Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
In: International affairs, Band 92, Heft 1, S. 43-62
ISSN: 0020-5850
Despite its centrality in the national cyber security strategies of the US and the UK, the public-private partnership is a nebulous arrangement, which is especially problematic in the context of critical infrastructure protection. Privately owned and operated critical infrastructure that is regarded as a potential national security vulnerability raises questions about the allocation of responsibility and accountability in terms of cyber security. As with many aspects of cyber security, this issue is often discussed with little reference to previous scholarship that could provide conceptual scaffolding. This article draws on the extensive literature on public-private partnerships in order to assess the tensions and challenges of this arrangement in national cyber-security strategies. It finds that there is a serious disjuncture in expectations from both 'partners'. The government regards privately owned and operated critical infrastructure as a key element of national security but is reluctant to claim a mandate to oversee network security. At the same time, the private sector is not inclined to accept responsibility or liability for national cyber security. This challenge for governments to manage national cyber security raises questions about how well equipped these states are to promote their own security in the information age. Acknowledging the flaws in the 'partnership' is an essential step towards addressing them. (International Affairs (Oxford) / SWP)
World Affairs Online
In: International affairs, Band 92, Heft 1, S. 43-62
ISSN: 1468-2346
In: Millennium: journal of international studies, Band 43, Heft 2, S. 640-659
ISSN: 0305-8298
In: Millennium: journal of international studies, Band 43, Heft 2, S. 640-659
ISSN: 1477-9021
The multi-stakeholder model of global Internet governance has emerged as the dominant approach to navigating the complex set of interests, agendas and implications of our increasing dependence on this technology. Protecting this model of global governance in this context has been referred to by the US and EU as 'essential' to the future of the Internet. Bringing together actors from the private sector, the public sector and also civil society, multi-stakeholder Internet governance is not only regarded by many as the best way to organise around this particular issue, it is also held up as a potential template for the management of other 'post-state' issues. However, as a consequence of its normative aspirations to representation and power sharing, the multi-stakeholder approach to global Internet governance has received little critical attention. This paper examines the issues of legitimacy and accountability with regard to the 'rule-makers' and 'rule-takers' in this model and finds that it can also function as a mechanism for the reinforcement of existing power dynamics.
In: Australian journal of international affairs: journal of the Australian Institute of International Affairs, Band 67, Heft 5, S. 621-637
ISSN: 1035-7718
In: Australian journal of international affairs: journal of the Australian Institute of International Affairs, Band 67, Heft 5, S. 621-637
ISSN: 1465-332X
In: International relations: the journal of the David Davies Memorial Institute of International Studies, Band 34, Heft 3, S. 391-412
ISSN: 1741-2862
The implementation of the Internet of Things (IoT) is central to what the World Economic Forum has coined the 'Fourth Industrial Revolution'; a technological revolution built upon cyber-physical systems that will blur the lines between the physical, digital and biological spheres. Novel interconnections will emerge as a result, challenging traditional relations and modes of governance. However, a central feature of the IoT is that the implications of cyber (in)security are no longer abstract. The IoT also returns us to the world of kinetic effects in international relations; more familiar territory for IR. The resulting cooperation and coordination challenges are transboundary in nature, occur at multiple levels across sectors, between institutions, and will impact all actors, both public and private, in complex, often highly politicised ways. In this article we argue that advances in global climate governance appear to be offering an early model of a consensual rules-based approach within the existing international order that provides space for advancing agility, flexibility, and polycentrism to meet the demands of 'wicked problems' like the cybersecurity of the IoT. Perhaps one of the most important lessons to be drawn across from climate governance is the role of robust mechanisms for knowledge exchange – specifically between the technical and policy communities.
The Commission's plans to shape Europe's digital future aim at increasing the generation and availability of data. The strategy to achieve this goal is underpinned by the belief that the GDPR generates the trust required to drive more demand for data-driven technologies, as well as more data-driven competition and innovation, an outcome purportedly compatible with the protection of individuals' personal data. This article exposes the flaws in this rationale, noting that the GDPR neither generates trust nor stimulates data-driven competition. Crucially, on the most fundamental level, the protection of personal data and the promotion of consumer welfare in data-driven markets pull in opposite directions. Since the GDPR is both failing to protect individuals against the privacy risks posed by current technologies and serving as a regulatory barrier to entry that favours established dominant platforms, the EU should reconsider the current personal data protection mechanisms to arrive at normatively consistent outcomes capable of affording effective data privacy protection and improving the competitiveness of EU firms.
BASE
In: SpringerLink
In: Bücher
In: Palgrave Pivot
This book examines the role of technology in the core voices for International Relations theory and how this has shaped the contemporary thinking of 'IR' across some of the discipline's major texts. Through an interview format between different generations of IR scholars, the conversations of the book analyse the relationship between technology and concepts like power, security and global order. They explore to what extent ideas about the role and implications of technology help to understand the way IR has been framed and world politics are conceived of today. This innovative text will appeal to scholars in Politics and International Relations as well as STS, Human Geography and Anthropology. Carolin Kaltofen is Research Associate in Science Diplomacy in the Department of Science, Technology, Engineering and Public Policy at University College London, UK. Madeline Carr is Associate Professor in International Relations and Cyber Security in the Department of Science, Technology, Engineering and Public Policy at University College London, UK. Michele Acuto is Professor of Global Urban Politics in the Faculty of Architecture, Building and Planning at the University of Melbourne, Australia
In: Palgrave pivot
This book examines the role of technology in the core voices for International Relations theory and how this has shaped the contemporary thinking of 'IR' across some of the discipline's major texts. Through an interview format between different generations of IR scholars, the conversations of the book analyse the relationship between technology and concepts like power, security and global order. They explore to what extent ideas about the role and implications of technology help to understand the way IR has been framed and world politics are conceived of today. This innovative text will appeal to scholars in Politics and International Relations as well as STS, Human Geography and Anthropology. Carolin Kaltofen is Research Associate in Science Diplomacy in the Department of Science, Technology, Engineering and Public Policy at University College London, UK. Madeline Carr is Associate Professor in International Relations and Cyber Security in the Department of Science, Technology, Engineering and Public Policy at University College London, UK. Michele Acuto is Professor of Global Urban Politics in the Faculty of Architecture, Building and Planning at the University of Melbourne, Australia.--
In: Oxford scholarship online
In: Political Science
First published in 1977, Hedley Bull's 'The Anarchical Society' is one of the classic texts in international relations. This volume revisits Bull's work, providing new readings of the text, developing new criticisms and exploring its relevance to a wide range of contemporary issues in world politics
In: Australian journal of international affairs: journal of the Australian Institute of International Affairs, Band 68, Heft 2, S. 131-132
ISSN: 1035-7718
In: Australian journal of international affairs: journal of the Australian Institute of International Affairs, Band 68, Heft 2, S. 131-132
ISSN: 1465-332X
In: Global policy: gp, Band 9, Heft S3, S. 60-66
ISSN: 1758-5899
AbstractOngoing efforts by state actors to collaborate on addressing the challenges of global cybersecurity have been slow to yield results. Technical expert communities such as Computer Security and Incident Response Teams (CSIRTs) have played a fundamental role in maintaining the Internet's functional structure through transnational collaboration. Responsible for security incident management and located in diverse constituencies, these coordination centres engage in joint responses and solve day‐to‐day cybersecurity problems through diverse national, regional and international networks. This article argues that CSIRTs form an epistemic community that engages in science diplomacy, at times navigating geopolitical tensions in a way that political actors are not able to. Through interviews with CSIRT representatives, we explain how their collaborative actions, rooted in shared technical knowledge, norms and best practices, contribute to the advancement of international cooperation on cybersecurity.