The Evolution of the European Union’s Cybersecurity Culture in the Context of Selected Political and Economic Changes
Journal cover Przegląd Politologiczny, no. 4, year 2024
PDF

Keywords

European Union
political culture
security culture
cybersecurity culture
digitization
cybersecurity strategy

How to Cite

Górka, M., & Kamola-Cieślik, M. (2024). The Evolution of the European Union’s Cybersecurity Culture in the Context of Selected Political and Economic Changes. Przegląd Politologiczny, (4), 267–279. https://doi.org/10.14746/pp.2024.29.4.17

Abstract

The purpose of the article is to attempt to characterize the concept of the EU’s cybersecurity culture, based on key aspects of modern digitization, such as data protection, prevention of disinformation and responsible use of new technologies, which is relevant to the European and global digital security policy. The research methodology employed includes document analysis and qualitative methods. The article analyzes strategic documents from 2013, 2017, and 2020, which introduced new regulations, such as the NIS2 Directive, aimed at improving resilience to cyber threats and enhancing international cooperation. The study highlights the importance of building a culture of cybersecurity, education and responsible use of new technologies, and analyzes the effectiveness of the EU’s response to rapidly changing digital threats. Modern Europe, based on democratic values and innovation, guards the security of its citizens in the online space, but on the other hand seeks to maintain a leadership position in the global digital economy.

https://doi.org/10.14746/pp.2024.29.4.17
PDF

References

Antoszewski A., Herbut R. (1999), Leksykon politologii, Atla 2, Wrocław.

Astakhova L. (2020), Issues of the culture of information security under the conditions of the digital economy, “Scientific and Technical Information Processing”, vol. 47, no. 1, pp. 56–64. DOI: https://doi.org/10.3103/S0147688220010062

Balzaq T., Dunn Cavelty M. (2015), A theory of actor-network for cyber-security, “European Journal of International Security”, vol. 1, no. 2, pp. 176–198. DOI: https://doi.org/10.1017/eis.2016.8

Bankowicz M. (1999), Słownik polityki, Wydawnictwo Wiedza Powszechna, Warszawa.

Cenamor J., Parida V., Wincent J. (2019), How entrepreneurial SMEs compete through digital platforms: The roles of digital platform capability, network capability, and ambidexterity, “Journal of Business Research”, vol. 100, pp. 196–206. DOI: https://doi.org/10.1016/j.jbusres.2019.03.035

CERT Polska, NASK (2022), Raport roczny CERT Polska 2022, Krajobraz bezpieczeństwa polskiego Internetu, https://cert.pl/uploads/docs/Raport_CP_2022.pdf, 22.06.2024.

Collett R. (2021), Understanding cybersecurity capacity building and its relationship to norms and confidence building measures, “Journal of Cyber Policy”, vol. 6, no. 3, pp. 298–317. DOI: https://doi.org/10.1080/23738871.2021.1948582

Creese S., Dutton W. H., Esteve-González P., Shillair R. (2021), Cybersecurity capacity-building: Cross-national benefits and international divides, “Journal of Cyber Policy”, vol. 6, no. 2, pp. 214–235. DOI: https://doi.org/10.1080/23738871.2021.1979617

da Veiga A., Astakhova L. V., Botha A., Herselman M. (2020), Defining organisational information security culture-perspectives from academia and industry, “Computers & Security”, vol. 92. DOI: https://doi.org/10.1016/j.cose.2020.101713

Davies W. (2017, July 13), Who gains from big data?, Weekly Economics Podcast, 12.11.2023, https://soundcloud.com/weeklyeconomicspodcast/who-gainsfrom-big-data.

Directive European Union (2022), 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive), https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2022:333:FULL, 30.06.2024.

European Union Agency for Cybersecurity (2022), Threat Landscape 2022, https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022, 22.06.2024.

Georgiadou A., Mouzakitis S., Askounis D. (2022), Detecting insider threat via a cyber-security culture Framework, “Journal of Computer Information Systems”, vol. 62, no. 4, pp. 706–716. DOI: https://doi.org/10.1080/08874417.2021.1903367

Gryz J. (2013), Strategia bezpieczeństwa narodowego Polski, PWN, Warszawa.

Hinings B., Gegenhuber T., Greenwood R. (2018), Digital innovation and transformation: An institutional perspective, “Information and Organization”, vol. 28, no. 1, pp. 52–61. DOI: https://doi.org/10.1016/j.infoandorg.2018.02.004

Hogan S. J., Coote L. V. (2014), Organizational culture, innovation, and performance: A test of Schein’s model, “Journal of Business Research”, vol. 67, no. 8, pp. 1609–1621. DOI: https://doi.org/10.1016/j.jbusres.2013.09.007

Joint communication to the European Parliament and the Council, Resilience, Deterrence and Defence: Building strong cybersecurity for the EU, 13.09.2017, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52017JC0450, 26.06.2024.

Joint communication to the European Parliament and the Council, The EU’s Cybersecurity Strategy for the Digital Decade, 16.12.2022, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020JC0018, 30.06.2024.

Joint communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, 7.02.2013, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52013JC0001, 22.06.2024.

Martínez-Caro E., Cegarra-Navarro J. G., Alfonso-Ruiz F. J. (2020), Digital technologies and firm performance: The role of digital organisational culture, “Technological Forecasting and Social Change”, vol. 154(c). DOI: https://doi.org/10.1016/j.techfore.2020.119962

McLuhan M. (1964), Understanding Media: The Extensions of Man, McGraw-Hill, New York.

Mumford L. (1967), The Myth of the Machine: Technics and Human Development, Harcourt, Brace and World, New York.

Nye D. E. (2006), Technology Matters: Questions to Live With, MIT Press, Cambridge, MA.

Olechnicki K., Załęcki P. (1997), Słownik socjologiczny, Graffiti BC, Toruń.

Opinia Komitetu Regionów, „Strategia bezpieczeństwa cybernetycznego” (2013/C 280/05). DzUrz UE C280, t. 56, https://eur-lex.europa.eu/legal-content/PL/TXT/PDF/?uri=CELEX:52013IR1646&from=IT, 26.06.2024.

Parsons K., McCormac A., Butavicius M., Ferguson L. (2010), Human factors and information security: Individual, culture, and security environment, “Defense Technical Information Center”, 12.11.2023, https://apps.dtic.mil/sti/pdfs/ADA535944.pdf.

Polański E. (ed.) (2008), Słownik języka polskiego, Krakowskie Wydawnictwo Naukowe, Kraków.

Postman N. (1992), Technopoly: The Surrender of Culture to Technology, Knopf, New York.

Proposal for a regulation of the European Parliament and of the Council on ENISA, the “EU Cybersecurity Agency”, and repealing Regulation (EU) 526/2013, and on Information and Communication Technology cybersecurity certification (“Cybersecurity Act”), 4.10.2017, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52017PC0477R(01), 26.06.2024.

Scupola A., Mergel I. (2022), Co-production in digital transformation of public administration and public value creation: The case of Denmark, “Government Information Quarterly”, vol. 39, no. 1. DOI: https://doi.org/10.1016/j.giq.2021.101650

Seaver N. (2018), Captivating algorithms: Recommender systems as traps, “Journal of Material Culture”, vol. 24, no. 4, pp. 421–436. DOI: https://doi.org/10.1177/1359183518820366

Szymczak M. (red.) (1995), Słownik języka polskiego, PWN, Warszawa.

Ścibiorek Z., Zamiar Z. (2016), Teoretyczne i metodologiczne podstawy problemów z zakresu bezpieczeństwa, Adam Marszałek, Toruń.

Verhoef P. C., Broekhuizen T., Bart Y., Bhattacharya A., Dong J. Q., Fabian N., Haenlein M. (2021), Digital transformation: A multidisciplinary reflection and research agenda, “Journal of Business Research”, vol. 122, pp. 889–901. DOI: https://doi.org/10.1016/j.jbusres.2019.09.022

Walicka B. (red.) (2008), Słownik politologii, PWN, Warszawa.

Wang T., Lin X., Sheng F. (2022), Digital leadership and exploratory innovation: From the dual perspectives of strategic orientation and organizational culture, “Frontiers in Psychology”, vol. 13. DOI: https://doi.org/10.3389/fpsyg.2022.902693

Wiley A., McCormac A., Calic D. (2020), More than the individual: Examining the relationship between culture and information security awareness, “Computers & Security”, vol. 88. DOI: https://doi.org/10.1016/j.cose.2019.101640

Winner L. (1986), The Whale and the Reactor: A Search for Limits in an Age of High Technology, University of Chicago Press, Chicago.