Pierre Cardaliaguet, François Delarue, Jean-Michel Lasry, and Pierre-Louis Lions
- Published in print:
- 2019
- Published Online:
- May 2020
- ISBN:
- 9780691190716
- eISBN:
- 9780691193717
- Item type:
- book
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691190716.001.0001
- Subject:
- Mathematics, Applied Mathematics
This book describes the latest advances in the theory of mean field games, which are optimal control problems with a continuum of players, each of them interacting with the whole statistical ...
More
This book describes the latest advances in the theory of mean field games, which are optimal control problems with a continuum of players, each of them interacting with the whole statistical distribution of a population. While it originated in economics, this theory now has applications in areas as diverse as mathematical finance, crowd phenomena, epidemiology, and cybersecurity. Because mean field games concern the interactions of infinitely many players in an optimal control framework, one expects them to appear as the limit for Nash equilibria of differential games with finitely many players as the number of players tends to infinity. The book rigorously establishes this convergence, which has been an open problem until now. The limit of the system associated with differential games with finitely many players is described by the so-called master equation, a nonlocal transport equation in the space of measures. After defining a suitable notion of differentiability in the space of measures, the authors provide a complete self-contained analysis of the master equation. Their analysis includes the case of common noise problems in which all the players are affected by a common Brownian motion. They then go on to explain how to use the master equation to prove the mean field limit. The book presents two important new results in mean field games that contribute to a unified theoretical framework for this exciting and fast-developing area of mathematics.Less
This book describes the latest advances in the theory of mean field games, which are optimal control problems with a continuum of players, each of them interacting with the whole statistical distribution of a population. While it originated in economics, this theory now has applications in areas as diverse as mathematical finance, crowd phenomena, epidemiology, and cybersecurity. Because mean field games concern the interactions of infinitely many players in an optimal control framework, one expects them to appear as the limit for Nash equilibria of differential games with finitely many players as the number of players tends to infinity. The book rigorously establishes this convergence, which has been an open problem until now. The limit of the system associated with differential games with finitely many players is described by the so-called master equation, a nonlocal transport equation in the space of measures. After defining a suitable notion of differentiability in the space of measures, the authors provide a complete self-contained analysis of the master equation. Their analysis includes the case of common noise problems in which all the players are affected by a common Brownian motion. They then go on to explain how to use the master equation to prove the mean field limit. The book presents two important new results in mean field games that contribute to a unified theoretical framework for this exciting and fast-developing area of mathematics.
Laura DeNardis
- Published in print:
- 2020
- Published Online:
- May 2020
- ISBN:
- 9780300233070
- eISBN:
- 9780300249330
- Item type:
- chapter
- Publisher:
- Yale University Press
- DOI:
- 10.12987/yale/9780300233070.003.0004
- Subject:
- Political Science, Public Policy
This chapter explains how cybersecurity increasingly connects to consumer safety and critical industrial infrastructure, as well as the digital economy and systems of democracy. Thus, the stakes of ...
More
This chapter explains how cybersecurity increasingly connects to consumer safety and critical industrial infrastructure, as well as the digital economy and systems of democracy. Thus, the stakes of cyber-physical security have never been higher. From attacks on the energy sector to the attacks on the consumer Internet of things and democracy, cybersecurity governance is an existential concern in society. Regrettably, security is woefully inadequate. Market incentives privilege rapid product introduction rather than strong security. The chapter then suggests baseline recommendations, across all stakeholders, necessary for improving the cyber-physical ecosystem. It also looks at how cyber-physical systems complicate and increasingly shape already-difficult global cybersecurity governance questions such as when governments choose to stockpile knowledge of software vulnerabilities for cyber offense, rather than disclose them to secure critical infrastructure.Less
This chapter explains how cybersecurity increasingly connects to consumer safety and critical industrial infrastructure, as well as the digital economy and systems of democracy. Thus, the stakes of cyber-physical security have never been higher. From attacks on the energy sector to the attacks on the consumer Internet of things and democracy, cybersecurity governance is an existential concern in society. Regrettably, security is woefully inadequate. Market incentives privilege rapid product introduction rather than strong security. The chapter then suggests baseline recommendations, across all stakeholders, necessary for improving the cyber-physical ecosystem. It also looks at how cyber-physical systems complicate and increasingly shape already-difficult global cybersecurity governance questions such as when governments choose to stockpile knowledge of software vulnerabilities for cyber offense, rather than disclose them to secure critical infrastructure.
Marjory S. Blumenthal
- Published in print:
- 2015
- Published Online:
- May 2016
- ISBN:
- 9780262029407
- eISBN:
- 9780262331166
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029407.003.0002
- Subject:
- Computer Science, Programming Languages
The growing importance of cloud computing has heightened the importance of cloud security. At the same time, the Snowden revelations and the accompanying calls for localization have made cloud policy ...
More
The growing importance of cloud computing has heightened the importance of cloud security. At the same time, the Snowden revelations and the accompanying calls for localization have made cloud policy debates increasingly international in scope. Unfortunately, cloud providers lack strong incentives to enhance security, have been reluctant to partner with government to develop solutions, and are concerned that being classified as critical infrastructure will subject them to heightened regulatory burdens. Although regulatory efforts to date have focused on voluntarism in order to preserve incentives for innovation, government oversight of the cloud has become increasingly regulatory in nature, focusing largely on risk management. The growing social importance of the cloud is placing pressure on cloud providers to accede to vulnerability assessments and reporting despite their ambivalence about government involvement in cybersecurity and critical infrastructure protection.Less
The growing importance of cloud computing has heightened the importance of cloud security. At the same time, the Snowden revelations and the accompanying calls for localization have made cloud policy debates increasingly international in scope. Unfortunately, cloud providers lack strong incentives to enhance security, have been reluctant to partner with government to develop solutions, and are concerned that being classified as critical infrastructure will subject them to heightened regulatory burdens. Although regulatory efforts to date have focused on voluntarism in order to preserve incentives for innovation, government oversight of the cloud has become increasingly regulatory in nature, focusing largely on risk management. The growing social importance of the cloud is placing pressure on cloud providers to accede to vulnerability assessments and reporting despite their ambivalence about government involvement in cybersecurity and critical infrastructure protection.
Tung-Hui Hu
- Published in print:
- 2015
- Published Online:
- May 2016
- ISBN:
- 9780262029513
- eISBN:
- 9780262330091
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029513.003.0003
- Subject:
- Computer Science, Programming Languages
This chapter traces the cloud of digital data back to the data centers that store them. For security reasons, a number of data centers are repurposed Cold War military bunkers, suggesting that a ...
More
This chapter traces the cloud of digital data back to the data centers that store them. For security reasons, a number of data centers are repurposed Cold War military bunkers, suggesting that a military rationale for a bunker, to defend an area of territory, has re-entered the realm of data. By dividing networks into logical zones of inside and outside, these security infrastructures raise the specter of attack from those that might be ‘outside’ to network society, such as Chinese hackers or Iranian cyberwarfare specialists. By revisiting Paul Virilio’s Bunker Archaeology, this chapter further suggests that the specter of a disaster that the cloud continually raises also carries within it a temporality of a user’s imagined death. This temporality animates a recent series of digital preservation projects, such as the ‘Digital Genome’ time capsule, intended to survive the “death of the digital.”Less
This chapter traces the cloud of digital data back to the data centers that store them. For security reasons, a number of data centers are repurposed Cold War military bunkers, suggesting that a military rationale for a bunker, to defend an area of territory, has re-entered the realm of data. By dividing networks into logical zones of inside and outside, these security infrastructures raise the specter of attack from those that might be ‘outside’ to network society, such as Chinese hackers or Iranian cyberwarfare specialists. By revisiting Paul Virilio’s Bunker Archaeology, this chapter further suggests that the specter of a disaster that the cloud continually raises also carries within it a temporality of a user’s imagined death. This temporality animates a recent series of digital preservation projects, such as the ‘Digital Genome’ time capsule, intended to survive the “death of the digital.”
Yossi Sheffi
- Published in print:
- 2015
- Published Online:
- May 2016
- ISBN:
- 9780262029797
- eISBN:
- 9780262330626
- Item type:
- book
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029797.001.0001
- Subject:
- Economics and Finance, Financial Economics
This book focuses on deep-tier risks, corporate social responsibility risks, cybersecurity risks, global raw material risks, long-term disruptions, business continuity planning, risk and disruption ...
More
This book focuses on deep-tier risks, corporate social responsibility risks, cybersecurity risks, global raw material risks, long-term disruptions, business continuity planning, risk and disruption detection, and the potential for systemic disruptions. The interconnectedness of the global economy today means that unexpected events in one corner of the globe can ripple through the world’s supply chain and affect customers everywhere. For example, an earthquake and tsunami in Japan brought manufacturing around the globe to a standstill. State-of-the-art passenger jets are grounded because of a malfunctioning part. A strike halts shipments through a major port. A new digital device decimates the sales of other brands and sends established firms to the brink of bankruptcy. This book shows why modern vulnerabilities call for innovative processes and tools for creating and embedding corporate resilience and risk management. Through case studies, the book illustrates how companies have prepared for, coped with, and come out stronger following disruption—from the actions of Intel after the 2011 Japanese tsunami to the disruption in the “money supply chain” caused by the 2008 financial crisis. Supply chain risk management, the book reveals, is a balancing act between taking on the risks involved in new products, new markets, and new processes—all crucial for growth—and the resilience created by advanced risk management.Less
This book focuses on deep-tier risks, corporate social responsibility risks, cybersecurity risks, global raw material risks, long-term disruptions, business continuity planning, risk and disruption detection, and the potential for systemic disruptions. The interconnectedness of the global economy today means that unexpected events in one corner of the globe can ripple through the world’s supply chain and affect customers everywhere. For example, an earthquake and tsunami in Japan brought manufacturing around the globe to a standstill. State-of-the-art passenger jets are grounded because of a malfunctioning part. A strike halts shipments through a major port. A new digital device decimates the sales of other brands and sends established firms to the brink of bankruptcy. This book shows why modern vulnerabilities call for innovative processes and tools for creating and embedding corporate resilience and risk management. Through case studies, the book illustrates how companies have prepared for, coped with, and come out stronger following disruption—from the actions of Intel after the 2011 Japanese tsunami to the disruption in the “money supply chain” caused by the 2008 financial crisis. Supply chain risk management, the book reveals, is a balancing act between taking on the risks involved in new products, new markets, and new processes—all crucial for growth—and the resilience created by advanced risk management.
Mark Raymond
- Published in print:
- 2019
- Published Online:
- March 2019
- ISBN:
- 9780190913113
- eISBN:
- 9780190913144
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190913113.001.0001
- Subject:
- Political Science, International Relations and Politics, Political Theory
Social Practices of Rule-Making in World Politics identifies a class of social practices of rule-making, interpretation, and application, demonstrating the causal importance of these practices (and ...
More
Social Practices of Rule-Making in World Politics identifies a class of social practices of rule-making, interpretation, and application, demonstrating the causal importance of these practices (and the procedural rules that constitute and govern them) in explaining outcomes in world politics. The book utilizes rule-oriented and practice-turn constructivist approaches to argue that procedural rules about rule-making, or secondary rules, shape the way that actors present and evaluate proposals for change in the rules and institutions that structure international systems. The book examines four important international security cases: the social construction of great power management after the Napoleonic Wars; the creation of a rule against the use of force, except in cases of self-defense and collective security, enshrined in the Kellogg-Briand Pact; contestation of the international system by al-Qaeda in the period immediately following the 9/11 attacks; and United Nations efforts to establish norms for state conduct in the cyber domain. The book makes several contributions to International Relations theory. It provides insight into how actors know how and when to engage in specific forms of social construction. It extends the application of practice-turn constructivism to processes of making and interpreting rules. It improves upon existing tools to explain change in the rules and institutions of the international system. Finally, it demonstrates the utility of the book’s approach for the study of global governance, the international system, and for emerging efforts to identify forms and sites of authority and hierarchy in world politics.Less
Social Practices of Rule-Making in World Politics identifies a class of social practices of rule-making, interpretation, and application, demonstrating the causal importance of these practices (and the procedural rules that constitute and govern them) in explaining outcomes in world politics. The book utilizes rule-oriented and practice-turn constructivist approaches to argue that procedural rules about rule-making, or secondary rules, shape the way that actors present and evaluate proposals for change in the rules and institutions that structure international systems. The book examines four important international security cases: the social construction of great power management after the Napoleonic Wars; the creation of a rule against the use of force, except in cases of self-defense and collective security, enshrined in the Kellogg-Briand Pact; contestation of the international system by al-Qaeda in the period immediately following the 9/11 attacks; and United Nations efforts to establish norms for state conduct in the cyber domain. The book makes several contributions to International Relations theory. It provides insight into how actors know how and when to engage in specific forms of social construction. It extends the application of practice-turn constructivism to processes of making and interpreting rules. It improves upon existing tools to explain change in the rules and institutions of the international system. Finally, it demonstrates the utility of the book’s approach for the study of global governance, the international system, and for emerging efforts to identify forms and sites of authority and hierarchy in world politics.
Ben Buchanan
- Published in print:
- 2017
- Published Online:
- June 2017
- ISBN:
- 9780190665012
- eISBN:
- 9780190686543
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780190665012.001.0001
- Subject:
- Political Science, Security Studies
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on ...
More
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the “security dilemma”. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.Less
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the “security dilemma”. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.
Shawn M. Powers and Michael Jablonski
- Published in print:
- 2015
- Published Online:
- April 2017
- ISBN:
- 9780252039126
- eISBN:
- 9780252097102
- Item type:
- book
- Publisher:
- University of Illinois Press
- DOI:
- 10.5406/illinois/9780252039126.001.0001
- Subject:
- Society and Culture, Technology and Society
Contemporary discussion surrounding the role of the Internet in society is dominated by words like: internet freedom, surveillance, cybersecurity, Edward Snowden and, most prolifically, cyber war. ...
More
Contemporary discussion surrounding the role of the Internet in society is dominated by words like: internet freedom, surveillance, cybersecurity, Edward Snowden and, most prolifically, cyber war. Behind the rhetoric of cyber war is an on-going state-centered battle for control of information resources. This book conceptualizes this real cyber war as the utilization of digital networks for geopolitical purposes, including covert attacks against another state's electronic systems, but also, and more importantly, the variety of ways the internet is used to further a state's economic and military agendas. Moving beyond debates on the democratic value of new and emerging information technologies, the book focuses on political, economic, and geopolitical factors driving internet freedom policies, in particular the U.S. State Department's emerging doctrine in support of a universal freedom to connect. It argues that efforts to create a universal internet built upon Western legal, political, and social preferences is driven by economic and geopolitical motivations rather than the humanitarian and democratic ideals that typically accompany related policy discourse. In fact, the freedom-to-connect movement is intertwined with broader efforts to structure global society in ways that favor American and Western cultures, economies, and governments. The book reveals how internet policies and governance have emerged as critical sites of geopolitical contestation, with results certain to shape statecraft, diplomacy, and conflict in the twenty-first century.Less
Contemporary discussion surrounding the role of the Internet in society is dominated by words like: internet freedom, surveillance, cybersecurity, Edward Snowden and, most prolifically, cyber war. Behind the rhetoric of cyber war is an on-going state-centered battle for control of information resources. This book conceptualizes this real cyber war as the utilization of digital networks for geopolitical purposes, including covert attacks against another state's electronic systems, but also, and more importantly, the variety of ways the internet is used to further a state's economic and military agendas. Moving beyond debates on the democratic value of new and emerging information technologies, the book focuses on political, economic, and geopolitical factors driving internet freedom policies, in particular the U.S. State Department's emerging doctrine in support of a universal freedom to connect. It argues that efforts to create a universal internet built upon Western legal, political, and social preferences is driven by economic and geopolitical motivations rather than the humanitarian and democratic ideals that typically accompany related policy discourse. In fact, the freedom-to-connect movement is intertwined with broader efforts to structure global society in ways that favor American and Western cultures, economies, and governments. The book reveals how internet policies and governance have emerged as critical sites of geopolitical contestation, with results certain to shape statecraft, diplomacy, and conflict in the twenty-first century.
Laura DeNardis
- Published in print:
- 2020
- Published Online:
- May 2020
- ISBN:
- 9780300233070
- eISBN:
- 9780300249330
- Item type:
- chapter
- Publisher:
- Yale University Press
- DOI:
- 10.12987/yale/9780300233070.003.0008
- Subject:
- Political Science, Public Policy
This concluding chapter argues that privacy and security have to take primacy as aspirational values as networks shift from digital only to directly embedded in the physical world. It calls for ...
More
This concluding chapter argues that privacy and security have to take primacy as aspirational values as networks shift from digital only to directly embedded in the physical world. It calls for various stakeholders to urgently take serious cyber-physical policy choices and collectively elevate cybersecurity as a generational imperative necessary for human security, economic security, and national security. For example, a long-standing Internet policy tradition, while varying by region, is immunity from liability for information intermediaries. What counts as an intermediary in cyber-physical architectures and how should risk, accountability, and liability be reconceptualized in the high-risk era? Ultimately, the chapter contends that policy attention needs to shift from digital content to digital infrastructure.Less
This concluding chapter argues that privacy and security have to take primacy as aspirational values as networks shift from digital only to directly embedded in the physical world. It calls for various stakeholders to urgently take serious cyber-physical policy choices and collectively elevate cybersecurity as a generational imperative necessary for human security, economic security, and national security. For example, a long-standing Internet policy tradition, while varying by region, is immunity from liability for information intermediaries. What counts as an intermediary in cyber-physical architectures and how should risk, accountability, and liability be reconceptualized in the high-risk era? Ultimately, the chapter contends that policy attention needs to shift from digital content to digital infrastructure.
Corinne May-Chahal and Emma Kelly
- Published in print:
- 2020
- Published Online:
- September 2020
- ISBN:
- 9781447354505
- eISBN:
- 9781447354512
- Item type:
- chapter
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781447354505.003.0006
- Subject:
- Social Work, Children and Families
This concluding chapter calls for greater clarity and agreement on definitions and measurement practices concerning online child sexual victimisation (OCSV). First, there is a need for agreed ...
More
This concluding chapter calls for greater clarity and agreement on definitions and measurement practices concerning online child sexual victimisation (OCSV). First, there is a need for agreed definitions of OCSV that distinguish between normative childhood sexuality and sexual violence, both on- and offline. Second, research, policy, and practices must reflect that the child is only one element that requires protection. Taking a cybersecurity asset approach, the chapter emphasises the need for coordinated action to enhance and protect social goods, such as trust in technology, law enforcement resources, and fundamental rights. Finally, it recommends that guardianship responsibility is extended to children themselves and considers some of the technical tools that might assist their participation.Less
This concluding chapter calls for greater clarity and agreement on definitions and measurement practices concerning online child sexual victimisation (OCSV). First, there is a need for agreed definitions of OCSV that distinguish between normative childhood sexuality and sexual violence, both on- and offline. Second, research, policy, and practices must reflect that the child is only one element that requires protection. Taking a cybersecurity asset approach, the chapter emphasises the need for coordinated action to enhance and protect social goods, such as trust in technology, law enforcement resources, and fundamental rights. Finally, it recommends that guardianship responsibility is extended to children themselves and considers some of the technical tools that might assist their participation.
Mireille Hildebrandt
- Published in print:
- 2020
- Published Online:
- July 2020
- ISBN:
- 9780198860877
- eISBN:
- 9780191892936
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198860877.003.0006
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter explores the legal framework regarding cybercrime, with a focus on Europe. In the case of cybercrime, competent authorities face a moving target, as technological developments, both on ...
More
This chapter explores the legal framework regarding cybercrime, with a focus on Europe. In the case of cybercrime, competent authorities face a moving target, as technological developments, both on the side of perpetrators and on the side of policing and forensics, often outwit prevalent and tested strategies against traditional crime. This chapter first raises the question of what makes cybercrime ‘cyber’, and then introduces the international and supranational legal frameworks that are meant to cope with cybercrime, with a focus on the Cybercrime Convention. Finally, the chapter offers a reflection on the image of the weighing scale where it comes to balancing safety and security against rights and freedoms.Less
This chapter explores the legal framework regarding cybercrime, with a focus on Europe. In the case of cybercrime, competent authorities face a moving target, as technological developments, both on the side of perpetrators and on the side of policing and forensics, often outwit prevalent and tested strategies against traditional crime. This chapter first raises the question of what makes cybercrime ‘cyber’, and then introduces the international and supranational legal frameworks that are meant to cope with cybercrime, with a focus on the Cybercrime Convention. Finally, the chapter offers a reflection on the image of the weighing scale where it comes to balancing safety and security against rights and freedoms.
Fred H. Cate
- Published in print:
- 2015
- Published Online:
- April 2015
- ISBN:
- 9780190201265
- eISBN:
- 9780190201302
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780190201265.003.0012
- Subject:
- Economics and Finance, International
The risks posed by cyberthreats are rapidly escalating as our dependence on stored digital data and digital networks expands. Cyberattacks identified as originating in China, and in some cases ...
More
The risks posed by cyberthreats are rapidly escalating as our dependence on stored digital data and digital networks expands. Cyberattacks identified as originating in China, and in some cases alleged to have been launched by the Chinese government itself, are playing an increasingly influential role in motivating policy responses in the United States. Meanwhile, disclosures about US behavior have significantly weakened US credibility. This chapter examines some of the key characteristics of digital data and networked control systems, as well as of the cybersecurity threats that target them; the US regulatory and policy approach to defending against cyberattacks; and the role of China in influencing that approach. It concludes by addressing some critical but unresolved issues about the essential role of law and policy and of the relationship between the United States and China in the fight to secure data and networks.Less
The risks posed by cyberthreats are rapidly escalating as our dependence on stored digital data and digital networks expands. Cyberattacks identified as originating in China, and in some cases alleged to have been launched by the Chinese government itself, are playing an increasingly influential role in motivating policy responses in the United States. Meanwhile, disclosures about US behavior have significantly weakened US credibility. This chapter examines some of the key characteristics of digital data and networked control systems, as well as of the cybersecurity threats that target them; the US regulatory and policy approach to defending against cyberattacks; and the role of China in influencing that approach. It concludes by addressing some critical but unresolved issues about the essential role of law and policy and of the relationship between the United States and China in the fight to secure data and networks.
Laura DeNardis
- Published in print:
- 2014
- Published Online:
- May 2014
- ISBN:
- 9780300181357
- eISBN:
- 9780300182118
- Item type:
- book
- Publisher:
- Yale University Press
- DOI:
- 10.12987/yale/9780300181357.001.0001
- Subject:
- Political Science, International Relations and Politics
The Internet has transformed the manner in which information is exchanged and business is conducted, arguably more than any other communication development in the past century. Despite its wide reach ...
More
The Internet has transformed the manner in which information is exchanged and business is conducted, arguably more than any other communication development in the past century. Despite its wide reach and powerful global influence, it is a medium uncontrolled by any one centralized system, organization, or governing body, a reality that has given rise to all manner of free-speech issues and cybersecurity concerns. The conflicts surrounding Internet governance are the new spaces where political and economic power is unfolding in the twenty-first century. This book reveals the inner power structure already in place within the architectures and institutions of Internet governance. It provides a theoretical framework for Internet governance that takes into account the privatization of global power as well as the role of sovereign nations and international treaties. In addition, the book explores what is at stake in open global controversies and stresses the responsibility of the public to actively engage in these debates, because Internet governance will ultimately determine Internet freedom.Less
The Internet has transformed the manner in which information is exchanged and business is conducted, arguably more than any other communication development in the past century. Despite its wide reach and powerful global influence, it is a medium uncontrolled by any one centralized system, organization, or governing body, a reality that has given rise to all manner of free-speech issues and cybersecurity concerns. The conflicts surrounding Internet governance are the new spaces where political and economic power is unfolding in the twenty-first century. This book reveals the inner power structure already in place within the architectures and institutions of Internet governance. It provides a theoretical framework for Internet governance that takes into account the privatization of global power as well as the role of sovereign nations and international treaties. In addition, the book explores what is at stake in open global controversies and stresses the responsibility of the public to actively engage in these debates, because Internet governance will ultimately determine Internet freedom.
Jon R. Lindsay
- Published in print:
- 2015
- Published Online:
- April 2015
- ISBN:
- 9780190201265
- eISBN:
- 9780190201302
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780190201265.003.0001
- Subject:
- Economics and Finance, International
This introduction provides an overview of Chinese national policy and institutions for managing cybersecurity. It then summarizes the organization of this volume and the content of its chapters. ...
More
This introduction provides an overview of Chinese national policy and institutions for managing cybersecurity. It then summarizes the organization of this volume and the content of its chapters. Cybersecurity is shaped by the strategic interaction of many different actors and defies any simple interpretation or morality tale. There is no one single Chinese view on cybersecurity or cyberwarfare, just as there is no one Western view. While the details of cyber policy debate are sure to change, the important structural and cultural influences change more slowly. The contributions in this volume describe how some of these enduring factors affect cybersecurity institutions and recent activity in China, or how more fundamental political and economic incentives shape the use of technology of any vintage.Less
This introduction provides an overview of Chinese national policy and institutions for managing cybersecurity. It then summarizes the organization of this volume and the content of its chapters. Cybersecurity is shaped by the strategic interaction of many different actors and defies any simple interpretation or morality tale. There is no one single Chinese view on cybersecurity or cyberwarfare, just as there is no one Western view. While the details of cyber policy debate are sure to change, the important structural and cultural influences change more slowly. The contributions in this volume describe how some of these enduring factors affect cybersecurity institutions and recent activity in China, or how more fundamental political and economic incentives shape the use of technology of any vintage.
Mark Raymond
- Published in print:
- 2019
- Published Online:
- March 2019
- ISBN:
- 9780190913113
- eISBN:
- 9780190913144
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190913113.003.0006
- Subject:
- Political Science, International Relations and Politics, Political Theory
This chapter explains the puzzling 2013 agreement of the UN Group of Governmental Experts (GGE) on cybersecurity that existing international law applies to state military use of information and ...
More
This chapter explains the puzzling 2013 agreement of the UN Group of Governmental Experts (GGE) on cybersecurity that existing international law applies to state military use of information and communication technologies (ICTs), and the 2015 GGE report that extended the consensus reached in 2013. These important developments in the emergence of rules and norms for cyberspace took place despite deteriorating relations between the United States and Russia. They also took place despite increasing global contention over Internet governance and cybersecurity issues more broadly, and occurred with less controversy than related (but lower-priority) Internet governance issues. The chapter argues that the 2013 and 2015 GGE reports were reached in large part as a result of a conscious process of rule-making and interpretation structured by agreed-upon secondary rules, and that the timing of the agreements reflected emerging consensus among participants despite remaining divergence on substantive preferences about governance arrangements for cyberspace.Less
This chapter explains the puzzling 2013 agreement of the UN Group of Governmental Experts (GGE) on cybersecurity that existing international law applies to state military use of information and communication technologies (ICTs), and the 2015 GGE report that extended the consensus reached in 2013. These important developments in the emergence of rules and norms for cyberspace took place despite deteriorating relations between the United States and Russia. They also took place despite increasing global contention over Internet governance and cybersecurity issues more broadly, and occurred with less controversy than related (but lower-priority) Internet governance issues. The chapter argues that the 2013 and 2015 GGE reports were reached in large part as a result of a conscious process of rule-making and interpretation structured by agreed-upon secondary rules, and that the timing of the agreements reflected emerging consensus among participants despite remaining divergence on substantive preferences about governance arrangements for cyberspace.
Milton L. Mueller
- Published in print:
- 2010
- Published Online:
- August 2013
- ISBN:
- 9780262014595
- eISBN:
- 9780262289665
- Item type:
- book
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262014595.001.0001
- Subject:
- Society and Culture, Technology and Society
When the prevailing governing system divides the planet into mutually exclusive territorial monopolies of force, which institutions can govern the Internet, with its transnational scope, boundless ...
More
When the prevailing governing system divides the planet into mutually exclusive territorial monopolies of force, which institutions can govern the Internet, with its transnational scope, boundless scale, and distributed control? Given filtering/censorship by states and concerns over national cybersecurity, it is often assumed that the Internet will inevitably be subordinated to the traditional system of nation-states. This book counters this view, showing how Internet governance poses novel and fascinating governance issues that give rise to global politics and new transnational institutions. Drawing on the theories of networked governance, it provides a broad overview of Internet governance from the formation of ICANN to the clash at the World Summit on the Information Society (WSIS), the formation of the Internet Governance Forum, the global assault on peer-to-peer file sharing, and the rise of national-level Internet control and security concerns. Internet governance has become a source of conflict in international relations. This book explores the role that emerging transnational institutions could play in fostering the global governance of the communication-information policy.Less
When the prevailing governing system divides the planet into mutually exclusive territorial monopolies of force, which institutions can govern the Internet, with its transnational scope, boundless scale, and distributed control? Given filtering/censorship by states and concerns over national cybersecurity, it is often assumed that the Internet will inevitably be subordinated to the traditional system of nation-states. This book counters this view, showing how Internet governance poses novel and fascinating governance issues that give rise to global politics and new transnational institutions. Drawing on the theories of networked governance, it provides a broad overview of Internet governance from the formation of ICANN to the clash at the World Summit on the Information Society (WSIS), the formation of the Internet Governance Forum, the global assault on peer-to-peer file sharing, and the rise of national-level Internet control and security concerns. Internet governance has become a source of conflict in international relations. This book explores the role that emerging transnational institutions could play in fostering the global governance of the communication-information policy.
William J. Drake
- Published in print:
- 2008
- Published Online:
- August 2013
- ISBN:
- 9780262042512
- eISBN:
- 9780262271936
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262042512.003.0009
- Subject:
- Information Science, Communications
This book explores the global governance, particularly by intergovernmental institutions, of global electronic networks and related information and communications technology (ICT). It looks at the ...
More
This book explores the global governance, particularly by intergovernmental institutions, of global electronic networks and related information and communications technology (ICT). It looks at the politics underlying global rules and regulations as well as questions of power and social purpose in network or ICT global governance. It also examines governance “from above” while also emphasizing how global governance looks “from below,” particularly from the perspectives of the developing countries and civil society groups advocating public interest objectives. This chapter serves as an introduction to the discussions that follow. It provides an overview of governance mechanisms pertaining to the information, communication, and commerce distributed over electronic networks, including the frameworks for intellectual property, cybersecurity, privacy protection, and electronic commerce. It also outlines the history of network global governance from 1850 to the present and discusses some of the major global governance mechanisms relating to network infrastructure and related transport services.Less
This book explores the global governance, particularly by intergovernmental institutions, of global electronic networks and related information and communications technology (ICT). It looks at the politics underlying global rules and regulations as well as questions of power and social purpose in network or ICT global governance. It also examines governance “from above” while also emphasizing how global governance looks “from below,” particularly from the perspectives of the developing countries and civil society groups advocating public interest objectives. This chapter serves as an introduction to the discussions that follow. It provides an overview of governance mechanisms pertaining to the information, communication, and commerce distributed over electronic networks, including the frameworks for intellectual property, cybersecurity, privacy protection, and electronic commerce. It also outlines the history of network global governance from 1850 to the present and discusses some of the major global governance mechanisms relating to network infrastructure and related transport services.
Ian Hosein
- Published in print:
- 2008
- Published Online:
- August 2013
- ISBN:
- 9780262042512
- eISBN:
- 9780262271936
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262042512.003.0253
- Subject:
- Information Science, Communications
This chapter examines international cooperation with respect to cybersecurity and cybercrime and argues that the approaches used by the Group of Eight (G8) and the Council of Europe (CoE) raise ...
More
This chapter examines international cooperation with respect to cybersecurity and cybercrime and argues that the approaches used by the Group of Eight (G8) and the Council of Europe (CoE) raise significant problems regarding privacy and other key values. Moreover, the efforts of both international bodies amount to policy laundering because they circumvent national democratic discourses in favor of comparatively closed international decision-making processes. The solutions offered by the G8 and the CoE may have implications for the interaction between technology and law, on one hand, and between national discourse and international policy making, on the other hand. The chapter outlines strategies for reinserting deliberative democracy into these processes. After discussing the challenges of jurisdiction and national technology policy, it looks at the logic of conventions and the G8’s work on data preservation and data retention, the CoE’s initiatives related to procedural law, and search and seizure of stored computer data.Less
This chapter examines international cooperation with respect to cybersecurity and cybercrime and argues that the approaches used by the Group of Eight (G8) and the Council of Europe (CoE) raise significant problems regarding privacy and other key values. Moreover, the efforts of both international bodies amount to policy laundering because they circumvent national democratic discourses in favor of comparatively closed international decision-making processes. The solutions offered by the G8 and the CoE may have implications for the interaction between technology and law, on one hand, and between national discourse and international policy making, on the other hand. The chapter outlines strategies for reinserting deliberative democracy into these processes. After discussing the challenges of jurisdiction and national technology policy, it looks at the logic of conventions and the G8’s work on data preservation and data retention, the CoE’s initiatives related to procedural law, and search and seizure of stored computer data.
Dov H. Levin
- Published in print:
- 2020
- Published Online:
- September 2020
- ISBN:
- 9780197519882
- eISBN:
- 9780197519929
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780197519882.003.0009
- Subject:
- Political Science, Comparative Politics, International Relations and Politics
Chapter 9 first briefly summarizes the findings from the preceding chapters regarding the causes of partisan electoral interventions and their effects on election results. It then discusses the wider ...
More
Chapter 9 first briefly summarizes the findings from the preceding chapters regarding the causes of partisan electoral interventions and their effects on election results. It then discusses the wider contributions of this study to other subfields in international relations and comparative politics. It then assesses the policy implications of this research to cybersecurity. It first describes the need of policymakers in democratic countries to take immediate precautions in order to prevent the digitization (via cryptocurrencies) of another long-standing method of electoral intervention—covert campaign funding. It then discusses how the use of electronic voting methods of various kinds threatens to inadvertently bring back a pre-modern method of intervention—meddling in the vote tallies, and the best ways to prevent that “doomsday” scenario from occurring. The chapter concludes with future directions for research in this regard.Less
Chapter 9 first briefly summarizes the findings from the preceding chapters regarding the causes of partisan electoral interventions and their effects on election results. It then discusses the wider contributions of this study to other subfields in international relations and comparative politics. It then assesses the policy implications of this research to cybersecurity. It first describes the need of policymakers in democratic countries to take immediate precautions in order to prevent the digitization (via cryptocurrencies) of another long-standing method of electoral intervention—covert campaign funding. It then discusses how the use of electronic voting methods of various kinds threatens to inadvertently bring back a pre-modern method of intervention—meddling in the vote tallies, and the best ways to prevent that “doomsday” scenario from occurring. The chapter concludes with future directions for research in this regard.
Milton L. Mueller
- Published in print:
- 2010
- Published Online:
- August 2013
- ISBN:
- 9780262014595
- eISBN:
- 9780262289665
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262014595.003.0001
- Subject:
- Society and Culture, Technology and Society
This chapter provides a brief introduction to Internet governance, examines how the Internet has proven to be a debatable source in international politics, and shows how this impacts international ...
More
This chapter provides a brief introduction to Internet governance, examines how the Internet has proven to be a debatable source in international politics, and shows how this impacts international relations. It further elaborates on the terminology used in this book and also outlines major drivers of global Internet governance: Intellectual property protection, cybersecurity, content regulation, and critical Internet resources. Furthermore, the discussion continues with a short description of networks and states, the ways in which the Internet puts pressure on the nation-state, networked governance, sectors and institutions, and the important role of transnational policies. The chapter concludes with a content description of later parts and their subparts in the book.Less
This chapter provides a brief introduction to Internet governance, examines how the Internet has proven to be a debatable source in international politics, and shows how this impacts international relations. It further elaborates on the terminology used in this book and also outlines major drivers of global Internet governance: Intellectual property protection, cybersecurity, content regulation, and critical Internet resources. Furthermore, the discussion continues with a short description of networks and states, the ways in which the Internet puts pressure on the nation-state, networked governance, sectors and institutions, and the important role of transnational policies. The chapter concludes with a content description of later parts and their subparts in the book.