的外交政策行为,以及正在非洲、地中海和中东进行的危机管理行动——重振了欧盟与北约的合作。然而,从成员国的角度进行的分析以及如何在欧盟-北约组织间关系中定位,却很少得到探索。因此,本文论述了成员国作为欧洲主要安全组织在欧盟和北约关系中的作用和立场。会员国有许多政治战略可供选择,以触发、加强或阻碍组织间关系,从论坛购物到劫持人质和中介。本文借鉴了制度理论、网络分析、组织理论和组织间主义的观点,提出了欧盟-北约合作中成员国的类型。在这种特殊关系的背景下,发展了类型学,旨在发现和说明成员国的立场和战略。
{"title":"Positioning member states in EU-NATO security cooperation: towards a typology","authors":"Nele Marianne Ewers-Peters","doi":"10.1080/09662839.2022.2076558","DOIUrl":"https://doi.org/10.1080/09662839.2022.2076558","url":null,"abstract":"ABSTRACT With the growing density and the plethora of security organisations on the regional and international level, the research programme on interorganisational relations has received increasing scholarly attention. The complexity of European security – in light of the Ukraine conflict since 2014, Russia’s more assertive foreign policy behaviour, and on-going crisis management operations in the Africa, the Mediterranean Sea and Middle East – has revived EU-NATO cooperation. The analysis from the perspective of member states and how they can be positioned in the EU-NATO interorganisational relations, however, has received little exploration. This article, therefore, addresses the roles and positions of member states within the relations between the EU and NATO as Europe’s prime security organisations. Member states have numerous political strategies at their disposal to trigger, strengthen or obstruct interorganisational relations, ranging from forum-shopping to hostage-taking and brokering. Drawing on insights from regime theory, network analysis, organisation theory and interorganisationalism, this article proposes a typology of member states in EU-NATO cooperation. Against the backdrop of this special relationship, the typology is developed which aims to detect and illustrate member states’ positions and strategies.","PeriodicalId":46331,"journal":{"name":"European Security","volume":"32 1","pages":"22 - 41"},"PeriodicalIF":1.6,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46258807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Risk vs. threat-based cybersecurity: the case of the EU 基于风险与威胁的网络安全:以欧盟为例
IF 1.6 2区 社会学 Q1 AREA STUDIES Pub Date : 2022-05-09 DOI: 10.1080/09662839.2022.2069464
Sarah Backman
ABSTRACT In a relatively short time, cybersecurity has risen to become one of the EU’s security priorities. While the institutionalisation of EU-level cybersecurity capacities has been substantial since the first EU cybersecurity strategy was published, previous research has also identified resistance from member states to allow the EU to have more control over their cybersecurity activities. Despite a growing literature on EU cybersecurity governance, there are currently extensive gaps in the understanding of this tension. This study suggests that an explanatory factor can be found in the so-far overlooked dynamic of the relative prevalence of risk vs. threat-based security logics in the EU cybersecurity approach. By distinguishing between risk and threat-based logics in the development of the EU cybersecurity discourse over time, this study highlights a shift towards an increasing threat-based security logic in the EU cybersecurity approach. The identified development highlights securitising moves enacting to a larger extent than before objects and subjects of security traditionally associated with national security. The study identifies specific areas of member state contestation accompanying this shift and concludes with a discussion on the findings in relation to the development of the EU as a security actor in the wider international cybersecurity landscape.
摘要在相对较短的时间内,网络安全已成为欧盟的安全重点之一。尽管自第一份欧盟网络安全战略发布以来,欧盟层面的网络安全能力的制度化程度一直很高,但之前的研究也发现了成员国对允许欧盟对其网络安全活动进行更多控制的抵制。尽管关于欧盟网络安全治理的文献越来越多,但目前对这种紧张局势的理解存在很大差距。这项研究表明,在欧盟网络安全方法中,风险与基于威胁的安全逻辑的相对普遍性这一迄今被忽视的动态中,可以找到一个解释因素。随着时间的推移,通过区分欧盟网络安全话语发展中的风险和基于威胁的逻辑,本研究强调了欧盟网络安全方法中向日益增长的基于威胁的安全逻辑的转变。所确定的事态发展突出了证券化举措,这些举措比以前更大程度地制定了传统上与国家安全相关的安全目标和主体。该研究确定了伴随这一转变而来的成员国争论的具体领域,并以讨论与欧盟作为更广泛的国际网络安全格局中的安全行为者的发展有关的发现作为结束。
{"title":"Risk vs. threat-based cybersecurity: the case of the EU","authors":"Sarah Backman","doi":"10.1080/09662839.2022.2069464","DOIUrl":"https://doi.org/10.1080/09662839.2022.2069464","url":null,"abstract":"ABSTRACT In a relatively short time, cybersecurity has risen to become one of the EU’s security priorities. While the institutionalisation of EU-level cybersecurity capacities has been substantial since the first EU cybersecurity strategy was published, previous research has also identified resistance from member states to allow the EU to have more control over their cybersecurity activities. Despite a growing literature on EU cybersecurity governance, there are currently extensive gaps in the understanding of this tension. This study suggests that an explanatory factor can be found in the so-far overlooked dynamic of the relative prevalence of risk vs. threat-based security logics in the EU cybersecurity approach. By distinguishing between risk and threat-based logics in the development of the EU cybersecurity discourse over time, this study highlights a shift towards an increasing threat-based security logic in the EU cybersecurity approach. The identified development highlights securitising moves enacting to a larger extent than before objects and subjects of security traditionally associated with national security. The study identifies specific areas of member state contestation accompanying this shift and concludes with a discussion on the findings in relation to the development of the EU as a security actor in the wider international cybersecurity landscape.","PeriodicalId":46331,"journal":{"name":"European Security","volume":"32 1","pages":"85 - 103"},"PeriodicalIF":1.6,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43575473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
From prescriptive rules to responsible organisations – making sense of risk in protective security management – a study from Norway 从规定性规则到负责任的组织——理解保护性安全管理中的风险——来自挪威的一项研究
IF 1.6 2区 社会学 Q1 AREA STUDIES Pub Date : 2022-05-09 DOI: 10.1080/09662839.2022.2070006
Anne Heyerdahl
ABSTRACT Protective security management aims at protecting against malicious acts. It has, in a relatively short period, undergone substantial changes. One such change is the introduction of risk management. This article investigates a debate about a standard for security risk assessment (SRA) in Norway. It focuses on sense-making by security professionals, drawing on a unique interview material. The analysis utilises Michael Power’s theory on risk governance, as well as insights from security studies. A central finding is that the SRA approach was introduced to create more analytical security management. The importance of analysing one’s values (assets) makes it key to scrutinise the organisation’s characteristics, goals and vulnerabilities, regarded as moving security management in the direction of corporate governance. The article investigates how understanding of risk assessment and security interplay, and identifies a tension between risk (assessment) and the goal of protection, which makes security management risk averse. A requirement of creating sound security is viewed as a potential for burdensome organisational responsibility and blame. The analysis identifies elements of what is often described as resilience (attention towards vulnerabilities), but without the political reading (neo-liberal abdication of the state), thus contributing to the literature on resilience.
摘要保护性安全管理旨在防范恶意行为。它在相对较短的时间内发生了实质性的变化。其中一个变化就是引入了风险管理。本文调查了挪威关于安全风险评估标准的争论。它以一份独特的采访材料为基础,重点关注安全专业人员的感知能力。该分析利用了Michael Power的风险治理理论以及安全研究的见解。一个核心发现是,引入SRA方法是为了创建更具分析性的安全管理。分析一个人的价值观(资产)的重要性使得仔细审查组织的特征、目标和漏洞成为关键,这被视为将安全管理推向公司治理的方向。本文研究了对风险评估和安全的理解是如何相互作用的,并确定了风险(评估)和保护目标之间的紧张关系,这使得安全管理风险规避。建立健全安全的要求被视为可能带来繁重的组织责任和指责。该分析确定了通常被描述为韧性(关注脆弱性)的要素,但没有政治解读(新自由主义放弃国家),从而为韧性文献做出了贡献。
{"title":"From prescriptive rules to responsible organisations – making sense of risk in protective security management – a study from Norway","authors":"Anne Heyerdahl","doi":"10.1080/09662839.2022.2070006","DOIUrl":"https://doi.org/10.1080/09662839.2022.2070006","url":null,"abstract":"ABSTRACT Protective security management aims at protecting against malicious acts. It has, in a relatively short period, undergone substantial changes. One such change is the introduction of risk management. This article investigates a debate about a standard for security risk assessment (SRA) in Norway. It focuses on sense-making by security professionals, drawing on a unique interview material. The analysis utilises Michael Power’s theory on risk governance, as well as insights from security studies. A central finding is that the SRA approach was introduced to create more analytical security management. The importance of analysing one’s values (assets) makes it key to scrutinise the organisation’s characteristics, goals and vulnerabilities, regarded as moving security management in the direction of corporate governance. The article investigates how understanding of risk assessment and security interplay, and identifies a tension between risk (assessment) and the goal of protection, which makes security management risk averse. A requirement of creating sound security is viewed as a potential for burdensome organisational responsibility and blame. The analysis identifies elements of what is often described as resilience (attention towards vulnerabilities), but without the political reading (neo-liberal abdication of the state), thus contributing to the literature on resilience.","PeriodicalId":46331,"journal":{"name":"European Security","volume":"32 1","pages":"147 - 169"},"PeriodicalIF":1.6,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45562384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Discourses of blame in strategic narratives: the case of Russia’s 5G stories 战略叙事中的指责话语:以俄罗斯5G故事为例
IF 1.6 2区 社会学 Q1 AREA STUDIES Pub Date : 2022-04-12 DOI: 10.1080/09662839.2022.2057188
Sten Hansson, Mari-Liis Madisson, A. Ventsel
ABSTRACT Governments spread strategic narratives via media to influence foreign audiences and policy makers. A frequent but understudied feature of strategic narratives is the discursive construction of blame. In this article, we use the coverage of the adoption of 5G cellular technology in Russian state-funded news portals as an example to show how to interpret blame narratives about international security issues. We combine methods and insights from the discourse-analytic studies of blame and the research into the uses of strategic narratives in international relations to reveal how various articulations of blame are used to (de)legitimise particular actors and actions, sow discord, and foster alliances. Our analysis sheds new light on blame discourses that are more sophisticated and indirect than straightforward accusations and may serve multiple strategic goals at once. It also contributes to scholarship on Russia’s strategic communication about China as well as the United States and its allies.
摘要各国政府通过媒体传播战略叙事,以影响外国受众和政策制定者。战略叙事的一个常见但研究不足的特点是对指责的散漫建构。在这篇文章中,我们以俄罗斯国家资助的新闻门户网站采用5G蜂窝技术的报道为例,展示如何解读有关国际安全问题的指责叙事。我们结合了对指责的话语分析研究和对国际关系中战略叙事使用的研究的方法和见解,揭示了各种指责的表述是如何被用来使特定行为者和行动合法化、挑拨离间和建立联盟的。我们的分析为指责话语提供了新的视角,这些指责话语比直接的指责更复杂、更间接,可能同时为多个战略目标服务。它还为研究俄罗斯对中国以及美国及其盟友的战略沟通做出了贡献。
{"title":"Discourses of blame in strategic narratives: the case of Russia’s 5G stories","authors":"Sten Hansson, Mari-Liis Madisson, A. Ventsel","doi":"10.1080/09662839.2022.2057188","DOIUrl":"https://doi.org/10.1080/09662839.2022.2057188","url":null,"abstract":"ABSTRACT Governments spread strategic narratives via media to influence foreign audiences and policy makers. A frequent but understudied feature of strategic narratives is the discursive construction of blame. In this article, we use the coverage of the adoption of 5G cellular technology in Russian state-funded news portals as an example to show how to interpret blame narratives about international security issues. We combine methods and insights from the discourse-analytic studies of blame and the research into the uses of strategic narratives in international relations to reveal how various articulations of blame are used to (de)legitimise particular actors and actions, sow discord, and foster alliances. Our analysis sheds new light on blame discourses that are more sophisticated and indirect than straightforward accusations and may serve multiple strategic goals at once. It also contributes to scholarship on Russia’s strategic communication about China as well as the United States and its allies.","PeriodicalId":46331,"journal":{"name":"European Security","volume":"32 1","pages":"62 - 84"},"PeriodicalIF":1.6,"publicationDate":"2022-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48034959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
European Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1