Governing cyberspace
Titel: | Governing cyberspace : behavior, power, and diplomacy / edited by Dennis Broeders, Bibi van den Berg |
---|---|
Beteiligt: | ; |
Veröffentlicht: | Lanham : Rowman & Littlefield, 2020 |
Umfang: | 1 Online-Ressource (vii, 327 Seiten) : Illustrationen |
Format: | E-Book |
Sprache: | Englisch |
Schriftenreihe/ mehrbändiges Werk: |
Digital technologies and global politics |
Andere Ausgaben: |
Erscheint auch als Online-Ausgabe: Governing Cyberspace: Behavior, Power and Diplomacy
Erscheint auch als Druck-Ausgabe: Governing Cyberspace: Behavior, Power and Diplomacy |
ISBN: | 9798881810733 ; 9798881857301 ; 9781786614964 ; 9781786614940 ; 9781786614957 |
alg: 53062784 001A $00026:16-06-25 001B $01999:17-06-25 $t00:25:07.000 001D $00026:16-06-25 001U $0utf8 001X $00 002@ $0Oau 002C $aText $btxt $2rdacontent 002D $aComputermedien $bc $2rdamedia 002E $aOnline-Ressource $bcr $2rdacarrier 003@ $0530627841 004A $A979-8-88181-073-3 $fonline 004A $A979-8-88185-730-1 $fpdf 004A $A978-1-78661-496-4 $fepub 004E/07 $0BP9798881810733BC $lBLOOM 004E/07 $011593488X $lDE-627-1 004O $A978-1-78661-494-0 $Sp $fhbk 004O $A978-1-78661-495-7 $Sp $fpbk 004P $010.5040/9798881810733 $S0 006C $01521936111 $aOCoLC 006L $01927380162 $2KXP 007A $011593488X $aKEP 007I $0bloom-10.5040/9798881810733 009Q $S0 $uhttps://doi.org/10.5040/9798881810733 $xR 009Q $uhttps://www.bloomsburycollections.com/monograph?docid=b-9798881810733 $xH 010@ $aeng 010E $erda 011@ $a2020 017B $aZDB-162-BCC 017B $aZDB-162-BLO 021A $aGoverning cyberspace $dbehavior, power, and diplomacy $hedited by Dennis Broeders, Bibi van den Berg 028C $BHerausgeber $#Broeders, Dionysius Wilhelmus Johannes $4edt $7142016063 $8Broeders, Dennis$Z1974- [Tp1] $9225912139 028C $BHerausgeber $#Den Berg, Bibi van $#Van den Berg, Bibi $#Berg, B. van den $4edt $71091588120 $8Berg, Bibi$cvan den$Z1975- [Tp3] $9376428295 033A $pLanham $nRowman & Littlefield 033E $pLondon $nBloomsbury Publishing 034D $a1 Online-Ressource (vii, 327 Seiten) 034M $aIllustrationen 036G $aDigital technologies and global politics 037A $aLiteraturangaben 037I $aNamensnennung - Nicht-kommerziell - Keine Bearbeitungen 4.0 International $2cc $uhttps://creativecommons.org/licenses/by-nc-nd/4.0/ $fCC BY-NC-ND 4.0 037J $aOpen Access $2star $fUnrestricted online access 039D $aErscheint auch als $tGoverning Cyberspace: Behavior, Power and Diplomacy $z978-1-78661-496-4 $z9798881857301 $nOnline-Ausgabe 039D $aErscheint auch als $tGoverning Cyberspace: Behavior, Power and Diplomacy $z978-1-78661-494-0 $z978-1-78661-495-7 $nDruck-Ausgabe 044A $aComputer networks $S#0 $xLaw and legislation $N650 044A $aCyberspace $S#0 $N650 044A $aInternet $S#0 $xLaw and legislation $N650 045A $aK564.C6 045E $c320 046L $aBarrierefreier Inhalt: Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily 046M $aChapter 1: Governing Cyberspace: Behaviour, Power and Diplomacy (Dennis Broeders and Bibi van den Berg) Part I: International Legal and Diplomatic Approaches Chapter 2: International Law and International Cyber Norms: A Continuum? (Liisi Adamson) Chapter 3: Electoral Cyber Interference, Self-Determination and The Principle of Non-Intervention in Cyberspace (Nicholas Tsagourias) Chapter 4: Violations of Territorial Sovereignty in Cyberspace - an Intrusion-based Approach (Przemyslaw Roguski) Chapter 5: What Does Russia Want in Cyber Diplomacy? A Primer. (Xymena Kurowska) Chapter 6: China's Conception of Cyber Sovereignty: Rhetoric and Realization (Rogier Creemers) Part II: Power and Governance: International Organizations, States and Sub-state Actors Chapter 7: A Balance of Power in Cyberspace (Alexander Klimburg and Louk Faesen) Chapter 8: International Law in Cyber Space: Leveraging NATO's Multilateralism, Adaptation and Commitment to Cooperative Security (Steven Hill and Nadia Marsan) Chapter 9: Cybersecurity Norm-Building and Signaling with China (Geoffrey Joseph Hoffman) Chapter 10: Ambiguity and Appropriation: Cybersecurity and Cybercrime in Egypt and the Gulf (James Shires) Chapter 11: The Power of Norms Meets Normative Power: On the International Cyber Norm of Bulk Collection, the Normative Power of Intelligence Agencies and How These Meet (Ilina Georgieva) Part III: Multi-stakeholder and Corporate Diplomacy Chapter 12: Non-State Actors as Shapers of Customary Standards of Responsible Behaviour in Cyberspace (Jacqueline Eggenschwiler and Joanna Kulesza) Chapter 13: Big Tech Hits the Diplomatic Circuit: Norm Entrepreneurship, Policy Advocacy, and Microsoft's Cybersecurity Tech Accord (Robert Gorwa and Anton Peez) Chapter 14: Cyber-norms Entrepreneurship? Understanding Microsoft's Advocacy on Cybersecurity (Louise Marie Hurel and Luisa Cruz Lobato) 047I $aCyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary boundaries, this timely open access book brings together researchers in fields ranging from international law, international relations, and political science to business studies and philosophy to explore the theme of responsible state behavior in cyberspace. . Divided into three parts, Governing Cyberspace first looks at current debates in and about international law and diplomacy in cyberspace. How does international law regulate state behaviour and what are its limits? How do cyber superpowers like China and Russia shape their foreign policy in relation to cyberspace? The second focuses on power and governance. What is the role for international organisations like NATO or for substate actors like intelligence agencies? How do they adapt to the realities of cyberspace and digital conflict? How does the classic balance of power play out in cyberspace and how do different states position themselves? The third part takes a critical look at multistakeholder and corporate diplomacy. How do global tech companies shape their role as norm entrepreneurs in cyberspace, and how do their cyber diplomatic efforts relate to their corporate identity? The ebook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com. Open access was funded by Leiden University lok: 53062784 3 exp: 53062784 3 1 #EPN 201B/01 $017-06-25 $t00:25:07.332 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173063 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 5 exp: 53062784 5 1 #EPN 201B/01 $017-06-25 $t00:25:07.335 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173071 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 8 exp: 53062784 8 1 #EPN 201B/01 $017-06-25 $t00:25:07.338 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $0130717308X 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 10 exp: 53062784 10 1 #EPN 201B/01 $017-06-25 $t00:25:07.340 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173098 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 11 exp: 53062784 11 1 #EPN 201B/01 $017-06-25 $t00:25:07.342 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173101 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 20 exp: 53062784 20 1 #EPN 201B/01 $017-06-25 $t00:25:07.345 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $0130717311X 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 21 exp: 53062784 21 1 #EPN 201B/01 $017-06-25 $t00:25:07.347 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173128 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 23 exp: 53062784 23 1 #EPN 201B/01 $017-06-25 $t00:25:07.350 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173136 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 24 exp: 53062784 24 1 #EPN 201B/01 $017-06-25 $t00:25:07.352 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173144 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 25 exp: 53062784 25 1 #EPN 201B/01 $017-06-25 $t00:25:07.354 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173152 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 36 exp: 53062784 36 1 #EPN 201B/01 $017-06-25 $t00:25:07.357 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173160 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 49 exp: 53062784 49 1 #EPN 201B/01 $017-06-25 $t00:25:07.359 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173179 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 54 exp: 53062784 54 1 #EPN 201B/01 $017-06-25 $t00:25:07.363 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173187 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 108 exp: 53062784 108 1 #EPN 201B/01 $017-06-25 $t00:25:07.365 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173195 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 204 exp: 53062784 204 1 #EPN 201B/01 $017-06-25 $t00:25:07.367 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173209 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl lok: 53062784 205 exp: 53062784 205 1 #EPN 201B/01 $017-06-25 $t00:25:07.370 201C/01 $016-06-25 201U/01 $0utf8 203@/01 $01307173217 204P/01 $010.5040/9798881810733 $S0 208@/01 $a16-06-25 $bl
LEADER | 00000cam a2200000 c 4500 | ||
---|---|---|---|
001 | 530627841 | ||
003 | DE-603 | ||
005 | 20250617002507.0 | ||
007 | cr|||||||||||| | ||
008 | 250616s2020 xx |||| o| u00||u|eng c | ||
020 | |a 9798881810733 |c online | ||
020 | |a 9798881857301 |c pdf | ||
020 | |a 9781786614964 |c epub | ||
024 | 7 | |a 10.5040/9798881810733 |2 doi | |
028 | 5 | 2 | |a BP9798881810733BC |
028 | 5 | 2 | |a 11593488X |
035 | |a (DE-599)KEP11593488X | ||
035 | |a (DE-627)1927380162 | ||
040 | |a DE-603 |b ger |c DE-603 |d DE-603 |e rda | ||
041 | |a eng | ||
050 | 0 | |a K564.C6 | |
084 | |a 320 |q DE-101 |2 sdnb | ||
245 | 0 | 0 | |a Governing cyberspace |b behavior, power, and diplomacy |c edited by Dennis Broeders, Bibi van den Berg |
264 | 1 | |a Lanham |b Rowman & Littlefield |c 2020 | |
264 | 2 | |a London |b Bloomsbury Publishing | |
300 | |a 1 Online-Ressource (vii, 327 Seiten) |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Digital technologies and global politics | |
500 | |a Literaturangaben | ||
500 | |a Chapter 1: Governing Cyberspace: Behaviour, Power and Diplomacy (Dennis Broeders and Bibi van den Berg) Part I: International Legal and Diplomatic Approaches Chapter 2: International Law and International Cyber Norms: A Continuum? (Liisi Adamson) Chapter 3: Electoral Cyber Interference, Self-Determination and The Principle of Non-Intervention in Cyberspace (Nicholas Tsagourias) Chapter 4: Violations of Territorial Sovereignty in Cyberspace - an Intrusion-based Approach (Przemyslaw Roguski) Chapter 5: What Does Russia Want in Cyber Diplomacy? A Primer. (Xymena Kurowska) Chapter 6: China's Conception of Cyber Sovereignty: Rhetoric and Realization (Rogier Creemers) Part II: Power and Governance: International Organizations, States and Sub-state Actors Chapter 7: A Balance of Power in Cyberspace (Alexander Klimburg and Louk Faesen) Chapter 8: International Law in Cyber Space: Leveraging NATO's Multilateralism, Adaptation and Commitment to Cooperative Security (Steven Hill and Nadia Marsan) Chapter 9: Cybersecurity Norm-Building and Signaling with China (Geoffrey Joseph Hoffman) Chapter 10: Ambiguity and Appropriation: Cybersecurity and Cybercrime in Egypt and the Gulf (James Shires) Chapter 11: The Power of Norms Meets Normative Power: On the International Cyber Norm of Bulk Collection, the Normative Power of Intelligence Agencies and How These Meet (Ilina Georgieva) Part III: Multi-stakeholder and Corporate Diplomacy Chapter 12: Non-State Actors as Shapers of Customary Standards of Responsible Behaviour in Cyberspace (Jacqueline Eggenschwiler and Joanna Kulesza) Chapter 13: Big Tech Hits the Diplomatic Circuit: Norm Entrepreneurship, Policy Advocacy, and Microsoft's Cybersecurity Tech Accord (Robert Gorwa and Anton Peez) Chapter 14: Cyber-norms Entrepreneurship? Understanding Microsoft's Advocacy on Cybersecurity (Louise Marie Hurel and Luisa Cruz Lobato) | ||
520 | |a Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary boundaries, this timely open access book brings together researchers in fields ranging from international law, international relations, and political science to business studies and philosophy to explore the theme of responsible state behavior in cyberspace. . Divided into three parts, Governing Cyberspace first looks at current debates in and about international law and diplomacy in cyberspace. How does international law regulate state behaviour and what are its limits? How do cyber superpowers like China and Russia shape their foreign policy in relation to cyberspace? The second focuses on power and governance. What is the role for international organisations like NATO or for substate actors like intelligence agencies? How do they adapt to the realities of cyberspace and digital conflict? How does the classic balance of power play out in cyberspace and how do different states position themselves? The third part takes a critical look at multistakeholder and corporate diplomacy. How do global tech companies shape their role as norm entrepreneurs in cyberspace, and how do their cyber diplomatic efforts relate to their corporate identity? The ebook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com. Open access was funded by Leiden University | ||
546 | |a Barrierefreier Inhalt: Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily | ||
700 | 1 | |a Broeders, Dennis |d 1974- |e Herausgeber |4 edt |0 (DE-603)225912139 |0 (DE-588)142016063 |2 gnd | |
700 | 1 | |a Berg, Bibi van den |d 1975- |e Herausgeber |4 edt |0 (DE-603)376428295 |0 (DE-588)1091588120 |2 gnd | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Governing Cyberspace: Behavior, Power and Diplomacy |z 9781786614964 |z 9798881857301 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Governing Cyberspace: Behavior, Power and Diplomacy |z 9781786614940 |z 9781786614957 |
776 | 1 | |z 9781786614940 | |
776 | 1 | |z 9781786614957 | |
856 | |u https://doi.org/10.5040/9798881810733 |x Resolving-System |z kostenfrei | ||
856 | |u https://www.bloomsburycollections.com/monograph?docid=b-9798881810733 |x Verlag | ||
912 | |a ZDB-162-BCC | ||
924 | 1 | |9 603 |a (DE-603)1307173063 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173071 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)130717308X |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173098 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173101 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)130717311X |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173128 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173136 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173144 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173152 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173160 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173179 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173187 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173195 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173209 |b DE-603 |c HES |d d | |
924 | 1 | |9 603 |a (DE-603)1307173217 |b DE-603 |c HES |d d |