Planned intervention: On Thursday 19/09 between 05:30-06:30 (UTC), Zenodo will be unavailable because of a scheduled upgrade in our storage cluster.
Published October 21, 2018 | Version v1
Journal article Open

Governing Cyber Security through Networks: An Analysis of Cyber Security Coordination in Belgium

  • 1. Ghent University, Belgium

Contributors

  • 1. International Journal of Cyber Criminology

Description

While governments develop formal and informal structures or networks to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when taking recent developments in the field of cyber security in Belgium into consideration. The 2012 decision to create the Belgian cyber security centre seems to entail a move towards a Weberian hierarchical network coordination approach rather than the development of a cyber security network organisation. This article claims that - as the threats of cyber are becoming more complex - there is a growing need for governmental agencies to expand horizontal coordination mechanisms. From this follows, the growing demand for criminological research into the managerial aspects of cyber security networks. Generating knowledge on how to manage networks is required as the latter is not only decisive for the effectiveness and efficiency of cyber security networks but also contributes to the overall network cyber security governance.

Files

RondelezVol12Issue1IJCC2018.pdf

Files (932.9 kB)

Name Size Download all
md5:46a8d7c4c2b5a3a84167cac4c39416a3
932.9 kB Preview Download

Additional details

References

  • Agranoff, R., & McGuire, M. (2007). Public Management Research Association Conference 2007. Answering the big questions, asking the bigger questions: Expanding the public network management empirical reserach agenda. Tuscon: Public Management Research Association. Antivachis, N., & Angelis, V. (2015). Network Organizations: The Question of Governance. Procedia - Social and Behavioral Sciences 175. Belga. (1999, December 14). TV-nieuwsdienst volgt millennium (bug) op de voet. Retrieved from Gazet van Antwerpen Nieuws: http://www.gva.be/cnt/oid73766/archief-tv-nieuwsdienst-volgt-millennium-bug-op-de-voet. Belgische Senaat. (2012, juni 7). Senaat Schriftelijke vraag nr. 5-6424 van Alexander De Croo (Open Vld) aan de vice-eersteminister en minister van Binnenlandse Zaken en Gelijke Kansen. Brussel: Belgische Senaat. Belgische Senaat. (2013, juli 5). Senaat Schriftelijke vraag nr. 5-9462 van Karl Vanlouwe (N-VA) aan de vice-eersteminister en minister van Binnenlandse Zaken en Gelijke Kansen. Brussel: Belgische Senaat. Bisschop, L. (2012). Governance of transnational environmental crime: Case study research on the illegal trade in e-waste and tropical timber. Gent: Ghent University. Bisschop, L., & Verhage, A. (2012). The complex(ity) of policing dirty crime. Politie Studies & Currents of Policing, 25. Brewer, R. (2017). Controlling crime through networks. In P. Drahos, Regulatory Theory: Foundations and Applications. Canberra: ANU E Press. Brodeur, J.-P., & Dupont, B. (2006). Knowledge Workers or "Knowledge" Workers? Policing & Society, 16(1). Burris, S., Drahos, P., & Shearing, C. (2005). Nodal governance. Australian Journal of Legal Philosophy, 30. Castells, M. (2000). Materials for an exploratory theory of the network society. The Britisch Journal of Sociology, 51(1). Centrum voor Cyber Security Belgium. (2015). Centrum voor Cyber Security Belgium. Jaarverslag 2015. Brussel : Centre for Cyber security Belgium. Charbonneau, M. (2012). New Public Management. In L. Côté, & J.-F. (. Savard, Encyclopedic Dictionary of Public Administration, [online]. www.dictionnnaire.enap.ca. Christensen, T., & Laegreid, P. (2007). The Whole-of-Government Approach to Public Sector Reform. Public Administration Review. Clemente, D. (2011). International Security: Cyber Security as a Wicked Problem. The World Today, Vol. 67, No 5, Issue 10, 15. Retrieved from Chatham House. The Royal Institute of International Affairs. : https://www.chathamhouse.org/publications/twt/archive/view/178579. Commissie voor de Binnenlandse Zaken, de Algemene Zaken en het Openbaar Ambt. (2015). 05 Vraag van de heer Brecht Vermeulen aan de eerste minister over "de bescherming van de kritieke infrastructuur" (nr. 7616). Brussel: Commissie voor de Binnenlandse Zaken, de Algemene Zaken en het Openbaar Ambt. Dallemagne, G. (2013, juni 27). Voorstel van resolutie waarbij de oprichting wordt gevraagd van een Centrum voor cyberbeveiliging in België. Brussel: Belgische Kamer van Volksvertegenwoordigers. Dallemagne, G. (2014, september 16). Voorstel van resolutie over de aanscherping van de cyberveiligheid in België. Brussel: Belgische Kamer van Volksvertegenwoordigers. De Ruyck, H. (1999, December 12). Provinciale veiligheidscel vangt millennumbug op. Retrieved from Gazet van Antwerpen Nieuws: http://www.gva.be/cnt/oid74256/archief-provinciale-veiligheidscel-vangt-millenniumbug-op Décary-Hétu, D., & Dupont, B. (2012). The Social network of Hackers. Global Crime, 13 (3). dS De Standaard. (2014, May 10). Buitenlandse Zaken dient klacht in na hacking. dS De Standaard. Dupont, B. (2004). Security in the Age of Networks. Policing & Society, Vol. 14, Nr. 1. Dupont, B. (2006). Delivering security through networks: Surveying the relational landscape of security managers in an urban setting. Crime, Law and Social Change, 45(3). Dupont, B. (2016). La gouvernance polycentrique du cybercrime: les réseaux fragmentés de la coopération internationale. Cultures & Conflits, 102. Easton, M. (2015). Het managen van innovatie door een netwerkende publieke politie. De triple-helix als vehikel. In P. Ponsaers, W. Bruggemn, M. Easton, & A. Lemaitrre, De toekomstpolitie. Triggers voor een voldragen debat. Antwerpen (BEL)/Apeldoorn (NL): Maklu. Europol. (2017, November 16). European Cybercrime Centre EC3. Retrieved from Europol: https://www.europol.europa.eu/about-europol/european-cybercrime-centre-ec3 Federale Politie. (2016). Nationaal veiligheidsplan 2016-2019. Samen naar de kern van de zaak.Brussel (BE): Federale Politie. Flemming, J., & Wood, J. (2006). Fighting Crime Together: The Challenges of Policing & Security Networks. Sydney: University of New South Wales Press. FOD Binnenlandse Zaken. (2014, December 08). Bulletin nr : B003 - Schriftelijke vraag en antwoord nr. : 005 - Zittingsperiode : 54. De inspanningen bij de federale politie inzake computercriminaliteit. Brussel : De Belgische Kamer van Volksvertegenwoordigers. FOD Binnenlandse Zaken. (2016, October 14). Bulletin nr : B091 - Schriftelijke vraag en antwoord nr : 1590 - Zittingsperiode : 54 Cyber security - Politiemaatregelen. Cyber security - Politiemaatregelen. Brussel : De Belgische Kamer van Volksvertegenwoordigers. FOD Defensie. (2014). Cyber Security Strategy for Defence.Brussel : FOD Defensie. FOD Justitie. (2016). Kadernota. Kadernota Integrale Veiligheid. Brussel (BE): FOD Justitie. FOD Kanselarij van de eerste minister. (2012, October 03). Cyber Security Strategy. Cyber Security Strategy. Erkennen van cyberdreiging. Verbeteren van veiligheid. Kunnen reageren op incidenten. Brussel: De Kanselarij. FOD Kanselarij van de eerste minister. (2013, November 06). Algemene Beleidsnota van de Federale Overheidsdienst Kanselarij van de eerste minister. Brussel: Belgische Kamer van Volksvertegenwoordigers. FOD Kanselarij van de eerste minister. (2014, October 10). Koninklijk besluit tot oprichting van het Centrum voor Cyber security België. Koninklijk besluit tot oprichting van het Centrum voor Cyber security België. Brussel : Belgisch Staatsblad. FOD Kanselarij van de eerste minister. (2014, October 10). Koninklijk besluit tot oprichting van het Centrum voor Cyber security België. Koninklijk besluit tot oprichting van het Centrum voor Cyber security België. Brussel (BE): Belgisch Staatsblad. FOD Kanselarij van de eerste minister. (2015, January 28). Koninklijk besluit tot oprichting van de Nationale Veiligheidsraad. Koninklijk besluit tot oprichting van de Nationale Veiligheidsraad. Brussel: Belgisch Staatsblad. FOD Kanselarij van de eerste minister. (2015, January 30). Koninklijk besluit tot oprichting van het Strategisch Comité en Coördinatiecomité voor inlichting en veiligheid. Brussel (BEL): Het Belgisch Staatsblad. FPS Chancellery of the Prime Minister. (2017, April 27). The Belgian Council of Ministers gives the green light to the very first National Cyber Emergency Response Plan. Retrieved from Charles Michel. Prime Minister of Belgium.: http://premier.fgov.be/en/belgian-council-ministers-gives-green-light-very-first-national-cyber-emergency-response-plan. Grabher, G., & Powell, W. (2004). Introduction. In G. Grabher, & W. Powell, Networks.Cheltenham, UK: Edward Elgar. Hajer, M., Van Tatenhove, J., & Laurent, C. (2004). Nieuwe vormen van Governance. Een essay over nieuwe vormen van bestuur met een empirische uitwerking naar de domeinen van voedselveiligheid en gebiedsgericht beleid.Bilthoven (NL): RIVM. Hojsgaard Munk, T. (2015). Cyber-security in the European Region: Anticipatory Governance and Practices. Manchester: University of Manchester. Hood, C. (1991). A new public management for all seasons. Public Administration, 69(1). Hunton, P. (2010). Cyber Crime and Security: A New Model of Law Enforcement Investigation. Policing, Vol. 4, Nr. 4,. Jones, L. (2014, December 31). How the UK coped with the millennium bug 15 years ago. Retrieved from BBC news: http://www.bbc.com/news/magazine-30576670. Kamarck, E. (2002). Applying 21st-Century Government to the Challenge of Homeland Security. Arlington, VA: The PricewaterhouseCoopers Endowment for The Business of Goverment. Kapucu, N. (2014). Complexity, Governance, and Networks: Perspectives from Public Administration. In G. Morgöl, & G. Teisman, Complexity, Governance & Networks. Amsterdam: Baltzer Science Publishers. Kerkhofs, J., & Van Linthout, P. (2013). Cybercrime. Uitgeverij Politeia NV.: Brussel (BEL). Leukefeldt, R. (2016). Cybercriminal networks. Origin, growth and criminal capabilities. Den Haag (NL). Leukefeldt, R., Veenstra, S., & Stol, W. (2013). De strafrechtketen in een gedigitaliseerde samenleving. Een onderzoek naar de strafrechtelijke afhandeling van cybercrime. De Bilt/Leeuwarden (NL): PAC/NHL. Lu, Y., Luo, X., Polgar, M., & Cao, Y. (2010). Social Network Analysis of a Criminal Hacker Community. Journal of Computer Information Systems, 51(2). Mazurczyk, W., Drobniak, S., & Moore, S. (2016). Towards a Systematic View on Cyber security Ecology. In B. Akhgar, & B. Brewster (eds.), Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities. Cham: Springer. Monge, P., & Contractor, N. (2003). Theories of Communication Networks. Oxford : Oxford University Press. O'Toole, L. (1997). Treating Networks Seriously: Pratical and Research-Based Agendas in Public Administration. Public Administration Review, 57(1). Pieters, P. (2014). Het NATIONAAL centrum voor Cybersecuity. Brengt de lang verwachte dirigent eindelijk symfonie? Het Politiejournaal. Pollitt, C. (2003). Joined-up government: A survey. Political Studies Review, 1 (1). Provan, K., & Kenis, P. (2009). Towards an exogenous theory of public network performance. Public Administration, 87(3). Provan, K., & Kenis, P. (2005). Public Management Research Association Conference 2005. Modes of Network Governance and Implications for Network Management and Effectiveness. Los Angeles: Public Management Research Association. Provan, K., & Kenis, P. (2007). Modes of Network Governance: Structure, Management and Effectiveness. Journal of Public Administration Research and Theory, 18. Provan, K., & Milward, H. (2001). Do Networks Really Work? A Framework for Evaluating Public-Sector Organizational Networks. Public Administration Review. Pugh, D., Hickson, D., Hinings, C., & Turner, C. (1969). The context of Organisation Structure. Administrative Science Quarterly. 14(1). Raab, J., & Kenis, P. (2009). Heading Toward a Society of Networks. Empirical Developments and Theoretical Challenges. Journal of Management Inquiry, 18, nr.3. Rhodes, R. (1996). Understanding Governance. Buckingham: Open University Press. Rhodes, R. (2007). Understanding governance: Ten years on. Organization Studies 28(8). Rittel, H., & Webber, M. (1973). Dilemmas in a general theory of planning. Policy Sciences, 4. Sabillon, R., Cano, J., Cavaller, V., & Serra, J. (2016). Cybercrime and Cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security. 4(6). Schuilenburg, M. (2015). The Securitization of Society. Crime, Risk, and Social Order. New York and London: New York University Press. Senaat. (2012, June 18). Retrieved from Schriftelijke vraag nr. 5-6521 van Karl Vanlouwe (N-VA) d.d. 18 juni 2012 aan de staatssecretaris voor Ambtenarenzaken en Modernisering van de Openbare Diensten, toegevoegd aan de minister van Financiën en Duurzame Ontwikkeling, belast met Ambtenarenzaken: https://www.senate.be/www/?MIval=/Vragen/SchriftelijkeVraag&LEG=5&NR=6521&LANG=nl Shearing, C., & Johnston, L. (2010). Nodal Wars and network Fallacies: A Genealogical Analysis of Global Insecurities. Theoretical Criminology. Smith, F., & Ingram, G. (2017). Organising Cyber Security in Australia and beyond. Australia Journal of International Affairs. 71(6). Stoker, G. (2002). Governance as theory: Five propositions. International Social Science Journal, 50 (155). Thomas, M. (2017, April 04). What Really Happened in Y2K? Retrieved from Gresham College: https://www.gresham.ac.uk/lectures-and-events/what-really-happened-in-y2k. Tropina, T., & Callanan, C. (2015). Self- and Co-regulation in Cybercrime, Cyber security and National Security. Cham: Springer. Turrini, A., Cristofoli, D., Frosini, F., & Nasi, G. (2010). Networking literature about determinants of network effectiveness. Public Administration, 88(2), 528-550. van Dijk, J., & Winters-van Beek, A. (2009). The Perspective of Network Government. The struggle between hierarchies, markets and networks as modes of governance in contemporary government. In A. Meijer, K. Boersman, & P. Wagenaar, ICTs, Citizens & Governance: After the Hype! Amsterdam: IOS Press. Van Ryckeghem, D., Bruggeman, W., Easton, M., & Ponsaers, P. (2014). Een visie voor de politie in 2015: stuurgroep opteert voor netwerkende politie. Cahiers Politiestudies. 3(32). Vermeulen, B. (2000, January 06). Ik zou die computervirussen toch maar niet onderschatten. Retrieved from Gazet van Antwerpen Nieuws: http://www.gva.be/cnt/oid76060/archief-ik-zou-die-computervirussen-toch-maar-niet-onderschatten Whelan, C. (2011). Network Dynamics and Network Effectiveness: A Methodological Framework for Public Sector Networks in the Field of National Security. The Australian Journal of Public Administration. 70(3). Whelan, C. (2012). Networks and National Security. Dynamics, Effectiveness and Organisation. Farnham (UK): Ashgate Publishing Limited. Willen, A. (2015, July 15). Complicated or complex - knowing the difference is important. Retrieved from www.linkedin.com: https://www.linkedin.com/pulse/complicated-complex-knowing-difference-important-will-allen. Wood, J., & Dupont, B. (2006). Introduction: Understanding the governance of security. In J. Wood, & B. Dupont, Democracy, Society and the Governance of Security. Cambridge: University Press. Yar, M. (2011). From the 'governance of security' to 'governance failure': refening the criminological agenda. Internet Journal of Criminology. Yip, M. (2016, 12 28). Social Network Analysis as a tool to study organised cybercrime. Retrieved from School of Engineering and Computer Science. University of Southampton.: users.ecs.soton.ac.uk/lac/dtc/posters/yip.pdf. Zandee, D., Rood, J., & Meijnders, M. (2015). The realationship between external and internal security. Den Haag (NL): Nederlands Institute of International Relations Clingendael.