Corpus ID: 29681393

Depleted Trust in the Cyber Commons Roger Hurwitz

@inproceedings{Hurwitz2012DepletedTI,
  title={Depleted Trust in the Cyber Commons Roger Hurwitz},
  author={Roger Hurwitz},
  year={2012}
}
  • Roger Hurwitz
  • Published 2012
  • Policymakers increasingly recognize the need for agreements to regulate cyber behaviors at the international level. In 2010, the United Nations Group of Governmental Experts on Developments in the Field of Infor­ mation and Telecommunications in the Context of International Secu­ rity recommended “dialogue among States to discuss norms pertaining to State use of ICTs [information and communications technology], to reduce collective risk and protect critical national and international in… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 16 REFERENCES

    In the public domain.

    • Sally Gillen
    • Medicine
    • Nursing standard (Royal College of Nursing (Great Britain) : 1987)
    • 2012

    Putin Chasing Imaginary American Ghosts,

    • Michael Bohm
    • Moscow Times,
    • 2012

    In China, Business Travelers Take Extreme Precautions to Avoid Cyber-Espionage,

    • Ellen Nakashima, William Wan
    • 2011

    Societal Dependencies and Trust,

    • Jacques Bus
    • Hamadoun Touré et al., The Quest for Cyber Peace (Geneva: International Telecommunications Union,
    • 2011

    Why a Cybersecurity Treaty Is a Pipe Dream,

    • Adam Segal, Matthew Waxman
    • Council on Foreign Relations,
    • 2011

    “ Jo Twist , Web Guru Fights Info Pollution

    • Jacques Bus
    • Access Denied : The Practice and Policy of Global Internet Filtering International Strategy for Cyberspace : Prosperity , Security , and Openness in a Networked World
    • 2011

    General Assembly Resolution 64/211: “Creation of a global culture of cybersecurity and taking stock of national efforts to protect critical information infrastructures,

    • UN See
    • 2010

    US Efforts to Secure the Information Age (New York: Routledge, 2008)

    • For the securitization of cyber in the United States, see M. Dunn Cavelty, Cyber-Security, Threat Politics
    • For types and extent of enclosure practices, see Ronald Deibert et al., eds., Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge: MIT, 2008); and Deibert et al., eds., Access Controlled
    • 2010

    Wanted: a United Nations Cyberspace Treaty,” in Andrew Nagorski, ed., Global Cyber Deterrence: Views from China, the U.S., Russia, India, and Norway (New York: EastWest

    • Stein Schjølberg
    • 2010