Privacy online: up, close and personal
In: Health and Technology, Band 7, Heft 4, S. 489-499
ISSN: 2190-7196
15 Ergebnisse
Sortierung:
In: Health and Technology, Band 7, Heft 4, S. 489-499
ISSN: 2190-7196
In: Survival: global politics and strategy, Band 53, Heft 3, S. 119-132
ISSN: 1468-2699
In: Survival: global politics and strategy, Band 53, Heft 3, S. 119-132
ISSN: 0039-6338
The response to cyber threats cuts across several areas of law. Ten rules can be formulated to focus debate on the quality and interpretation of existing frameworks and the need for new ones. (Survival / SWP)
World Affairs Online
In: The SAIS review of international affairs / the Johns Hopkins University, the Paul H. Nitze School of Advanced International Studies (SAIS), Band 30, Heft 2, S. 105-119
ISSN: 1945-4716
World Affairs Online
In: SAIS Review, Band 30, Heft 2, S. 105-119
This article explores the existing international cybersecurity regimes, focusing on the various roles of international organizations. At present, the prevailing approach of such organizations is fragmented and often at odds with national-level policy priorities. To rectify this situation and enhance cybersecurity a comprehensive approach is needed, one that acknowledges the full array of cyber threats and engages and integrates the disparate relevant actors at the national level. NATO, given its traditional profile as a political-military alliance with a mandate to promote peace and security for its members, is uniquely situated to be the source of such a comprehensive framework. Adapted from the source document.
In: SAIS review, Band 30, Heft 2, S. 105-120
In: The SAIS review of international affairs / the Johns Hopkins University, the Paul H. Nitze School of Advanced International Studies (SAIS), Band 30, Heft 2, S. 105-119
ISSN: 1945-4724
In: SAIS Review, Band 30, Heft 2
This article explores the existing international cybersecurity regimes, focusing on the various roles of international organizations. At present, the prevailing approach of such organizations is fragmented and often at odds with national-level policy priorities. To rectify this situation and enhance cybersecurity a comprehensive approach is needed, one that acknowledges the full array of cyber threats and engages and integrates the disparate relevant actors at the national level. NATO, given its traditional profile as a political-military alliance with a mandate to promote peace and security for its members, is uniquely situated to be the source of such a comprehensive framework. Adapted from the source document.
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. The volume is split into four thematic sections: Concepts and frameworks; Challenges to secure and peaceful cyberspace; National and regional perspectives on cybersecurity; Global approaches to cybersecurity. This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general.
Stability is a delicate attribute of public international order. If pursued to its absolute, it could paralyse the development and progress of humankind. If marginalized, it could fuel injustice, violence and conflict. Several differing concepts of 'stability' can be identified in international affairs. The United Nations Security Council uses the term to express a desirable state of affairs, almost synonymous with the concept of 'peace'. In a 1992 'Note by the President of the Security Council', various sources of instability were seen as threatening peace and security. The Council recognized that otherwise welcomed political changes may bring new risks to stability and security, especially stemming from changes to state structures. As the Council observed, 'non-military sources of instability in the economic, social, humanitarian and ecological fields' had become threats to peace and security.1 Similarly, in 2005 the Council discussed the food crisis in Africa as a threat to peace, security and stability ; The Politics of Stability: Cement and Change in Cyber Affairs ; publishedVersion
BASE
Tikk and Kerttunen inform new entrants and nonparticipating governments of the discussions and outcomes of the UN First Committee Group of Governmental Experts (GGE) and discuss prospects for the 2019/2020 GGE. They explain why the Group will not able to provide answers to practical cybersecurity issues facing the majority of states. The authors call states to critically review their reasons for and expectations towards the UN First Committee dialogue on international cybersecurity. ; International Cybersecurity: Orchestral Manoeuvres in the Dark ; publishedVersion
BASE
In: Survival: global politics and strategy, Band 53, Heft 5, S. 219-222
ISSN: 1468-2699
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general.
In: Texas International Law Journal, Band 57, Heft 2
SSRN
In: Taylor, L., Sharma, G., Martin, A., & Jameson, S. (Eds.). Data Justice and COVID-19: Global Perspectives. London: Meatspace Press. https://issuu.com/meatspacepress/docs/msp_data_justice_covid-19_digital_issuu
SSRN