Constructing Norms for Global Cybersecurity
@article{Finnemore2016ConstructingNF, title={Constructing Norms for Global Cybersecurity}, author={Martha Finnemore and Duncan B. Hollis}, journal={American Journal of International Law}, year={2016}, volume={110}, pages={425 - 479} }
On February 16, 2016, a U.S. court ordered Apple to circumvent the security features of an iPhone 5C used by one of the terrorists who committed the San Bernardino shootings. Apple refused. It argued that breaking encryption for one phone could not be done without undermining the security of encryption more generally. It made a public appeal for “everyone to step back and consider the implications” of having a “back door” key to unlock any phone—which governments (and others) could deploy to…
119 Citations
Unpacking cyber norms: private companies as norm entrepreneurs
- Political Science
- 2018
Concerns over practices in cyberspace are central to the consolidating international agenda for cybersecurity. Responses to such concerns come in different shapes and sizes, and are proposed by…
Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?
- Computer ScienceWorld Trade Review
- 2019
This article investigates whether GATS-inconsistent measures may be justified under GATS Art.
Aligning the international protection of ‘the public core of the internet’ with state sovereignty and national security
- Economics
- 2017
ABSTRACTThe norm to protect the public core of the internet, originally advocated by the Netherlands Scientific Council for Government Policy, can be operationalised in two ways. Both a layered…
Governing Proliferation in Cybersecurity
- Computer Science, Political Science
- 2017
This article compares state activities to control the international spread of malware with efforts to counter the proliferation of weapons of mass destruction (WMD). The analysis focuses on…
Why international law and norms do little in preventing non-state cyber attacks
- Political ScienceJ. Cybersecur.
- 2021
In this article, I investigate why international law and norms have failed to keep cyberspace peaceful. The problem comes mainly from their failure to address what non-state actors, such as…
From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers
- LawLeiden Journal of International Law
- 2017
Abstract Several indicators point to a crisis at the heart of the emerging area of international cyber security law. First, proposals for binding international treaties by leading stakeholders,…
Defining the protection of ‘the public core of the internet’ as a national interest
- Political Science
- 2017
the Netherlands Scientific Council for Government Policy, can be operationalised in two ways. Both a layered approach and a functional approach to defining the public core of the internet provide…
Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity
- Computer ScienceJ. Cybersecur.
- 2021
It is found that wealthier countries are more vulnerable than less wealthy countries; that technical solutions, including patching software, preventing spoofing, and securing servers, consistently outperform attempts to educate citizens about cybersecurity; and that countries which favor digital isolation and restrictions on internet freedom are not actually better protected than those who embrace digital freedom and multilateral approaches to cybersecurity.
What if Cyberspace Were for Fighting?
- Political ScienceEthics & International Affairs
- 2018
Abstract This essay explores the ethical and legal implications of prioritizing the militarization of cyberspace as part of a roundtable on “Competing Visions for Cyberspace.” Our essay uses an ideal…
Public attribution of cyber intrusions
- Political ScienceJ. Cybersecur.
- 2020
The article examines the use of public attribution as a political strategy for attaining specific political effects beyond the dyadic attacker–victim relationship, including shaping the operational and normative environment of cyber operations, with the potential to exert an independent deterrent effect.
References
SHOWING 1-10 OF 175 REFERENCES
A Declaration of the Independence of Cyberspace
- Art
- 1996
Yesterday, that great invertebrate in the White House signed into the law the Telecom “Reform” Act of 1996, while Tipper Gore took digital photographs of the proceedings to be included in a book…
An e-SOS for Cyberspace
- Computer Science
- 2010
This Article proposes states adopt a duty to assist victims of the most severe cyberthreats, and proposes an e-SOS system, which would compliment, rather than compete with, self-reliant measures and the existing legal proscriptions against cyber threats.
Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance
- Political Science
- 2012
Views range widely about the seriousness of cyberattacks and the likelihood of cyberwar. But even framing cyberattacks within the context of a loaded category like war can be an oversimplification…
Countering State-Sponsored Cyber Economic Espionage under International Law
- Law
- 2015
=2479609. 486 N.C. J. INT'L L. & COM. REG. Vol. XL related to the actions of those same rebels or the government, with no other actions taken, while arguably violating the domestic espionage laws and…
The Cyber-Law of Nations
- Political Science
- 2014
Concerns about cyberwar, cyberespionage, and cybercrime have burst into focus in recent years. The United States and China have traded accusations about cyber intrusions, and a December 2012 U.N.…
Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues
- Computer Science
- 2002
A closer look at technical and policy considerations for next-generation Internet protocols to enhance track and trace capabilities is taken.
Stuxnet and the Limits of Cyber Warfare
- Computer Science
- 2013
The empirical facts of Stuxnet support an opposite interpretation; cyber capabilities can marginally enhance the power of stronger over weaker actors, the complexity of weaponization makes cyber offense less easy and defense more feasible than generally appreciated, and cyber options are most attractive when deterrence is intact.
Attributing Cyber Attacks
- Computer Science
- 2015
It is argued that attribution is what states make of it and to show how, the Q Model is introduced: designed to explain, guide, and improve the making of attribution.
Reversing the Gun Sights: Transnational Civil Society Targets Land Mines
- Political ScienceInternational Organization
- 1998
The rise in the importance of nonstate actors in generating new norms in world politics has been documented by scholars, but the literature has focused predominantly on nonsecurity (“new”) issue…
Conflict and Cooperation in Cyberspace: The Challenge to National Security
- Political Science
- 2013
Conflict and Cooperation in Cyberspace: The Challenge to National Security. Edited by Panayotis A. Yannakogeoros and Adam B. Lowther. Boca Raton, FL: Taylor and Francis Group, 2014. ISBN…