The Yearbook of European Security (YES) is the Institute’s annual publication compiling key information and data related to the CFSP and CSDP in 2017. YES 2018 provides an account of the EU’s engagement with the world through evidence-based, data-rich chapters.
You are here
Jakob Bund was an Associate Analyst at the EUISS where he covered cyber and security and defence issues.
After the recent failure of UN-sponsored talks, a vigorous debate has taken place about the way to advance discussions over the rules governing state behaviour in cyberspace. What are the merits and pitfalls of alternative approaches? And how can different tracks be strategically intertwined?
07June 2017With contributions from Bernt Berger, Jakob Bund, Matthieu Burnay, Marta Hermez, Stine Lehman-Larsen, Ingrid Magnusson, Garima Mohan, Gareth Price, May-Britt Stumbaum, Plamen Tonchev, Anouk van den Akker
This Report, which draws on the main presentations made during the 2016 CSCAP EU Committee meeting devoted to this topic, examines the role of the EU as a preventive diplomacy actor and explores how in pursuing this strategy it can contribute positively to security in the Indo-Pacific region.
The EUISS Yearbook of European Security (YES) is the Institute’s annual publication compiling key documents and data related to the EU’s Common Foreign and Security Policy (CFSP). This 2017 edition offers a comprehensive picture of the actors, institutions and processes that underpinned the Union’s foreign and security policy and external action in 2016.
The EU and China have long sought to cooperate in and with Africa. Illegal migration to Europe, China’s growing commercial investments and terrorists looking for safe haven in Africa bind European, Chinese and African interests. The proliferation of these challenges beyond African borders is now driving the three parties closer together.
03November 2016By Jakob Bund
As they enter a period of critical elections, the US and European countries are being confronted by a series of threats from cyberspace. Electronic voting infrastructure and networks of political groups have recorded repeated intrusion, while strategic leaks of compromising documents have sought to influence public opinion.
No results found.
No results found.