Multistakeholderism: Anatomy of an inchoate global institution

M Raymond, L DeNardis - International Theory, 2015 - cambridge.org
Building on John Ruggie's pioneering study of multilateralism, this paper presents an
analogous study of multistakeholder governance, or multistakeholderism. Its central …

From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse

M Dunn Cavelty - International Studies Review, 2013 - academic.oup.com
The link between cyberspace and national security is often presented as an unquestionable
and uncontested “truth.” However, there is nothing natural or given about this link: It had to …

[图书][B] Negotiating internet governance

R Radu - 2019 - library.oapen.org
What is at stake for how the Internet continues to evolve is the preservation of its integrity as
a single network. In practice, its governance is neither centralised nor unitary; it is piecemeal …

Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities

M Dunn Cavelty - Science and engineering ethics, 2014 - Springer
Current approaches to cyber-security are not working. Rather than producing more security,
we seem to be facing less and less. The reason for this is a multi-dimensional and multi …

The territorialization of cyberspace

D Lambach - International Studies Review, 2020 - academic.oup.com
There are widespread worries about the impending fragmentation of the internet. Reviewing
the IR literature on cyberspace and internet governance, this paper demonstrates that these …

[PDF][PDF] Accounting information security and it governance under cobit 5 framework: A case study

QA Al-Fatlawi, DS Al Farttoosi, AH Almagtome - Webology, 2021 - webology.org
This paper aims to explore the role of applying information technology governance using the
COBIT 5 framework in improving the security of accounting information systems. The paper …

Centrality and power. The struggle over the techno‐political configuration of the Internet and the global digital order

J Pohle, D Voelsen - Policy & Internet, 2022 - Wiley Online Library
In recent years, various governments have been trying to subordinate the Internet to the
system of the Westphalian state order. This article seeks to add a new layer to the analysis of …

An outlook on the institutional evolution of the European Union cyber security apparatus

J Ruohonen, S Hyrynsalmi, V Leppänen - Government Information …, 2016 - Elsevier
This paper observes the evolution of cyber security institutions recently established in the
European Union. These institutions are based on older national, regional, and international …

On the risk of misbehaving RPKI authorities

D Cooper, E Heilman, K Brogle, L Reyzin… - Proceedings of the …, 2013 - dl.acm.org
The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of
the most devastating attacks on interdomain routing. The threat model for the RPKI …

[图书][B] Global standard setting in internet governance

A Harcourt, G Christou, S Simpson - 2020 - books.google.com
The book addresses representation of the public interest in Internet standard developing
organisations (SDOs). Much of the existing literature on Internet governance focuses on …