M Dunn Cavelty - International Studies Review, 2013 - academic.oup.com
The link between cyberspace and national security is often presented as an unquestionable and uncontested “truth.” However, there is nothing natural or given about this link: It had to …
What is at stake for how the Internet continues to evolve is the preservation of its integrity as a single network. In practice, its governance is neither centralised nor unitary; it is piecemeal …
M Dunn Cavelty - Science and engineering ethics, 2014 - Springer
Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi …
D Lambach - International Studies Review, 2020 - academic.oup.com
There are widespread worries about the impending fragmentation of the internet. Reviewing the IR literature on cyberspace and internet governance, this paper demonstrates that these …
This paper aims to explore the role of applying information technology governance using the COBIT 5 framework in improving the security of accounting information systems. The paper …
In recent years, various governments have been trying to subordinate the Internet to the system of the Westphalian state order. This article seeks to add a new layer to the analysis of …
This paper observes the evolution of cyber security institutions recently established in the European Union. These institutions are based on older national, regional, and international …
D Cooper, E Heilman, K Brogle, L Reyzin… - Proceedings of the …, 2013 - dl.acm.org
The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of the most devastating attacks on interdomain routing. The threat model for the RPKI …
The book addresses representation of the public interest in Internet standard developing organisations (SDOs). Much of the existing literature on Internet governance focuses on …