Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2013)
(34) Regulation 2019/881 of the European Parliament
T. Tropina, Cormac Callanan (2015)
Self- and Co-regulation in Cybercrime, Cybersecurity and National Security
H. Lindahl (1997)
Sovereignty and SymbolizationJournal of Vascular and Interventional Radiology
(2019)
EU coordinated risk assessment of the cybersecurity of 5G networks
Regulation 2019/452 of the European Parliament and of the Council of 19 March 2019 establishing a framework for the screening of foreign direct investments into the Union
Bram Boxhoorn, G. Scott-Smith (2021)
Cybersecurity of 5G Networks: EU Toolbox of Risk Mitigating Measures, European Parliament, January 2020The Transatlantic Era (1989–2020) in Documents and Speeches
Office of the Government of the Slovak Republic, Department of Legislation of Other Central State Administration Bodies
Ken Cosgrove (1992)
The end of sovereignty: the politics of a shrinking and fragmenting worldInternational Affairs, 68
A. Kasper, Csaba Krasznay (2019)
Towards Pollution-Control in Cyberspace: Problem Structure and Institutional Design in International CybersecurityInternational and Comparative Law Review, 19
Ondrej Hamuľák, L. Kiss, T. Gábriš, Hovsep Kocharyan (2021)
“This Content is not Available in your Country” A General Summary on Geo-Blocking in and Outside the European UnionInternational and Comparative Law Review, 21
Danuta Kabat-Rudnicka (2020)
Autonomy or Sovereignty: the Case of the European UnionInternational and Comparative Law Review, 20
(2015)
Secure 5 G Networks : Questions and Answers on the EU Toolbox , 29 . 1 . 2020
Ondrej Hamuľák (2015)
Lessons from the “Constitutional Mythology” or How to Reconcile the Concept of State Sovereignty with European IntagrationDANUBE: Law and Economics Review, 6
(2019)
Commission Recommendation (EU) 2019/534 of 26 March 2019 Cybersecurity of 5G networks
(2007)
Medieval Sovereignty: Marsilius of Padua and Bartolus of Saxoferrato, Delft: Eburon Academic
Jozef Andraško, Matúš Mesarčík, Ondrej Hamuľák (2021)
The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal frameworkAI & SOCIETY, 36
(2016)
Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions 5G for Europe: An Action Plan
Przemysław Roguski (2019)
Layered Sovereignty: Adjusting Traditional Notions of Sovereignty to a Digital Environment2019 11th International Conference on Cyber Conflict (CyCon), 900
AbstractSome recent views question the concept of sovereignty (especially the sovereignty of states), arguing that sovereignty is to be abandoned as a historical concept, because it existed in the world of the Westphalian system (created after 1648), where states were the major players, centers of power and objects of interest. Instead, we suggest that sovereignty should be perceived again as a “supreme power” (summa potestas), meaning a return to the pre-Bodinian concept of sovereignty and perceive it as a “power to exert control”. With regard to cyberspace, this does not mean direct control of all entities in the cyberspace, but only those that provide services which are perceived as “essential” or “critical” for the security and interests of the state. That is actually the approach taken with regard to ensuring the safety of 5G networks—through control imposed on the network operators, as required by the respective EU legislation and the EU Toolbox on 5G Networks specifically.
Baltic Journal of European Studies – de Gruyter
Published: Sep 1, 2021
Keywords: 5G EU Toolbox; 5G networks; cybersecurity; EU digital sovereignty
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.