Multistakeholderism: Anatomy of an inchoate global institution
M Raymond, L DeNardis - International Theory, 2015 - cambridge.org
Building on John Ruggie's pioneering study of multilateralism, this paper presents an
analogous study of multistakeholder governance, or multistakeholderism. Its central …
analogous study of multistakeholder governance, or multistakeholderism. Its central …
From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse
M Dunn Cavelty - International Studies Review, 2013 - academic.oup.com
The link between cyberspace and national security is often presented as an unquestionable
and uncontested “truth.” However, there is nothing natural or given about this link: It had to …
and uncontested “truth.” However, there is nothing natural or given about this link: It had to …
[图书][B] Negotiating internet governance
R Radu - 2019 - library.oapen.org
What is at stake for how the Internet continues to evolve is the preservation of its integrity as
a single network. In practice, its governance is neither centralised nor unitary; it is piecemeal …
a single network. In practice, its governance is neither centralised nor unitary; it is piecemeal …
Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities
M Dunn Cavelty - Science and engineering ethics, 2014 - Springer
Current approaches to cyber-security are not working. Rather than producing more security,
we seem to be facing less and less. The reason for this is a multi-dimensional and multi …
we seem to be facing less and less. The reason for this is a multi-dimensional and multi …
The territorialization of cyberspace
D Lambach - International Studies Review, 2020 - academic.oup.com
There are widespread worries about the impending fragmentation of the internet. Reviewing
the IR literature on cyberspace and internet governance, this paper demonstrates that these …
the IR literature on cyberspace and internet governance, this paper demonstrates that these …
[PDF][PDF] Accounting information security and it governance under cobit 5 framework: A case study
QA Al-Fatlawi, DS Al Farttoosi, AH Almagtome - Webology, 2021 - webology.org
This paper aims to explore the role of applying information technology governance using the
COBIT 5 framework in improving the security of accounting information systems. The paper …
COBIT 5 framework in improving the security of accounting information systems. The paper …
Centrality and power. The struggle over the techno‐political configuration of the Internet and the global digital order
J Pohle, D Voelsen - Policy & Internet, 2022 - Wiley Online Library
In recent years, various governments have been trying to subordinate the Internet to the
system of the Westphalian state order. This article seeks to add a new layer to the analysis of …
system of the Westphalian state order. This article seeks to add a new layer to the analysis of …
An outlook on the institutional evolution of the European Union cyber security apparatus
This paper observes the evolution of cyber security institutions recently established in the
European Union. These institutions are based on older national, regional, and international …
European Union. These institutions are based on older national, regional, and international …
On the risk of misbehaving RPKI authorities
The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of
the most devastating attacks on interdomain routing. The threat model for the RPKI …
the most devastating attacks on interdomain routing. The threat model for the RPKI …
[图书][B] Global standard setting in internet governance
A Harcourt, G Christou, S Simpson - 2020 - books.google.com
The book addresses representation of the public interest in Internet standard developing
organisations (SDOs). Much of the existing literature on Internet governance focuses on …
organisations (SDOs). Much of the existing literature on Internet governance focuses on …