Constructing Norms for Global Cybersecurity

  title={Constructing Norms for Global Cybersecurity},
  author={Martha Finnemore and Duncan B. Hollis},
  journal={American Journal of International Law},
  pages={425 - 479}
  • M. Finnemore, D. Hollis
  • Published 1 July 2016
  • Computer Science, Political Science
  • American Journal of International Law
On February 16, 2016, a U.S. court ordered Apple to circumvent the security features of an iPhone 5C used by one of the terrorists who committed the San Bernardino shootings. Apple refused. It argued that breaking encryption for one phone could not be done without undermining the security of encryption more generally. It made a public appeal for “everyone to step back and consider the implications” of having a “back door” key to unlock any phone—which governments (and others) could deploy to… 
Unpacking cyber norms: private companies as norm entrepreneurs
Concerns over practices in cyberspace are central to the consolidating international agenda for cybersecurity. Responses to such concerns come in different shapes and sizes, and are proposed by
Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?
  • N. Mishra
  • Computer Science
    World Trade Review
  • 2019
This article investigates whether GATS-inconsistent measures may be justified under GATS Art.
Aligning the international protection of ‘the public core of the internet’ with state sovereignty and national security
ABSTRACTThe norm to protect the public core of the internet, originally advocated by the Netherlands Scientific Council for Government Policy, can be operationalised in two ways. Both a layered
Governing Proliferation in Cybersecurity
  • T. Herr
  • Computer Science, Political Science
  • 2017
This article compares state activities to control the international spread of malware with efforts to counter the proliferation of weapons of mass destruction (WMD). The analysis focuses on
Why international law and norms do little in preventing non-state cyber attacks
In this article, I investigate why international law and norms have failed to keep cyberspace peaceful. The problem comes mainly from their failure to address what non-state actors, such as
From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers
Abstract Several indicators point to a crisis at the heart of the emerging area of international cyber security law. First, proposals for binding international treaties by leading stakeholders,
Defining the protection of ‘the public core of the internet’ as a national interest
the Netherlands Scientific Council for Government Policy, can be operationalised in two ways. Both a layered approach and a functional approach to defining the public core of the internet provide
Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity
It is found that wealthier countries are more vulnerable than less wealthy countries; that technical solutions, including patching software, preventing spoofing, and securing servers, consistently outperform attempts to educate citizens about cybersecurity; and that countries which favor digital isolation and restrictions on internet freedom are not actually better protected than those who embrace digital freedom and multilateral approaches to cybersecurity.
What if Cyberspace Were for Fighting?
Abstract This essay explores the ethical and legal implications of prioritizing the militarization of cyberspace as part of a roundtable on “Competing Visions for Cyberspace.” Our essay uses an ideal
Public attribution of cyber intrusions
The article examines the use of public attribution as a political strategy for attaining specific political effects beyond the dyadic attacker–victim relationship, including shaping the operational and normative environment of cyber operations, with the potential to exert an independent deterrent effect.


A Declaration of the Independence of Cyberspace
Yesterday, that great invertebrate in the White House signed into the law the Telecom “Reform” Act of 1996, while Tipper Gore took digital photographs of the proceedings to be included in a book
An e-SOS for Cyberspace
This Article proposes states adopt a duty to assist victims of the most severe cyberthreats, and proposes an e-SOS system, which would compliment, rather than compete with, self-reliant measures and the existing legal proscriptions against cyber threats.
Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance
Views range widely about the seriousness of cyberattacks and the likelihood of cyberwar. But even framing cyberattacks within the context of a loaded category like war can be an oversimplification
Countering State-Sponsored Cyber Economic Espionage under International Law
=2479609. 486 N.C. J. INT'L L. & COM. REG. Vol. XL related to the actions of those same rebels or the government, with no other actions taken, while arguably violating the domestic espionage laws and
The Cyber-Law of Nations
Concerns about cyberwar, cyberespionage, and cybercrime have burst into focus in recent years. The United States and China have traded accusations about cyber intrusions, and a December 2012 U.N.
Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues
A closer look at technical and policy considerations for next-generation Internet protocols to enhance track and trace capabilities is taken.
Stuxnet and the Limits of Cyber Warfare
The empirical facts of Stuxnet support an opposite interpretation; cyber capabilities can marginally enhance the power of stronger over weaker actors, the complexity of weaponization makes cyber offense less easy and defense more feasible than generally appreciated, and cyber options are most attractive when deterrence is intact.
Attributing Cyber Attacks
It is argued that attribution is what states make of it and to show how, the Q Model is introduced: designed to explain, guide, and improve the making of attribution.
Reversing the Gun Sights: Transnational Civil Society Targets Land Mines
  • R. Price
  • Political Science
    International Organization
  • 1998
The rise in the importance of nonstate actors in generating new norms in world politics has been documented by scholars, but the literature has focused predominantly on nonsecurity (“new”) issue
Conflict and Cooperation in Cyberspace: The Challenge to National Security
Conflict and Cooperation in Cyberspace: The Challenge to National Security. Edited by Panayotis A. Yannakogeoros and Adam B. Lowther. Boca Raton, FL: Taylor and Francis Group, 2014. ISBN