Author: Marek Górka
Institution: Koszalin University of Technology (Poland)
Published online: 21 June 2021
Final submission: 30 April 2021
Printed issue: December 2021
Source: Show
Page no: 19
Pages: 71-89
DOI Address:
PDF: ppsy/50/ppsy202112.pdf

The cybersecurity issue discussed in the paper is seen from the perspective of political science with the indication that the subject under discussion concerns the multifaceted nature of the state’s actions, which consists of political, economic, social, and cultural factors. At the same time, the work also intends to prove that cybersecurity is not only a domain of technology because it is the mentioned aspects that shape the conditions of stable development of the state and its citizens in a space dominated by cyber technology in a much more decisive way. Given the growing role of cybertechnology in almost all areas of human life, its importance also forces and inspires political science to question the shape and model of modern policy, which is significantly evolving under the influence of new technologies. On the one hand, emerging cyber threats reveal the weakness of the state and the dependence of state institutions on cybertechnologies, but on the other hand, existing cyber incidents may also motivate many governments to take action to increase the level of cybersecurity.


  • Alberts, D.S., & Papp, D. (Eds.). (1997). The information age: An anthology of its impacts and consequences. National Defense University.
  • Aleksandrowicz, T. (2014). Świat w sieci. Państwa – społeczeństwa – ludzie. W poszukiwaniu nowego paradygmatu bezpieczeństwa narodowego. Difin.
  • Ayala, L. (2016). Cybersecurity lexicon. Apress.
  • Baezner, M. (2018). Hotspot analysis: Cyber disruption and cybercrime: Democratic people’s Republic of Korea. Center for Security Studies.
  • Baezner, M., & Robin, P. (2017). Cyber-conflict between the United States of America and Russia. Center for Security Studies.
  • Baezner, M., & Robin, P. (2017). Hotspot analysis: Stuxnet. Zurich. Center for Security Studies.
  • Best, J., & Walters, W. (2013). Translating the sociology of translation. International Political Sociology, 7, 345-349.
  • Bourbeau, P., Balzacq, T., and Cavelty, M.D. (2015). Celebrating eclectic dynamism: Security in international relations. In P. Bourbeau (Ed.), Security: Dialogue across disciplines (pp. 111-136). Cambridge University Press.
  • Brantly, A.F. (2019). Conceptualizing cyber policy through complexity theory. Journal of Cyber Policy, 4(2), 275-289.
  • Buchanan, B. (2016). The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations. Oxford University Press.
  • Buzan, B., & Hansen, L. (2009). The evolution of international security studies. Cambridge University Press.
  • Carr, M. (2016). Public–Private Partnerships in National Cyber-Security Strategies. International Affairs, 92(1), 43-62.
  • Cavelty, M.D., & Egloff, F.J. (2019). The politics of cybersecurity: Balancing different roles of the st St Antony’s International Review, 15, 37-57.
  • Cavelty, M.D., & Wenger, A. (2019). Cybersecurity meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy, 41(1), 5-32.
  • Center for Democracy and Technology. (2013). Unpacking “cybersecurity”: threats, responses, and human rights considerations.
  • Cohen, J.E. (2013). What privacy is for. Harvard Law Review, 126, 1904-1933.
  • Cornish, P. (2011). The vulnerabilities of developed states to economic cyber warfare.
  • Deibert, R.J. (2013). Black Code: Inside the Battle for Cyberspace. McClelland & Steward.
  • Dillon, M. (2002). Network society, network-centric warfare and the state of emergency. Theory, Culture & Society, 19(4), 71-79.
  • Donaldson, S.E., Siegel, S., Williams, C.K., and Aslam, A. (2016). Enterprise cybersecurity. How to build a successful cyberdefense program against advanced threats. Apress.
  • Dunn-Cavelty, M. (2008). Cyber-Security and Threat Politics: US Efforts to Secure the Information Age
  • Dupont, B. (2013). Cybersecurity futures: how can we regulate emergent risks? Technol Innovation Manage Review, 3(7), 6-11.
  • (2015). Definition of Cybersecurity. Gaps and overlaps in standardisation.
  • Eriksson, J., & Giacomello, G. (2007). Introduction: Closing the gap between international relations theory and studies of digital-age security. In J. Eriksson, & G. Giacomello, (Eds.), International Relations and Security in the Digital Age (pp. 6-10). Routledge.
  • Fuster, G.G., & Jasmontaite, L. (2020). Cybersecurity Regulation in the European Union: The Digital, the Critical and Fundamental Rights. In M. Christen, B. Gordijn, and M. Loi (Eds.), The International Library of Ethics, Law and Technology (pp. 97-115). Springer.
  • Graham, S. (1998). The end of geography or the explosion of place? Conceptualizing space, place and information technology. Progress in Human Geography, 22, 165-185.
  • Hagmann, J., Hegemann, H., and Neal, A.W. (2019). The politicisation of security: Controversy, mobilisation. Arena Shifting. European Review of International Studies, 5, 3-29.
  • Herrera, G. (2003). Technology and international systems. Millennium: Journal of International Studies, 32, 559-593.
  • Irion, K. (2013). The governance of network and information security in the European Union: The European public–private partnership for resilience (EP3R). In S. Gaycken, J. Krueger, and B. Nickolay, (Eds.), The secure information society (pp. 83-116). Springer.
  • Kello, L. (2017). The Virtual Weapon and International Order. Yale University Press.
  • Krahmann, E. (2003). Conceptualizing security governance, Cooperation and Conflict, 38, 5-26.
  • Lawson, S. (2013). Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats. Journal of Information Technology & Politics, 10(1), 86-103.
  • Leese, M., & Hoijtink, M. (Eds.). (2019). Technology and agency in international relations. Routledge.
  • Libicki, M.C. (2009). Cyberdeterrence and cyberwar. RAND.
  • Liedel, K. (2011). Bezpieczeństwo informacyjne państwa. In K. Liedel (Ed.), Transsektorowe obszary bezpieczeństwa narodowego (p. 57). Difin.
  • Lindsay, J.R. (2017). Restrained by design: The political economy of cybersecurity. Digital Policy, Regulation and Governance, 19, 493-514.
  • Lindstrom, G., & Luiijf, E. (2012). Political Aims & Policy Methods. In A. Klimburg, (Ed.), National cybersecurity framework manual (pp. 45-47). CCDCOE.
  • Maoz, Z., & Russett, B. (1993). Normative and Structural Causes of Democratic Peace, 1946-1986. The American Political Science Review, 87(3), 624-638.
  • Marsden, C., Simmons, S., and Cave, J. (2008). Options for an effective-ness of internet self- and coregulation. Phase 1 report: Mapping existing co- and self-regulatory institutions on the Internet
  • Matthewman, S. (2011). Technology and social theory. Palgrave Macmillan.
  • Mueller, M. (2017). Will the Internet Fragment?: Sovereignty, Globalization and Cyberspace. Polity.
  • Nissenbaum, H. (2005). Where computer security meets national security. Ethics and Information Technology, 7(2), 61-73.
  • Nissenbaum, H. (2015). Where computer security meets national security. Ethics and Information Technology, 7(2), 61-73.
  • Nowak, E., & Nowak, M. (2011). Zarys teorii bezpieczeństwa narodowego. Difin.
  • Nye, J.S. (2011). The future of Power. PublicAffairs.
  • Nye, J.S. (2017). Deterrence and Dissuasion in Cyberspace. International Security, 41(3), 44-71.
  • Nye, J.S. (2010). Cyber Power. Belfer Center for Science and International Affairs, Harvard Kennedy School.
  • Regulation (EU) No. 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No. 526/2013 (Cybersecurity Act).
  • Rid, T. (2012). Cyber war will not take place. The Journal of Strategic Studies, 35(1), 5-32.
  • Rid, T., & McBurney, P. (2012). Cyber-Weapons. The RUSI Journal, 15(7/1), 6-13.
  • Rid, T. (2013). Cyber War Will Not Take Place. Oxford University Press.
  • Salamon, L.M. (2002). The tools approach and the new governance: Conclusion and implications. In L.M. Salamon (Ed.), The tools of government: A guide to the New governance (pp. 600-610). Oxford University Press.
  • Schia, N.N. (2018). The Cyber Frontier and Digital Pitfalls in the Global South. Third World Quarterly, 39(5), 821-837.
  • Schmidt, A. (2014). Open security. Contributions of networked approaches to the challenge of democratic internet security governance. In R. Radu, J-M. Chenou, and R. Weber (Eds.), The evolution of global internet governance (pp. 169-187). Springer.
  • Sienkiewicz, P. (2004). Wizje i modele wojny informacyjnej. AGH.
  • Sienkiewicz, P., & Świeboda, H. (2009). Sieci teleinformatyczne jako instrument państwa – zjawisko walki informacyjnej. In M. Madej, M. Terlikowski, (Eds.), Bezpieczeństwo teleinformatyczne państwa (p. 80). Polski Instytut Spraw Międzynarodowych.
  • Sienkiewicz, P., Wizje i modele wojny informacyjnej.
  • Singer, P. W., & Friedman A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
  • Singer, P.W., & Friedman, A. (2014). Cybersecurity and cyberwar. What everyone needs to know. Oxford University Press.
  • Stone, J. (2013). Cyber war will take place. The Journal of Strategic Studies, 36(1), 101-108.
  • Timmers, P. (2019). Challenged by Digital Sovereignty. Journal of Internet Law, 23(6), 1-20.
  • Timmers, P. (2019). Ethics of AI and Cybersecurity When Sovereignty is at Stake. Minds and Machines, 29, 636.
  • Valeriano, B., Jensen, B., and Maness, R.C. (2018). Cyber Strategy: The Evolving Character of Power and Coercion. Oxford University Press.
  • Waever, O. (2020). Towards a political sociology of security studies. Security Dialogue, 41, 649-658.
  • Walker, J., & Melinda, C. (2011). Genealogies of resilience. From systems ecology to the political economy of crisis adaption. Security Dialogue, 42(2), 143-160.
  • Weber, R.H. (2018). Privacy and security in the IoT—Legal issues. In A. Moallem, (Ed.), Human-Computer Interaction and Cybersecurity Handbook (pp. 306-308). CRC Press.
  • Weber, S. (2017). Data, Development, and Growth. Business and Politics, 19(3), 397-423.
  • Zürn, M. (2018). A Theory of Global Governance: Authority, Legitimacy, and Contestation. Oxford University Press.

Message to:



© 2017 Adam Marszałek Publishing House. All rights reserved.

Projekt i wykonanie Pollyart