Governing cyberspace

Titel: Governing cyberspace : behavior, power, and diplomacy / edited by Dennis Broeders, Bibi van den Berg
Beteiligt: ;
Veröffentlicht: Lanham : Rowman & Littlefield, 2020
Umfang: 1 Online-Ressource (vii, 327 Seiten) : Illustrationen
Format: E-Book
Sprache: Englisch
Schriftenreihe/
mehrbändiges Werk:
Digital technologies and global politics
Andere Ausgaben: Erscheint auch als Online-Ausgabe: Governing Cyberspace: Behavior, Power and Diplomacy
Erscheint auch als Druck-Ausgabe: Governing Cyberspace: Behavior, Power and Diplomacy
ISBN: 9798881810733 ; 9798881857301 ; 9781786614964 ; 9781786614940 ; 9781786614957
alg: 53062784
001A    $00026:16-06-25 
001B    $01999:17-06-25 $t00:25:07.000 
001D    $00026:16-06-25 
001U    $0utf8 
001X    $00 
002@    $0Oau 
002C    $aText $btxt $2rdacontent 
002D    $aComputermedien $bc $2rdamedia 
002E    $aOnline-Ressource $bcr $2rdacarrier 
003@    $0530627841 
004A    $A979-8-88181-073-3 $fonline 
004A    $A979-8-88185-730-1 $fpdf 
004A    $A978-1-78661-496-4 $fepub 
004E/07 $0BP9798881810733BC $lBLOOM 
004E/07 $011593488X $lDE-627-1 
004O    $A978-1-78661-494-0 $Sp $fhbk 
004O    $A978-1-78661-495-7 $Sp $fpbk 
004P    $010.5040/9798881810733 $S0 
006C    $01521936111 $aOCoLC 
006L    $01927380162 $2KXP 
007A    $011593488X $aKEP 
007I    $0bloom-10.5040/9798881810733 
009Q    $S0 $uhttps://doi.org/10.5040/9798881810733 $xR 
009Q    $uhttps://www.bloomsburycollections.com/monograph?docid=b-9798881810733 $xH 
010@    $aeng 
010E    $erda 
011@    $a2020 
017B    $aZDB-162-BCC 
017B    $aZDB-162-BLO 
021A    $aGoverning cyberspace $dbehavior, power, and diplomacy $hedited by Dennis Broeders, Bibi van den Berg 
028C    $BHerausgeber $#Broeders, Dionysius Wilhelmus Johannes $4edt $7142016063 $8Broeders, Dennis$Z1974- [Tp1] $9225912139 
028C    $BHerausgeber $#Den Berg, Bibi van $#Van den Berg, Bibi $#Berg, B. van den $4edt $71091588120 $8Berg, Bibi$cvan den$Z1975- [Tp3] $9376428295 
033A    $pLanham $nRowman & Littlefield 
033E    $pLondon $nBloomsbury Publishing 
034D    $a1 Online-Ressource (vii, 327 Seiten) 
034M    $aIllustrationen 
036G    $aDigital technologies and global politics 
037A    $aLiteraturangaben 
037I    $aNamensnennung - Nicht-kommerziell - Keine Bearbeitungen 4.0 International $2cc $uhttps://creativecommons.org/licenses/by-nc-nd/4.0/ $fCC BY-NC-ND 4.0 
037J    $aOpen Access $2star $fUnrestricted online access 
039D    $aErscheint auch als $tGoverning Cyberspace: Behavior, Power and Diplomacy $z978-1-78661-496-4 $z9798881857301 $nOnline-Ausgabe 
039D    $aErscheint auch als $tGoverning Cyberspace: Behavior, Power and Diplomacy $z978-1-78661-494-0 $z978-1-78661-495-7 $nDruck-Ausgabe 
044A    $aComputer networks $S#0 $xLaw and legislation $N650 
044A    $aCyberspace $S#0 $N650 
044A    $aInternet $S#0 $xLaw and legislation $N650 
045A    $aK564.C6 
045E    $c320 
046L    $aBarrierefreier Inhalt: Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily 
046M    $aChapter 1: Governing Cyberspace: Behaviour, Power and Diplomacy (Dennis Broeders and Bibi van den Berg) Part I: International Legal and Diplomatic Approaches Chapter 2: International Law and International Cyber Norms: A Continuum? (Liisi Adamson) Chapter 3: Electoral Cyber Interference, Self-Determination and The Principle of Non-Intervention in Cyberspace (Nicholas Tsagourias) Chapter 4: Violations of Territorial Sovereignty in Cyberspace - an Intrusion-based Approach (Przemyslaw Roguski) Chapter 5: What Does Russia Want in Cyber Diplomacy? A Primer. (Xymena Kurowska) Chapter 6: China's Conception of Cyber Sovereignty: Rhetoric and Realization (Rogier Creemers) Part II: Power and Governance: International Organizations, States and Sub-state Actors Chapter 7: A Balance of Power in Cyberspace (Alexander Klimburg and Louk Faesen) Chapter 8: International Law in Cyber Space: Leveraging NATO's Multilateralism, Adaptation and Commitment to Cooperative Security (Steven Hill and Nadia Marsan) Chapter 9: Cybersecurity Norm-Building and Signaling with China (Geoffrey Joseph Hoffman) Chapter 10: Ambiguity and Appropriation: Cybersecurity and Cybercrime in Egypt and the Gulf (James Shires) Chapter 11: The Power of Norms Meets Normative Power: On the International Cyber Norm of Bulk Collection, the Normative Power of Intelligence Agencies and How These Meet (Ilina Georgieva) Part III: Multi-stakeholder and Corporate Diplomacy Chapter 12: Non-State Actors as Shapers of Customary Standards of Responsible Behaviour in Cyberspace (Jacqueline Eggenschwiler and Joanna Kulesza) Chapter 13: Big Tech Hits the Diplomatic Circuit: Norm Entrepreneurship, Policy Advocacy, and Microsoft's Cybersecurity Tech Accord (Robert Gorwa and Anton Peez) Chapter 14: Cyber-norms Entrepreneurship? Understanding Microsoft's Advocacy on Cybersecurity (Louise Marie Hurel and Luisa Cruz Lobato) 
047I    $aCyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary boundaries, this timely open access book brings together researchers in fields ranging from international law, international relations, and political science to business studies and philosophy to explore the theme of responsible state behavior in cyberspace. . Divided into three parts, Governing Cyberspace first looks at current debates in and about international law and diplomacy in cyberspace. How does international law regulate state behaviour and what are its limits? How do cyber superpowers like China and Russia shape their foreign policy in relation to cyberspace? The second focuses on power and governance. What is the role for international organisations like NATO or for substate actors like intelligence agencies? How do they adapt to the realities of cyberspace and digital conflict? How does the classic balance of power play out in cyberspace and how do different states position themselves? The third part takes a critical look at multistakeholder and corporate diplomacy. How do global tech companies shape their role as norm entrepreneurs in cyberspace, and how do their cyber diplomatic efforts relate to their corporate identity?  The ebook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com. Open access was funded by Leiden University 

lok: 53062784 3

exp: 53062784 3 1 #EPN
201B/01 $017-06-25 $t00:25:07.332 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173063 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 5

exp: 53062784 5 1 #EPN
201B/01 $017-06-25 $t00:25:07.335 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173071 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 8

exp: 53062784 8 1 #EPN
201B/01 $017-06-25 $t00:25:07.338 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $0130717308X 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 10

exp: 53062784 10 1 #EPN
201B/01 $017-06-25 $t00:25:07.340 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173098 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 11

exp: 53062784 11 1 #EPN
201B/01 $017-06-25 $t00:25:07.342 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173101 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 20

exp: 53062784 20 1 #EPN
201B/01 $017-06-25 $t00:25:07.345 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $0130717311X 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 21

exp: 53062784 21 1 #EPN
201B/01 $017-06-25 $t00:25:07.347 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173128 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 23

exp: 53062784 23 1 #EPN
201B/01 $017-06-25 $t00:25:07.350 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173136 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 24

exp: 53062784 24 1 #EPN
201B/01 $017-06-25 $t00:25:07.352 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173144 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 25

exp: 53062784 25 1 #EPN
201B/01 $017-06-25 $t00:25:07.354 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173152 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 36

exp: 53062784 36 1 #EPN
201B/01 $017-06-25 $t00:25:07.357 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173160 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 49

exp: 53062784 49 1 #EPN
201B/01 $017-06-25 $t00:25:07.359 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173179 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 54

exp: 53062784 54 1 #EPN
201B/01 $017-06-25 $t00:25:07.363 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173187 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 108

exp: 53062784 108 1 #EPN
201B/01 $017-06-25 $t00:25:07.365 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173195 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 204

exp: 53062784 204 1 #EPN
201B/01 $017-06-25 $t00:25:07.367 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173209 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl 

lok: 53062784 205

exp: 53062784 205 1 #EPN
201B/01 $017-06-25 $t00:25:07.370 
201C/01 $016-06-25 
201U/01 $0utf8 
203@/01 $01307173217 
204P/01 $010.5040/9798881810733 $S0 
208@/01 $a16-06-25 $bl
LEADER 00000cam a2200000 c 4500
001 530627841
003 DE-603
005 20250617002507.0
007 cr||||||||||||
008 250616s2020 xx |||| o| u00||u|eng c
020 |a 9798881810733  |c online 
020 |a 9798881857301  |c pdf 
020 |a 9781786614964  |c epub 
024 7 |a 10.5040/9798881810733  |2 doi 
028 5 2 |a BP9798881810733BC 
028 5 2 |a 11593488X 
035 |a (DE-599)KEP11593488X 
035 |a (DE-627)1927380162 
040 |a DE-603  |b ger  |c DE-603  |d DE-603  |e rda 
041 |a eng 
050 0 |a K564.C6 
084 |a 320  |q DE-101  |2 sdnb 
245 0 0 |a Governing cyberspace  |b behavior, power, and diplomacy  |c edited by Dennis Broeders, Bibi van den Berg 
264 1 |a Lanham  |b Rowman & Littlefield  |c 2020 
264 2 |a London  |b Bloomsbury Publishing 
300 |a 1 Online-Ressource (vii, 327 Seiten)  |b Illustrationen 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a Digital technologies and global politics 
500 |a Literaturangaben 
500 |a Chapter 1: Governing Cyberspace: Behaviour, Power and Diplomacy (Dennis Broeders and Bibi van den Berg) Part I: International Legal and Diplomatic Approaches Chapter 2: International Law and International Cyber Norms: A Continuum? (Liisi Adamson) Chapter 3: Electoral Cyber Interference, Self-Determination and The Principle of Non-Intervention in Cyberspace (Nicholas Tsagourias) Chapter 4: Violations of Territorial Sovereignty in Cyberspace - an Intrusion-based Approach (Przemyslaw Roguski) Chapter 5: What Does Russia Want in Cyber Diplomacy? A Primer. (Xymena Kurowska) Chapter 6: China's Conception of Cyber Sovereignty: Rhetoric and Realization (Rogier Creemers) Part II: Power and Governance: International Organizations, States and Sub-state Actors Chapter 7: A Balance of Power in Cyberspace (Alexander Klimburg and Louk Faesen) Chapter 8: International Law in Cyber Space: Leveraging NATO's Multilateralism, Adaptation and Commitment to Cooperative Security (Steven Hill and Nadia Marsan) Chapter 9: Cybersecurity Norm-Building and Signaling with China (Geoffrey Joseph Hoffman) Chapter 10: Ambiguity and Appropriation: Cybersecurity and Cybercrime in Egypt and the Gulf (James Shires) Chapter 11: The Power of Norms Meets Normative Power: On the International Cyber Norm of Bulk Collection, the Normative Power of Intelligence Agencies and How These Meet (Ilina Georgieva) Part III: Multi-stakeholder and Corporate Diplomacy Chapter 12: Non-State Actors as Shapers of Customary Standards of Responsible Behaviour in Cyberspace (Jacqueline Eggenschwiler and Joanna Kulesza) Chapter 13: Big Tech Hits the Diplomatic Circuit: Norm Entrepreneurship, Policy Advocacy, and Microsoft's Cybersecurity Tech Accord (Robert Gorwa and Anton Peez) Chapter 14: Cyber-norms Entrepreneurship? Understanding Microsoft's Advocacy on Cybersecurity (Louise Marie Hurel and Luisa Cruz Lobato) 
520 |a Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary boundaries, this timely open access book brings together researchers in fields ranging from international law, international relations, and political science to business studies and philosophy to explore the theme of responsible state behavior in cyberspace. . Divided into three parts, Governing Cyberspace first looks at current debates in and about international law and diplomacy in cyberspace. How does international law regulate state behaviour and what are its limits? How do cyber superpowers like China and Russia shape their foreign policy in relation to cyberspace? The second focuses on power and governance. What is the role for international organisations like NATO or for substate actors like intelligence agencies? How do they adapt to the realities of cyberspace and digital conflict? How does the classic balance of power play out in cyberspace and how do different states position themselves? The third part takes a critical look at multistakeholder and corporate diplomacy. How do global tech companies shape their role as norm entrepreneurs in cyberspace, and how do their cyber diplomatic efforts relate to their corporate identity? The ebook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com. Open access was funded by Leiden University 
546 |a Barrierefreier Inhalt: Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily 
700 1 |a Broeders, Dennis  |d 1974-  |e Herausgeber  |4 edt  |0 (DE-603)225912139  |0 (DE-588)142016063  |2 gnd 
700 1 |a Berg, Bibi van den  |d 1975-  |e Herausgeber  |4 edt  |0 (DE-603)376428295  |0 (DE-588)1091588120  |2 gnd 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |t Governing Cyberspace: Behavior, Power and Diplomacy  |z 9781786614964  |z 9798881857301 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |t Governing Cyberspace: Behavior, Power and Diplomacy  |z 9781786614940  |z 9781786614957 
776 1 |z 9781786614940 
776 1 |z 9781786614957 
856 |u https://doi.org/10.5040/9798881810733  |x Resolving-System  |z kostenfrei 
856 |u https://www.bloomsburycollections.com/monograph?docid=b-9798881810733  |x Verlag 
912 |a ZDB-162-BCC 
924 1 |9 603  |a (DE-603)1307173063  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173071  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)130717308X  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173098  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173101  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)130717311X  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173128  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173136  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173144  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173152  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173160  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173179  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173187  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173195  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173209  |b DE-603  |c HES  |d d 
924 1 |9 603  |a (DE-603)1307173217  |b DE-603  |c HES  |d d