This thesis examines to what extent the securitisation model applies to the attempted OPCW hack, the Bundestag hack, and the SolarWinds operation concerning policy implementations. The...Show moreThis thesis examines to what extent the securitisation model applies to the attempted OPCW hack, the Bundestag hack, and the SolarWinds operation concerning policy implementations. The securitisation model analyses the securitising actor’s response to the threat. Further, it analyses whether the securitisation act enabled the securitising actor to implement drastic measures. This thesis uses the case study method and selected the cases with a shared perpetrator and objective. For the findings, this thesis concluded the following for the three cases. The Dutch government completed the securitisation act for the attempted OPCW hack but did not implement drastic policies. For the Bundestag hack, the Federal Government did not complete the securitisation act but did implement drastic measures. The United States completed the securitisation act and implemented drastic policies. Thus, the extent to which the securitisation model explains the response of the victim state differs in each case.Show less
The already tense relationship between the EU and Russia has resulted in a geopolitical power race in cyberspace. Also, the development of the EU cyber diplomacy toolbox in 2017 already resulted in...Show moreThe already tense relationship between the EU and Russia has resulted in a geopolitical power race in cyberspace. Also, the development of the EU cyber diplomacy toolbox in 2017 already resulted in economic and diplomatic sanctions being imposed on Russia, further intensifying the relationship between two central powers in cyberspace and hinting at the use of a deterrence strategy by the EU. To further gain knowledge about the impact of the EU cyber diplomacy toolbox on Russia, this research aims to identify how the toolbox intents to functions against Russia. By doing so, the key characteristics of the deterrence strategy will function as the theoretical framework in this research, resulting into an overview of the key characteristics of the deterrence strategy. Furthermore, the purposes of the installation of the toolbox will be analysed. Likewise, with the use of case studies, the actual effects of the toolbox on Russia will be outlined to portray that the EU cyber diplomacy does intent to function as a method of a deterrence strategy against Russia.Show less