Governing cyberspace : behavior, power, and diplomacy
Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary...
Gespeichert in:
| Hauptverfasser: | , |
|---|---|
| Format: | E-Book Buch |
| Sprache: | Englisch |
| Veröffentlicht: |
Lanham
Rowman & Littlefield
2020
Rowman & Littlefield International Rowman & Littlefield Publishers, Incorporated Rowman & Littlefield Publishers |
| Ausgabe: | 1 |
| Schriftenreihe: | Digital Technologies and Global Politics |
| Schlagworte: | |
| ISBN: | 1786614952, 9781786614957, 1786614944, 9781786614940 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Inhaltsangabe:
- From Norm to Normative Arrangements: Private Governance as a Framework -- Cyber Norms and Technical/Technological Mediation -- Microsoft, a Diplomatic Actor? -- Concluding Thoughts on Controversies and Further Research -- List of Interviews -- Notes -- References -- Index -- About the Editors and Contributors
- Cover -- Governing Cyberspace -- Series page -- Governing Cyberspace: Behavior, Power, and Diplomacy -- Copyright -- Contents -- Acknowledgments -- Chapter 1 -- Governing Cyberspace -- Of Laws and Norms -- The Cyber-Norms Discourse -- Power and Norms -- Negotiating Change -- Notes -- Bibliography -- Part I: International Legal and Diplomatic Approaches -- Chapter 2 -- International Law and International Cyber Norms -- Rules of the Road: The Move from International Law to Cyber Norms -- International Norms -- The Future -- Conclusion -- Notes -- Bibliography -- Chapter 3 -- Electoral Cyber Interference, Self-Determination, and the Principle of Non-intervention in Cyberspace -- The Principle of Non-intervention -- Interference in the 2016 US Election and the Principle of Non-intervention -- ContextualiZing and Reconceptualizing Intervention in Cyberspace -- Conclusion -- Notes -- Bibliography -- Chapter 4 -- Violations of Territorial Sovereignty in Cyberspace-an Intrusion-based Approach -- The Concept of Territorial Sovereignty in Cyberspace -- Violations of Territorial Sovereignty under the Tallinn Manual 2.0 Rule 4 -- An Intrusion-based Approach to Violations of Territorial Sovereignty -- Conclusion -- Bibliography -- Chapter 5 -- What Does Russia Want in Cyber Diplomacy? -- "2018-Reclaiming the Debate" -- Priorities of Russia's Cyber Diplomacy -- Russia's Comeback as "a Responsible Cyber Power" -- International Law and International Norms in Russia's Cyber Diplomacy -- Democratization à la Russe -- "Digitalization Is Dangerous"-The Doctrine of Information Security -- GlobaliZing Information Security Through Regional Platforms -- Conclusion -- Notes -- Bibliography -- Chapter 6 -- China's Conception of Cyber Sovereignty -- The Concept of Sovereignty in Cyberspace -- Realizing Sovereignty at Home -- Conclusion and Implications
- List of Abbreviations -- Notes -- Bibliography -- Part II: Power and Governance -- Chapter 7 -- A Balance of Power in Cyberspace -- The Balance of Power -- Balancing Power in Cyberspace -- Conclusion: Toward a Basket-Based Approach for Cyberspace -- Notes -- Chapter 8 -- International Law in Cyberspace -- Normative Constraints and Cybersecurity -- Norms, Deterrence, and NATO -- Conclusion -- Notes -- Chapter 9 -- Cybersecurity Norm-Building and Signaling with China -- The Operation Aurora Attacks: Background -- The Operation Aurora Attacks: Timeline -- The Operation Aurora Attacks: Signals -- Decoupling Cybersecurity and Internet Freedom -- Bibliography -- Chapter 10 -- Ambiguity and Appropriation -- A Complex Middle Ground -- Ambiguous Cybersecurity Strategies -- Cybercrime Laws -- Conclusion -- Notes -- References -- Chapter 11 -- The Power of Norms Meets Normative Power -- "Taking the Data Straight From the Tubes"-Some Necessary Context and Terminology -- All Aboard! Getting on the Normative Bandwagon -- The Fortified Cyber Norm of Foreign Bulk Data Collection -- The Power of Norms Meets Normative Power -- Conclusion -- Note -- Bibliography -- Part III: Multistakeholder and Corporate Diplomacy -- Chapter 12 -- Non-State Actors as Shapers of Customary Standards of Responsible Behavior in Cyberspace -- Literature Review -- The Normative Contributions of Non-State Actors -- Non-State Actors as Shapers of Customary Standards of Responsible Behavior in Cyberspace -- Conclusion -- Notes -- Bibliography -- Chapter 13 -- Big Tech Hits the Diplomatic Circuit -- What Is the Cybersecurity Tech Accord? -- Why Did Microsoft Start the Accord? -- Why Are Others Joining the Accord? -- Who Has Joined the Accord? -- Conclusion: Neither Shared nor Understood? -- Notes -- Bibliography -- Chapter 14 -- Cyber-Norms Entrepreneurship?

