Papers by Eleni Kapsokoli
Policy Journal, 2024
Η σχέση τρομοκρατίας και γεωπολιτικής είναι περίπλοκη και αξίζει να διερευνηθεί. Η γεωπολιτική αν... more Η σχέση τρομοκρατίας και γεωπολιτικής είναι περίπλοκη και αξίζει να διερευνηθεί. Η γεωπολιτική αναλύει το πώς κατανέμεται και αναδιανέμεται η ισχύς στον παγκόσμιο χάρτη και πως η γεωγραφική θέση (π.χ. έλεγχος πλουτοπαραγωγικών πηγών, εμπορικών δρόμων, θαλάσσιων στενών, κλπ.) επηρεάζει την κρατική ισχύ, αλλά και την εξωτερική πολιτική των κρατών. Η γεωπολιτική δεν περιορίζεται στην ανάλυση των κρατικών δρώντων αλλά έχει συμπεριλάβει και μη κρατικούς δρώντες, όπως τρομοκρατικές οργανώσεις, οι οποίες με την δράση τους επηρεάζουν αναπόφευκτα τις διακρατικές σχέσεις και την στρατηγική σταθερότητα σε διάφορες περιοχές του πλανήτη. Το άρθρο αποσκοπεί στην ανάλυση της σύνθετης δυναμικής μεταξύ της τρομοκρατίας και της γεωπολιτικής, απέναντι σε τέσσερα διαφορετικά κύματα τρομοκρατίας: το «Αναρχικό κύμα» (1879-1920), το «Αντιαποικιακό κύμα» (1919-1960), το «Νέο αριστερό κύμα» (1960-1990) και το «Θρησκευτικό κύμα» (1979- μέχρι τα μέσα της δεκαετίας του 2020).
Bookmarks Related papers MentionsView impact
Αεροπορική Επιθεώρηση, 2024
Το παρόν άρθρο αναλύει ένα ευρύ φάσμα δράσεων που υλοποίησαν κρατικές και μη κρατικές οντότητες τ... more Το παρόν άρθρο αναλύει ένα ευρύ φάσμα δράσεων που υλοποίησαν κρατικές και μη κρατικές οντότητες της Ρωσίας και της Ουκρανίας, μέσα αλλά και διαμέσου του κυβερνοχώρου (κυβερνοεπιθέσεις, επιτήρηση, συλλογή πληροφοριών, εκστρατείες παραπληροφόρησης, κλπ.), την εξωτερική υποστήριξη που έλαβε το Κίεβο για αυτές τις δράσεις και τη σύσταση νέων κυβερνο-πολεμιστών. Αρχικά, αναλύεται ο κυβερνοχώρος ως ένα πεδίο σύγκρουσης και στη συνέχεια παρουσιάζεται το πλαίσιο των κακόβουλων δραστηριοτήτων που έχει αναπτύξει η Ρωσία στο πεδίο αυτό, τα τελευταία χρόνια. Το άρθρο συνεχίζει με την ανάλυση των περιστατικών στον κυβερνοχώρο που λαμβάνουν χώρα από την έναρξη του πολέμου (Φεβρουάριος 2022) μέχρι τον Μάιο του 2024 και καταλήγει με ορισμένα διδάγματα αναφορικά με τη σημασία του κυβερνοχώρου, στη συγκεκριμένη σύγκρουση.
Bookmarks Related papers MentionsView impact
ALLILONnet, 2024
In an increasingly digitalized world, cyber resilience is a critical component of defence against... more In an increasingly digitalized world, cyber resilience is a critical component of defence against the ever-evolving security landscape. While technological advancements play an essential role in enhancing and safeguarding the national digital infrastructure, promoting digitalization and interconnectivity in our society, cyberattacks have grown in both complexity and frequency. These threats demonstrate security vulnerabilities and emphasize the need for cyber resilience at national and international levels. By adopting
a proactive and holistic approach to cybersecurity, states, entities, and users can enhance their ability to endure, respond to, and recover from cyber incidents, ensuring the
continuity of their operations and safeguarding the integrity of sensitive data. This paper analyzes the reasons why cyber resilience has become paramount in the EU.
Bookmarks Related papers MentionsView impact
Research Institute for European and American Studies, 2024
Note: The article reflects the opinion of the author and not necessarily the views of the Researc... more Note: The article reflects the opinion of the author and not necessarily the views of the Research Institute for European and American Studies Foreign policy has always been a crucial component of US politics, influencing the electorate's decisions and the international community's perceptions of American leadership. The post-World War II era marked the beginning of continuous American engagement in global affairs, characterized by the establishment of international institutions (e.g., United Nations), alliances (e.g., NATO), and a commitment to the liberal international order. The Cold War period saw a consistent foreign policy focus on containing the spread of communism, leading to the dissolution of the Soviet Union. The post-Cold War era presented new security challenges (internal conflicts, peacemaking missions, etc.) and opportunities, with the US becoming a unipolar power. In the 21 st century, the US has witnessed numerous security (e.g. 9/11 terrorist attack and the 'global war on terror') and foreign policy issues (e.g. rise of new global powers). The US foreign policy aims to transform the international security landscape and determine regional and global dynamics 1 .
Bookmarks Related papers MentionsView impact
Academic Conferences International Limited, 2024
As the technological landscape undergoes continuous transformation, nations are seizing the combi... more As the technological landscape undergoes continuous transformation, nations are seizing the combination of technology, governance, and sovereignty in their strategies. Following the Arab Spring, a movement primarily focused on overthrowing oppressive regimes in the Middle East, Iran took a distinctive turn by establishing a digital authoritarian model. Fueled by concerns stemming from democratic reforms worldwide-especially those facilitated by the Internet and social media, which have played a pivotal role in the collection and dissemination of information-the Iranian government perceived a potential threat to its national security and sovereignty as well as its political survival. In response to the above, Tehran implemented a range of strategies and measures in Internet governance, which represent a form of oppressive control. To regulate the Internet and control the flow of data, Iran established the National Information Network, known as the 'Halal Internet'. This effort aims to safeguard national sovereignty through persistent control, shield political ideology, and promote a particular religious behavior within cyberspace. These developments have a noteworthy impact on individual rights, liberties, and privacy. This paper aims to explore the methods through which Iran exercises digital authoritarianism.
Bookmarks Related papers MentionsView impact
National Security and the Future, 2023
The advent of the digital revolution has introduced several means for collecting, spreading, and ... more The advent of the digital revolution has introduced several means for collecting, spreading, and disseminating information within the realm of communication, thus transcending geographical and time constraints. The swift digitization and transformation of contemporary societies have created an unusual security landscape, exerting its influence across every facet of human, societal, economic, and political life. Technology stands as a pivotal variable in the dynamic evolution of terrorism. Cyberspace has emerged as a fertile domain for the amplification and continuation of terrorist activities, representing a profound “transformation” at the operational level over recent decades. Terrorists have adeptly seized upon the potential of cyberspace, strategically imitating successful tactics employed by like-minded, assimilating lessons from past mistakes, and adapting to exigencies of both the present and future. The extensive deployment of information communication and technologies (ICTs) has substantially facilitated terrorists’ activities in a multitude of ways. This includes cost reduction, the generation of operational efficiencies, broader access to novel target demographics, the provision of anonymity, heightened security measures, the dissolution of organizational barriers, and the amplification of the scope and reach of their actions. The full spectrum of cyber activities conducted by terrorists can be comprehensively encapsulated within a model titled the “Digital Jihad”. This paper intends to apply this model to examine the activities and strategies of the Islamic State of Iraq and Syria (ISIS).
Bookmarks Related papers MentionsView impact
ΙΝΣΤΙΤΟΥΤΟ ΜΕΛΕΤΩΝ ΠΟΛΙΤΙΚΗΣ ΚΑΙ ΔΗΜΟΚΡΑΤΙΑΣ, 2023
Bookmarks Related papers MentionsView impact
Foreign Affairs, The Hellenic Edition, τεύχος Ιουνίου – Ιουλίου 2023, 2023
Οι εκλογικές διαδικασίες είναι μια σημαντική πτυχή της δημοκρατίας και η ποιότητα της τελευταίας ... more Οι εκλογικές διαδικασίες είναι μια σημαντική πτυχή της δημοκρατίας και η ποιότητα της τελευταίας εξαρτάται από το αν διεξάγονται με κανονικό, δίκαιο, και ανταγωνιστικό τρόπο. Οι εκλογές, όπως και η υπόλοιπη κοινωνία, ψηφιοποιούνται όλο και περισσότερο. Παρά τα πλεονεκτήματα που απορρέουν από την διαδικασία της ψηφιοποίησης, παράλληλα δημιουργούνται και κρίσιμα ζητήματα ασφαλείας. Ένα από αυτά είναι η αμφισβήτηση της ακεραιότητας και νομιμότητας των εκλογικών διαδικασιών, με αποτέλεσμα η δημοκρατία να μετατρέπεται σε ένα εύθραυστο και αμφισβητούμενο σύστημα διακυβέρνησης. Κατά την διάρκεια των εκλογών γίνονται προσπάθειες χειραγώγησης της κοινής γνώμης.
Bookmarks Related papers MentionsView impact
Foreign Affairs, The Hellenic Edition, 2023
Αρχική σελίδα Διεθνείς εκδόσεις Εγγραφή στο Newsletter Ο λογαριασμός μου Secure Connection Εμφάνι... more Αρχική σελίδα Διεθνείς εκδόσεις Εγγραφή στο Newsletter Ο λογαριασμός μου Secure Connection Εμφάνιση άρθρου σε περισσότερες σελίδες Παράθυρο σε έναν νέο κόσμο Η επίδραση της τεχνολογίας στην πολιτική, στις εκλογές, στην ασφάλεια, στις πληροφορίες, την οικονομική ανάπτυξη και την γεωστρατηγική. Επίσης, τα ελληνοτουρκικά αλλά και διδάγματα από το παρελθόν για τις «πηγές της σοβιετικής συμπεριφοράς» κ.ά. Περίληψη Κειμένου και Βιογραφικό Συγγραφέα Κυκλοφορεί στα κεντρικά περίπτερα της Αθήνας και της Θεσσαλονίκης το τεύχος Ιουνίου-Ιουλίου 2023 του Foreign Affairs The Hellenic Edition, με κεντρικό ζήτημα την τεχνολογία και πώς επιδρά στις πολιτικές των εθνών.
Bookmarks Related papers MentionsView impact
Research Institute for European and American Studies, 2023
Elections are one of the cornerstones of democracy. This is true because democracy as a system of... more Elections are one of the cornerstones of democracy. This is true because democracy as a system of governance is very fragile and needs to be safeguarded, to ensure societal stability. Thus, democratic procedures such as elections should be transparent and inclusive with respect of human and political rights, political diversity, freedom of expression, and freedom of press. The fact that the users of cyberspace are more than 5.3 billion, and thus constitute 66% of the global population, highlights the importance of the information communication technologies (ICTs) in our daily life. The introduction of digital technology into the political sphere has had a significant effect on electoral processes affecting both voting behavior and the underlying factors that influence it. Cyberspace is the new arena for both supporters and opponents of democracy. The security challenges that arise between voters, candidates and political parties are abundant. Cyberspace functions as a channel of disinformation, thus misleading its users about the electoral processes.
Bookmarks Related papers MentionsView impact
Η παρούσα διατριβή με τίτλο «Η μετάλλαξη της τρομοκρατίας με τη χρήση του κυβερνοχώρου: η περίπτω... more Η παρούσα διατριβή με τίτλο «Η μετάλλαξη της τρομοκρατίας με τη χρήση του κυβερνοχώρου: η περίπτωση της ισλαμικής τρομοκρατίας», ερευνά το φαινόμενο της κυβερνοτρομοκρατίας και εάν οι τεχνολογίες πληροφοριών και επικοινωνιών (ΤΠΕ) επηρεάζουν την τρομοκρατία. Στόχος είναι να εντοπιστεί ο αντίκτυπος που έχουν αυτές οι τεχνολογίες στον επιχειρησιακό τρόπο δράσης της τρομοκρατίας. Η διατριβή υιοθετεί μια ολιστική προσέγγιση, που εξετάζει το πώς η τρομοκρατία και ο κυβερνοχώρος αλληλοεπιδρούν και σε ποιον βαθμό. Το θεωρητικό υπόβαθρο της διατριβής είναι βασισμένο στη κυματική θεωρία του Rapoport, «Τα τέσσερα κύματα της μοντέρνας τρομοκρατίας». Η κυματική θεωρία χρησιμοποιείται για να διερευνηθεί το κατά πόσο η κυβερνοτρομοκρατία συνιστά το πέμπτο κύμα τρομοκρατίας. Ο Rapoport υποστηρίζει ότι κάθε κύμα τρομοκρατίας είναι ένας κύκλος δραστηριοτήτων, με διαφορετικές τεχνικές, μέσα, δρώντες και επιχειρησιακό τρόπο δράσης. Συνεπώς, το φαινόμενο της εξελικτικής πορείας της τρομοκρατίας σε επιχ...
Bookmarks Related papers MentionsView impact
St. George Association / Udruga sv. Jurja, 10000 Zagreb, D. Cesarića 9, Zagreb, Croatia, 2021
During the last two decades, the growing threat of Islamic terrorism has raised numerous security... more During the last two decades, the growing threat of Islamic terrorism has raised numerous security challenges for both states and non-state actors. Cyberspace is weaponized by actors who conduct malicious activities, in order to achieve their goals. Terrorist organizations reflect the darker side of cyberspace. Terrorists use cyberspace to collect data, raise funds, conduct propaganda, spread radical ideologies and hate speech as well as for the purposes of radicalization, recruitment and operational planning. Social media platforms provide a fertile ground to extend the radical ideologies, to spread terror and to connect with people who share the same views. ISIS is considered a pioneer in utilizing the benefits that cyberspace offers. The Western Balkans is a region where ISIS is recruiting foreign fighters and lone-wolves. The European Union is the driving force for the activation of Western Balkans in countering cyberterrorism and developing relevant strategies.
Bookmarks Related papers MentionsView impact
Academic Conferences International Limited, 2021
Over the past years, the European Union has faced a number of cybersecurity challenges that range... more Over the past years, the European Union has faced a number of cybersecurity challenges that range from
cyberattacks to the critical infrastructure to cases of ransomware. In order to face these security challenges, the EU has
developed all the necessary strategies and policies, including the launch of the Cyber Diplomacy Toolbox in 2017. This toolbox
includes among others, the policy instrument of cyber sanctions (Council Decision 2019/796 and Council Regulation
2019/797). The purpose of this paper is to review the EU’s cyber sanctions regime. In order to do that, we will apply key
questions that have arisen in the sanctions literature and apply them in the case of the EU. In particular, we will examine the
technical, political and judicial parameters, which involve the implementations of cyber sanctions. Issues like the reliable
attribution of cyberattacks, the clarifications of relevant norms of responsible state behavior in cyberspace, the level of
cooperation with the private sector and the scale and type of cyber sanctions are only some of the factors that will determine
the success of the cyber sanctions regime. Having established a clear theoretical framework on the implementation of cyber
sanctions, we will briefly review the empirical evidence, which involves the sanctions package that the EU announced on 17
May 2019 and the amending version published on 30 July 2020, against various entities and individuals. The end goal is to
reach a conclusion on whether cyber sanctions are of symbolic nature, or can be considered as an effective policy instrument
for the EU. This paper highlights the uses and limits of the EU cyber sanctions regime, which is a rather recent development
and therefore under developed in the relevant literature.
Bookmarks Related papers MentionsView impact
Hellenic Association of Political Scientists (HAPSc), 2021
Cyberspace is a new challenge for the global security and stability and poses numerous threats fo... more Cyberspace is a new challenge for the global security and stability and poses numerous threats for the protection of national critical infrastructures. This paper analyses the way the European Union adjusts to these threats, by adapting new policies and establishing the development of relative institutions regarding cybersecurity and cyber-defence. The aim is to critically assess the ability of the EU to act as a reliable security provider in cyberspace. Recent developments indicate that the EU needs to overcome its institutional fragmentation and become a resilient actor in cyberspace.
Bookmarks Related papers MentionsView impact
"Views on the Progress of CSDP”, ESDC 1st Summer University Book, Nov 2020
Bookmarks Related papers MentionsView impact
Academic Conferences International, 2019
Terrorism is a form of political violence that has been with us since antiquity. Over the last fe... more Terrorism is a form of political violence that has been with us since antiquity. Over the last few decades, terrorismhas been facing the challenges of cyberspace. Interactions and influences between cyberspace and terrorism are large andconstantly changing. In order to achieve their goals, terrorist organizations use cyberspace to collect data, raise funds, andconduct propaganda, but also for the purposes of radicalization and operational planning. Scholars have widely discussedwhether cyberspace has a transformative effect on the nature of terrorism. In order to examine the transformative or noteffect of cyberspace on terrorism, we will analyze the case of Islamic terrorism and, in particular, Islamic State’s actions insocial media. In recent years, the ISIS has become very active in cyberspace. Specifically, many organizations and individualsare working on the name of ISIS and Jihad in cyberspace.
Bookmarks Related papers MentionsView impact
Books by Eleni Kapsokoli
1st POLITEIA International Conference Proceedings. Europe at the Crossroads: Leadership, Challenges and State of Play, 2021
Sidiropoulos, S., Tzagkarakis, S-I, Kritas, D. (2021), 1st POLITEIA International Conference Proc... more Sidiropoulos, S., Tzagkarakis, S-I, Kritas, D. (2021), 1st POLITEIA International Conference Proceedings.Europe at the Crossroads: Leadership, Challenges and State of Play, Athens: Hellenic Association of Political Scientists.
It is a great honour to introduce you the proceedings of the 1st POLITEIA International Conference “Europe at the Crossroads: Leadership, Challenges and State of Play”. We are greateful to all participants and especially to those that send us their full papers. The included papers are in a very high academic level and cover a wide range of topics, which was actually the main aim of the conference.
In this book of proceedings the reader will find interesting analyses about several contemporary aspects. We have separated the volume into thirteen topics, based on the focus of the papers which were presented in the conference. The papers of the first three topics analyse aspects concerning the EU governance and leadership, the EU defence and international security as well as opinions about the EU integration, politics and governance issues. In the forth topic the contributors focus on issues of energy and sustainable development, which are crucial to the stability in Europe and its periphery and in the fifth topic the focus is on Euroscepticism and populism, which still concern the European political arena. The sixth topic focus on a very important contemporary European problem; the immigration and refugee crisis, with several contributions presenting novel research and important outcomes. Topic seven focuses on finance and investments issues while topics eight and nine on educational policy issues and their connection with social cohesion. Topic ten focuses on regional development and governance in the EU and Greece while topic eleven on media in the digital era.
Finally, topic twelve analyses healthcare policy issues while topic thirteen closes the volume with issues concerning governance and politics in Greece. At the end of the volume you could find the full book of abtracts as well as the programme of the conference.
We believe that the contributions included in this volume offer special and novel insights on several contemporary issues and they will be interesting for every reader as they are characterised by novelty and clarity.
The editors,
Symeon Sidiropoulos,
Dr. Stylianos – Ioannis Tzagkarakis,
Dimitrios Kritas
Bookmarks Related papers MentionsView impact
Book Reviews by Eleni Kapsokoli
Central European Journal of International and Security Studies, Springer, 2024
Bookmarks Related papers MentionsView impact
Oxford Academic, 2024
Bookmarks Related papers MentionsView impact
Defence-Point.gr, 2023
Οι διακεκριμένοι καθηγητές του Πανεπιστημίου Πειραιώς, Αθανάσιος Πλατιάς και Κωνσταντίνος Κολιόπο... more Οι διακεκριμένοι καθηγητές του Πανεπιστημίου Πειραιώς, Αθανάσιος Πλατιάς και Κωνσταντίνος Κολιόπουλος, ενώνουν πάλι τη συγγραφική τους μαεστρία σε ένα ξεχωριστό και πρωτοποριακό βιβλίο από τις εκδόσεις Δίαυλος, που τιτλοφορείται «50 κανόνες στρατηγικής στις ελληνοτουρκικές σχέσεις και απαντήσεις σε 20 κρίσιμες ερωτήσεις». Το βιβλίο αυτό αποτελεί καθρέφτη των γνώσεων που έχουν οι συγκεκριμένοι συγγράφεις τόσο στο τομέα των Διεθνών Σχέσεων και της Γεωπολιτικής όσο και της Στρατηγικής. Ο φακός της ρεαλιστικής τους θεωρίας χρησιμοποιείται σε μια πολυεπίπεδη, ιστορικά εμπεριστατωμένη και ενημερωμένη ματιά στο λαβυρινθώδη τομέα των ελληνοτουρκικών θεμάτων τόσο σε κρατικό όσο και σε συστημικό επίπεδο ανάλυσης.
Bookmarks Related papers MentionsView impact
Uploads
Papers by Eleni Kapsokoli
a proactive and holistic approach to cybersecurity, states, entities, and users can enhance their ability to endure, respond to, and recover from cyber incidents, ensuring the
continuity of their operations and safeguarding the integrity of sensitive data. This paper analyzes the reasons why cyber resilience has become paramount in the EU.
cyberattacks to the critical infrastructure to cases of ransomware. In order to face these security challenges, the EU has
developed all the necessary strategies and policies, including the launch of the Cyber Diplomacy Toolbox in 2017. This toolbox
includes among others, the policy instrument of cyber sanctions (Council Decision 2019/796 and Council Regulation
2019/797). The purpose of this paper is to review the EU’s cyber sanctions regime. In order to do that, we will apply key
questions that have arisen in the sanctions literature and apply them in the case of the EU. In particular, we will examine the
technical, political and judicial parameters, which involve the implementations of cyber sanctions. Issues like the reliable
attribution of cyberattacks, the clarifications of relevant norms of responsible state behavior in cyberspace, the level of
cooperation with the private sector and the scale and type of cyber sanctions are only some of the factors that will determine
the success of the cyber sanctions regime. Having established a clear theoretical framework on the implementation of cyber
sanctions, we will briefly review the empirical evidence, which involves the sanctions package that the EU announced on 17
May 2019 and the amending version published on 30 July 2020, against various entities and individuals. The end goal is to
reach a conclusion on whether cyber sanctions are of symbolic nature, or can be considered as an effective policy instrument
for the EU. This paper highlights the uses and limits of the EU cyber sanctions regime, which is a rather recent development
and therefore under developed in the relevant literature.
Books by Eleni Kapsokoli
It is a great honour to introduce you the proceedings of the 1st POLITEIA International Conference “Europe at the Crossroads: Leadership, Challenges and State of Play”. We are greateful to all participants and especially to those that send us their full papers. The included papers are in a very high academic level and cover a wide range of topics, which was actually the main aim of the conference.
In this book of proceedings the reader will find interesting analyses about several contemporary aspects. We have separated the volume into thirteen topics, based on the focus of the papers which were presented in the conference. The papers of the first three topics analyse aspects concerning the EU governance and leadership, the EU defence and international security as well as opinions about the EU integration, politics and governance issues. In the forth topic the contributors focus on issues of energy and sustainable development, which are crucial to the stability in Europe and its periphery and in the fifth topic the focus is on Euroscepticism and populism, which still concern the European political arena. The sixth topic focus on a very important contemporary European problem; the immigration and refugee crisis, with several contributions presenting novel research and important outcomes. Topic seven focuses on finance and investments issues while topics eight and nine on educational policy issues and their connection with social cohesion. Topic ten focuses on regional development and governance in the EU and Greece while topic eleven on media in the digital era.
Finally, topic twelve analyses healthcare policy issues while topic thirteen closes the volume with issues concerning governance and politics in Greece. At the end of the volume you could find the full book of abtracts as well as the programme of the conference.
We believe that the contributions included in this volume offer special and novel insights on several contemporary issues and they will be interesting for every reader as they are characterised by novelty and clarity.
The editors,
Symeon Sidiropoulos,
Dr. Stylianos – Ioannis Tzagkarakis,
Dimitrios Kritas
Book Reviews by Eleni Kapsokoli
a proactive and holistic approach to cybersecurity, states, entities, and users can enhance their ability to endure, respond to, and recover from cyber incidents, ensuring the
continuity of their operations and safeguarding the integrity of sensitive data. This paper analyzes the reasons why cyber resilience has become paramount in the EU.
cyberattacks to the critical infrastructure to cases of ransomware. In order to face these security challenges, the EU has
developed all the necessary strategies and policies, including the launch of the Cyber Diplomacy Toolbox in 2017. This toolbox
includes among others, the policy instrument of cyber sanctions (Council Decision 2019/796 and Council Regulation
2019/797). The purpose of this paper is to review the EU’s cyber sanctions regime. In order to do that, we will apply key
questions that have arisen in the sanctions literature and apply them in the case of the EU. In particular, we will examine the
technical, political and judicial parameters, which involve the implementations of cyber sanctions. Issues like the reliable
attribution of cyberattacks, the clarifications of relevant norms of responsible state behavior in cyberspace, the level of
cooperation with the private sector and the scale and type of cyber sanctions are only some of the factors that will determine
the success of the cyber sanctions regime. Having established a clear theoretical framework on the implementation of cyber
sanctions, we will briefly review the empirical evidence, which involves the sanctions package that the EU announced on 17
May 2019 and the amending version published on 30 July 2020, against various entities and individuals. The end goal is to
reach a conclusion on whether cyber sanctions are of symbolic nature, or can be considered as an effective policy instrument
for the EU. This paper highlights the uses and limits of the EU cyber sanctions regime, which is a rather recent development
and therefore under developed in the relevant literature.
It is a great honour to introduce you the proceedings of the 1st POLITEIA International Conference “Europe at the Crossroads: Leadership, Challenges and State of Play”. We are greateful to all participants and especially to those that send us their full papers. The included papers are in a very high academic level and cover a wide range of topics, which was actually the main aim of the conference.
In this book of proceedings the reader will find interesting analyses about several contemporary aspects. We have separated the volume into thirteen topics, based on the focus of the papers which were presented in the conference. The papers of the first three topics analyse aspects concerning the EU governance and leadership, the EU defence and international security as well as opinions about the EU integration, politics and governance issues. In the forth topic the contributors focus on issues of energy and sustainable development, which are crucial to the stability in Europe and its periphery and in the fifth topic the focus is on Euroscepticism and populism, which still concern the European political arena. The sixth topic focus on a very important contemporary European problem; the immigration and refugee crisis, with several contributions presenting novel research and important outcomes. Topic seven focuses on finance and investments issues while topics eight and nine on educational policy issues and their connection with social cohesion. Topic ten focuses on regional development and governance in the EU and Greece while topic eleven on media in the digital era.
Finally, topic twelve analyses healthcare policy issues while topic thirteen closes the volume with issues concerning governance and politics in Greece. At the end of the volume you could find the full book of abtracts as well as the programme of the conference.
We believe that the contributions included in this volume offer special and novel insights on several contemporary issues and they will be interesting for every reader as they are characterised by novelty and clarity.
The editors,
Symeon Sidiropoulos,
Dr. Stylianos – Ioannis Tzagkarakis,
Dimitrios Kritas
Since the Stuxnet infection of the Natanz nuclear facility, there has been an evolution of global cyber operations. As demonstrated by the NotPetya, Solarwinds and Hafnium cyber-incidents, as well as online influence operations, cyber-operations attributed to states or state-backed actors are becoming increasingly common. This book provides insight into nation-state cyber operations from technical and geopolitical perspectives conducive to providing a multi-disciplinary view of how nations conduct offensive cyber operations and defend themselves from other actors in cyberspace. Topics covered include policy and international law for cyberspace, cyber operations related to healthcare and the COVID-19 pandemic, joint all domain warfare, risk assessment and critical infrastructure protection.
The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.
TABLE OF CONTENTS
1. Cyberwarfare in the Modern World Spyridon Sampanis, Melina – Eleftheria Spiliopoulou, Ioanna Kantzavelou and Leandros Maglaras. 2. The Geopolitics of 5G and EU Digital Sovereignty Andrew N. Liaropoulos. 3. From Rules to Retribution: The Problem of Attribution and Regulation in the Age of Cyber-Warfare Nathan Downes and Leandros Maglaras. 4. Cyberterrorism: A New Wave of Terrorism or Not? Eleni Kapsokoli. 5. Machine Learning-Based TCP Congestion Control Strategies for Cyberterrorism Active Defense on Smart Grids
Konstantinos Demertzis, Dimitrios Taketzis, Charalabos Skianis, Panayotis Kikiras, and Lazaros Iliadis. 6. Speed2 Comes True: Cyberattacks Against Ships Georgios Kavallieratos and Sokratis Katsikas. 7. Cyberwarfare in Ukraine: Incidents, Tools and Methods Komninos Theodoros and Serpanos Dimitrios. 8. Cyber-Security Vulnerability and Risk of Industrial Control Systems
John M.A. Bothos and Vasileios Vlachos. 9. Cyber Warfare and Cyber Terrorism: What is the Critical Difference? Pete Wilkinson and Leandros Maglaras.
Πρόλογος - Σήφης Φιτσανάκης
Εισαγωγή - Ανδρέας Ν. Λιαρόπουλος & Αθανάσιος Η. Μποζίνης
1. Παγκόσμια διακυβέρνηση του κυβερνοχώρου - Ανδρέας Ν. Λιαρόπουλος
2. Επιστημικές κοινότητες και διακυβέρνηση του κυβερνοχώρου - Κυριάκος Μικέλης & Αθανάσιος Η. Μποζίνης
3. Κυβερνοασφάλεια και διακυβέρνηση της Ευρωπαϊκής Ένωσης: Οι προκλήσεις για την μετά COVID-19 εποχή - Δημήτρης Σκιαδάς
4. Οι κυβερνοεπιθέσεις στις διακρατικές συγκρούσεις - Μαρία Ζαμπατή & Χριστίνα Κοντραφούρη
5. Κυβερνοεπιθέσεις: Ορίζοντας τα νέα όπλα - Άνθιμος Αλέξανδρος Τσιριγώτης
6. Κυβερνοεπιθέσεις, κυβερνοεξαναγκασμός και απόδοση ευθύνης στον κυβερνοχώρο - Πέτρος Βιολάκης
7. Η χρήση του κυβερνοχώρου από τους τρομοκράτες: Η περίπτωση του ISIS - Ελένη Καψοκόλη
8. Κυβερνοέγκλημα και ασφάλεια στο Διαδίκτυο - Φώτιος Μουστάκης
9. Το ζήτημα της ύπαρξης και της χρήσης κρυπτονομισμάτων μέσα από το πρίσμα της κυβερνοασφάλειας - Εμμανουήλ Μάριος Οικονόμου & Νικόλαος Α. Κυριαζής
10. Παγκόσμια κυβερνο-βιοασφάλεια - Αθανάσιος Η. Μποζίνης
Συμπεράσματα - Ανδρέας Ν. Λιαρόπουλος & Αθανάσιος Η. Μποζίνης
Περίληψη βιβλίου: Μετά το τέλος του Ψυχρού Πολέμου, ο κόσμος βιώνει μια ψηφιακή επανάσταση. Οι τεχνολογίες πληροφοριών και επικοινωνιών έχουν θεμελιώσει ένα παγκόσμιο ψηφιακό οικοσύστημα, το οποίο επαναπροσδιορίζει τους τρόπους με τους οποίους οι διεθνείς δρώντες επικοινωνούν, παράγουν πλούτο και ανταγωνίζονται. Ο τομέας του κυβερνοχώρου, έχει δημιουργήσει νέες ευκαιρίες και τρωτότητες στην παγκόσμια πολιτική. Στον παρόντα τόμο, οι συγγραφείς αναλύουν υπό το πρίσμα του επιστημονικού πεδίου των Διεθνών Σχέσεων μια σειρά από κρίσιμα ζητήματα που σχετίζονται με την ασφάλεια και το έλλειμα διακυβέρνησης του κυβερνοχώρου. Ειδικότερα, αναλύονται οι κυβερνοεπιθέσεις στο πλαίσιο των διακρατικών συγκρούσεων, η στρατιωτικοποίηση του κυβερνοχώρου, οι παράμετροι που αφορούν το ζήτημα της απόδοσης ευθύνης στον κυβερνοχώρο και ζητήματα που αφορούν τη χρήση του κυβερνοχώρου από μη κρατικούς δρώντες. Επίσης αναλύονται από τους συγγραφείς, το κυβερνοέγκλημα, η κυβερνο-βιοα-σφάλεια και ο τρόπος με τον οποίο το Ισλαμικό Κράτος αξιοποιεί το Διαδίκτυο και τα μέσα κοινωνικής δικτύωσης για τη ριζοσπαστικοποίηση και τη στρατολόγηση των υποστηρικτών του. Τέλος, αναλύεται η χρήση των κρυπτονομισμάτων που εγείρουν θέματα ασφάλειας, αφού αφενός οι κάτοχοί τους είναι δυνατό να πέσουν θύματα απάτης και αφετέρου τα κρυπτονομίσματα μπορούν να χρησιμοποιηθούν για τη διενέργεια παράνομων δραστηριοτήτων.
critical infrastructure through the exploitation of Information and
Communication Technologies (ICTs) has raised numerous security
challenges for both private and public sectors. Apart from the traditional
threats, the EU is also facing new threats that relate to cyberspace, such as
cyberwar, cyberespionage and cyberterrorism. The paper analyses the way
the EU has addressed the latter threat. It elaborates the way cyberterrorism
is defned in the relevant literature and highlights the fact that the EU does
not directly address cyberterrorism in its policy papers and strategies.
Issues relating to the use of cyberspace by terrorists are usually viewed
via the prism of cybercrime and cybersecurity. Nevertheless, the EU has
developed mechanisms and institutions to counter certain aspects of
cyberterrorism, such as online radicalisation, recruitment and fundraising.
Οικονομία». Επίσης, τη μελέτη του ρόλου της δημόσιας διπλωματίας στις διεθνείς σχέσεις της περιοχής της Ανατολικής Μεσογείου
του Καθηγητή Αριστοτέλη Τζιαμπίρη, ως Επισκέπτης Ερευνητής στο Κέντρο Δημόσιας Διπλωματίας του Πανεπιστημίου της Νότιας Καλιφόρνιας. Καθώς επίσης τη σημασία των διαπραγματεύσεων στις διεθνείς σχέσεις με την καθοριστική συμβολή του Καθηγητή Πέτρου Λιάκουρα στο Υπουργείο Εξωτερικών, τη συμμετοχή της αναπληρώτριας Καθηγήτριας Μαριλένας Σημίτη στο συλλογικό
τόμο The Oxford Handbook of Modern Greek Politics με το κεφάλαιο «Social Movements» και τη συμμετοχή ομάδας εργασίας του Τμήματος στο Forum «Η Ελλάδα το 2040». Επιπλέον, γίνεται αναφορά στην ερευνητική δραστηριότητα του εργαστηρίου Πληροφόρησης και
Κυβερνοασφάλειας του οποίου στόχος είναι να αναδείξει τη σημασία της πληροφόρησης και του κυβερνοχώρου στις διεθνείς σχέσεις και στη διεθνή ασφάλεια. Τέλος, γίνεται αναφορά σε υποψήφιους διδάκτορες και απόφοιτους του τμήματος.