Global code: Power and the weak regulation of cyberweapons

作者: Tim Stevens

DOI: 10.1007/978-3-319-98599-2_13

关键词:

摘要: This chapter renders explicit what is submerged in previous analyses of cyberweapons regulation and governance: the operations power shaping this field politics policy. It addresses nascent attempts to regulate explores global information-technological assemblage that shape their development, possession use. First, a short preamble sets out conceptual foundations terms both regime theory analysis International Relations. There follow four outline case studies, each focusing on an aspect governance previously established as problems for development regime. The first concerns productive role NATO Tallinn Manual Process constructing legitimate military instruments. second US structural incentivising markets, which undermines multilateral dual-use technologies associated with cyberweapons. third examines Internet source institutional power, arguing design provides affordances fourth compulsory diplomatic relations between great powers, resolve differing interpretations sovereignty constrain emergence

参考文章(66)
Paul Meyer, CYBER-SECURITY THROUGH ARMS CONTROL RUSI Journal. ,vol. 156, pp. 22- 27 ,(2011) , 10.1080/03071847.2011.576471
Martin C. Libicki, Cyberdeterrence and Cyberwar ,(2009)
Ivanka Barzashka, Are Cyber-Weapons Effective? The RUSI Journal. ,vol. 158, pp. 48- 56 ,(2013) , 10.1080/03071847.2013.787735
Margaret Gilmore, Electing Police and Crime Commissioners RUSI Journal. ,vol. 157, pp. 6- 11 ,(2012) , 10.1080/03071847.2012.733093
Laura DeNardis, HIDDEN LEVERS OF INTERNET CONTROL Information, Communication & Society. ,vol. 15, pp. 720- 738 ,(2012) , 10.1080/1369118X.2012.659199
Abraham D Sofaer, Seymour E Goodman, Mariano-Florentino Cuéllar, Ekaterina A Drozdova, David D Elliott, Gregory D Grove, Stephen J Lukasik, Tonya L Putnam, George D Wilson, A Proposal for an International Convention on Cyber-Crime and Terrorism CISAC. ,(2000)
Innokenty Pyetranker, An Umbrella in a Hurricane: Cyber Technology and the December 2013 Amendment to the Wassenaar Arrangement Northwestern Journal of Technology and Intellectual Property. ,vol. 13, pp. 153- ,(2015)
Martin C. Libicki, Lillian Ablon, Timothy Webb, The Defender's Dilemma: Charting a Course Toward Cybersecurity ,(2015)
Ken Booth, Nicholas J Wheeler, The Security Dilemma: Fear, Cooperation, and Trust in World Politics Published in <b>2008</b> in Basingstoke England] New York NY by Palgrave Macmillan. ,(2007)
Jon R. Lindsay, Stuxnet and the Limits of Cyber Warfare Security Studies. ,vol. 22, pp. 365- 404 ,(2013) , 10.1080/09636412.2013.816122