001451825 000__ 04718cam\a2200565\i\4500 001451825 001__ 1451825 001451825 003__ OCoLC 001451825 005__ 20230310004719.0 001451825 006__ m\\\\\o\\d\\\\\\\\ 001451825 007__ cr\cn\nnnunnun 001451825 008__ 221212s2022\\\\sz\a\\\\o\\\\\001\0\eng\d 001451825 019__ $$a1355219180$$a1355372186 001451825 020__ $$a9783031083846$$q(electronic bk.) 001451825 020__ $$a3031083849$$q(electronic bk.) 001451825 020__ $$z9783031083839 001451825 020__ $$z3031083830 001451825 0247_ $$a10.1007/978-3-031-08384-6$$2doi 001451825 035__ $$aSP(OCoLC)1354247225 001451825 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dFIE$$dUKMGB$$dOCLCQ$$dOCLCF$$dUKAHL 001451825 043__ $$ae------$$aa-ko--- 001451825 049__ $$aISEA 001451825 050_4 $$aQA76.9.A25 001451825 08204 $$a005.8094$$223/eng/20221227 001451825 24500 $$aCybersecurity policy in the EU and South Korea from consultation to action :$$btheoretical and comparative perspectives /$$cGertjan Boulet, Michael Reiterer, Ramon Pacheco Pardo, editors. 001451825 264_1 $$aCham :$$bPalgrave Macmillan,$$c[2022] 001451825 264_4 $$c©2022 001451825 300__ $$a1 online resource (xxv, 292 pages) :$$billustrations. 001451825 336__ $$atext$$btxt$$2rdacontent 001451825 337__ $$acomputer$$bc$$2rdamedia 001451825 338__ $$aonline resource$$bcr$$2rdacarrier 001451825 4901_ $$aNew security challenges,$$x2731-0337 001451825 500__ $$aIncludes index. 001451825 5050_ $$aChapter 1. Introduction -- Chapter 2. EU Cyber Diplomacy: Value- and Interest-Driven Foreign Policy with New Focus on the Indo-Pacific -- Chapter 3. EU-South Korea Cooperation on Cybersecurity, Data Protection and Emerging Technologies -- Chapter 4. Cyber Offence Dominance, Regional Dynamics, and Middle Power⁰́₃led International Cooperation -- Chapter 5. Developing a Collective Retorsion Framework Against Malicious Cyber Operations: Opportunities and Steps for EU-South Korea Cybersecurity Cooperation -- Chapter 6. Cyber Arms Control on the Korean Peninsula: Challenges and Opportunities with a View to North Korea⁰́₉s Asymmetry Strategy -- Chapter 7. Arms Control in the Cyber Domain: A European Approach to Mitigate Digital Threats -- Chapter 8. The Republic of Korea⁰́₉s Cyber Defence and Digital Cooperation Between South Korea and EU -- Chapter 9. Building Cyber Resilience: The Defensive Shield for the EU -- Chapter 10. Enhancing Cooperation Between South Korea and the EU in the Fight Against Cybercrime -- Chapter 11. EU and Access to Electronic Evidence: Privatisation of Law Enforcement? -- Chapter 12. Recent Trends of the UN Cybersecurity Governance and South Korea-EU Cooperation -- Chapter 13. The International Cybersecurity Cooperation Dilemma and Implications for EU-South Korea Relations -- Chapter 14. Conclusion: From Words to Deeds./. 001451825 506__ $$aAccess limited to authorized users. 001451825 520__ $$aThis book offers a very interesting deep-dive into EU and South Korean approaches to cybersecurity issues. In a unique approach, the editors and authors focus on the potential for strategic partnership and shared lessons learned given common commitments to democracy, human rights, the free market, and a rules-based international order of the two regions. Essential reading for students and researchers in political science, international relations, international law, strategic and defence studies, computer science, and cognitive science. Gertjan Boulet is an Advisor on Cyber and AI at the Cabinet of Belgium⁰́₉s Deputy Prime Minister and Minister of Telecommunication. He is also a lecturer and researcher in International Cyber Law and International Relations. Michael Reiterer is Distinguished Professor at the Centre for Security, Diplomacy & Strategy (CSDS) at the Brussels School of Governance, Belgium. He also served as Ambassador of the European Union to the Republic of Korea, Switzerland and Liechtenstein. Ramon Pacheco Pardo is Professor of International Relations at King's College London, UK, and the KF-VUB Korea Chair at the Brussels School of Governance, Belgium. . 001451825 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 27, 2022). 001451825 650_0 $$aComputer security$$xGovernment policy$$zEuropean Union countries. 001451825 650_0 $$aComputer security$$xGovernment policy$$zKorea (South) 001451825 655_0 $$aElectronic books. 001451825 7001_ $$aBoulet, Gertjan,$$eeditor. 001451825 7001_ $$aReiterer, Michael,$$d1954-$$eeditor. 001451825 7001_ $$aPacheco Pardo, Ramon,$$eeditor. 001451825 77608 $$iPrint version: $$z3031083830$$z9783031083839$$w(OCoLC)1317838379 001451825 830_0 $$aNew security challenges series.$$x2731-0337 001451825 852__ $$bebk 001451825 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-08384-6$$zOnline Access$$91397441.1 001451825 909CO $$ooai:library.usi.edu:1451825$$pGLOBAL_SET 001451825 980__ $$aBIB 001451825 980__ $$aEBOOK 001451825 982__ $$aEbook 001451825 983__ $$aOnline 001451825 994__ $$a92$$bISE