What Is an International Cybersecurity Regime and How We Can Achieve It

I. Stadnik
{"title":"What Is an International Cybersecurity Regime and How We Can Achieve It","authors":"I. Stadnik","doi":"10.5817/MUJLT2017-1-7","DOIUrl":null,"url":null,"abstract":"This article explores the two mainstream directions of debates about the possibility of establishing a kind of international cybersecurity regime. It develops the idea of different governance models based on sovereignty, on the one hand, and multistakeholderism on the other. The application of international relations theory helps to understand the current process and stalemate initiatives regarding state cooperation in this field. In addition, the author pays attention to the applicability of the constructivism framework to the understanding of cybersecurity threats and the elaboration of international norms applicable to cyberspace. Finally, the article concludes with the idea that the multistakeholder approach to norm-making may become a viable solution to the problem of constructing an international cybersecurity regime.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":"11 1","pages":"129-154"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Masaryk University Journal of Law and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5817/MUJLT2017-1-7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

This article explores the two mainstream directions of debates about the possibility of establishing a kind of international cybersecurity regime. It develops the idea of different governance models based on sovereignty, on the one hand, and multistakeholderism on the other. The application of international relations theory helps to understand the current process and stalemate initiatives regarding state cooperation in this field. In addition, the author pays attention to the applicability of the constructivism framework to the understanding of cybersecurity threats and the elaboration of international norms applicable to cyberspace. Finally, the article concludes with the idea that the multistakeholder approach to norm-making may become a viable solution to the problem of constructing an international cybersecurity regime.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
什么是国际网络安全制度以及我们如何实现它
本文探讨了关于建立一种国际网络安全制度的可能性的两个主流辩论方向。它一方面发展了基于主权和多利益相关者主义的不同治理模式。国际关系理论的应用有助于理解当前该领域国家合作的进程和陷入僵局的举措。此外,作者还注意到建构主义框架在理解网络安全威胁和阐述适用于网络空间的国际规范方面的适用性。最后,文章的结论是,规范制定的多方利益相关者方法可能成为构建国际网络安全制度问题的可行解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
1.00
自引率
0.00%
发文量
9
期刊最新文献
Addressing Evolving Digital Piracy Through Contributory Liability for Copyright Infringement: The Mobdro Case Study (Un)lock and (Un)loaded: Regulating 3D-Printed Firearms in the Open-source Era after the 2013 Hysteria Patent-Eligible Invention Requirement Under the European Patent Convention and its Implications on Creations Involving Artificial Intelligence Cybersecurity: Notorious, but Often Misused and Confused Terms How the Two Child Abuse Cases Helped to Shape the Test of Originality of Photographic Works
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1