Constructing norms for global cybersecurity

M Finnemore, DB Hollis - American Journal of International Law, 2016 - cambridge.org
On February 16, 2016, a US court ordered Apple to circumvent the security features of an
iPhone 5C used by one of the terrorists who committed the San Bernardino shootings. Apple …

Internet of Things, cybersecurity and governing wicked problems: learning from climate change governance

M Carr, F Lesniewska - International Relations, 2020 - journals.sagepub.com
The implementation of the Internet of Things (IoT) is central to what the World Economic
Forum has coined the 'Fourth Industrial Revolution'; a technological revolution built upon …

Before algorithmic Armageddon: anticipating immediate risks to restraint when AI infiltrates decisions to wage war

T Erskine - Australian Journal of International Affairs, 2024 - Taylor & Francis
ABSTRACT AI-enabled systems will steadily infiltrate resort-to-force decision making. This
will likely include decision-support systems recruited to assist with crucial deliberations over …

CSIRT s and global cybersecurity: How technical experts support science diplomacy

LM Tanczer, I Brass, M Carr - Global policy, 2018 - Wiley Online Library
Ongoing efforts by state actors to collaborate on addressing the challenges of global
cybersecurity have been slow to yield results. Technical expert communities such as …

The unexpected norm-setters: Intelligence agencies in cyberspace

I Georgieva - Contemporary Security Policy, 2020 - Taylor & Francis
By implementing novel intelligence techniques in cyberspace, security and intelligence
agencies have become major actors in the cybersecurity landscape. As they no longer just …

A dose of realism: The contestation and politics of cyber norms

T Maurer - Hague Journal on the Rule of Law, 2020 - Springer
Norms for cyberspace remain highly contested internationally among governments and
fragmented domestically within governments. Despite diplomatic activities at the United …

The metagovernance of Internet governance

N ten Oever - Power and authority in internet governance, 2021 - taylorfrancis.com
In this chapter, the author leverages the framework of metagovernance to functionally
differentiate the private and multistakeholder internet governance regime and the …

Cyber norms: technical extensions and technological challenges

A Kulikova - Journal of Cyber Policy, 2021 - Taylor & Francis
Since the late 1990s, the UN has been home to debates and negotiations on the rules,
norms and principles of states' responsible behaviour in cyberspace. As these discussions …

Cybersecurity and non-state actors: a historical analogy with mercantile companies, privateers, and pirates

F Egloff - 2018 - ora.ox.ac.uk
The thesis investigates how the historical analogy to mercantile companies, privateers, and
pirates between the 16th and 19th century can elucidate the relationship between non-state …

What is an International Cybersecurity Regime and how we can Achieve it?

I Stadnik - Masaryk University Journal of Law and Technology, 2017 - ceeol.com
This article explores the two mainstream directions of debates about the possibility of
establishing a kind of international cybersecurity regime. It develops the idea of different …