Building an International Cybersecurity Regime : : Multistakeholder Diplomacy / / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors.

"Providing a much-needed study on cybersecurity regime building, this comprehensive book is a detailed analysis of cybersecurity norm-making processes and country positions, through the lens of multi-stakeholder diplomacy. Multi-disciplinary and multi-national scholars and practitioners use ins...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:Northampton : : Edward Elgar Publishing,, 2023.
Year of Publication:2023
Edition:First edition.
Language:English
Series:Elgar International Law and Technology Series
Physical Description:1 online resource (282 pages)
Notes:Includes index.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01495nam a2200385 i 4500
001 993626662004498
005 20231010153508.0
006 m o d |
007 cr cnu||||||||
008 231010s2023 enk o 101 0 eng d
020 |a 1-03-530154-7 
035 |a (MiAaPQ)EBC30752265 
035 |a (Au-PeEL)EBL30752265 
035 |a (CKB)28284168900041 
035 |a (NjHacI)9928284168900041 
035 |a (UtOrBLW)eep9781035301546 
035 |a (EXLCZ)9928284168900041 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
042 |a pcc 
050 4 |a K564.C6  |b .B855 2023 
082 0 |a 005.8026  |2 23 
245 0 0 |a Building an International Cybersecurity Regime :  |b Multistakeholder Diplomacy /  |c Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors. 
250 |a First edition. 
264 1 |a Northampton :  |b Edward Elgar Publishing,  |c 2023. 
300 |a 1 online resource (282 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Elgar International Law and Technology Series 
505 0 |a Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index. 
588 |a Description based on print version record. 
500 |a Includes index. 
520 |a "Providing a much-needed study on cybersecurity regime building, this comprehensive book is a detailed analysis of cybersecurity norm-making processes and country positions, through the lens of multi-stakeholder diplomacy. Multi-disciplinary and multi-national scholars and practitioners use insights drawn from high-level discussion groups to provide a rigorous analysis of how major cyber powers view multi-stakeholder diplomacy. Looking at how past cybersecurity initiatives and multi-stakeholder negotiations in other fields illuminate its dynamics, this book will help put states' approaches towards multi-stakeholder cyber diplomacy into perspective, and frame the role of private actors in cybersecurity regime building. Evaluating the most promising institutional arrangements and mechanisms for implementing cybersecurity, this book combines top-down analyses relevant to the design of international cybersecurity regimes with bottom-up case studies, tracing the approaches of important states towards multi-stakeholder participation in cyber diplomacy. With a wealth of policy-relevant findings, this book will be welcomed by practitioners and scholars of international law, international organisation and international cybersecurity as well as multi-stakeholder governance and multilateral regimes. Policymakers and diplomats involved in international cybersecurity processes will also benefit from its cutting-edge comparative analysis of the approaches of key cyber powers"--  |c Provided by publisher. 
540 |a Creative Commons Attribution - NonCommercial - NoDerivatives 4.0 International  |f CC BY-NC-ND 4.0  |2 cc  |u https://creativecommons.org/licenses/by-nc-nd/4.0/ 
504 |a Includes bibliographical references and index. 
506 0 |a Open Access.  |f unrestricted online access  |u http://purl.org/coar/access_right/c_abf2 
650 0 |a Computer security  |x Law and legislation. 
650 0 |a Cyber intelligence (Computer security) 
650 0 |a Internet  |x Law and legislation. 
776 0 8 |i Print version:  |a Johnstone, Ian  |t Building an International Cybersecurity Regime  |d Cheltenham : Edward Elgar Publishing Limited,c2023 
700 1 |a Johnstone, Ian,  |e editor. 
700 1 |a Sukumar, Arun,  |e editor. 
700 1 |a Trachtman, Joel,  |e editor. 
710 2 |a Edward Elgar Publishing,  |e publisher. 
830 0 |a Elgar International Law and Technology Series 
906 |a BOOK 
ADM |b 2023-12-14 02:07:29 Europe/Vienna  |f system  |c marc21  |a 2023-09-26 11:00:43 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350268390004498&Force_direct=true  |Z 5350268390004498  |b Available  |8 5350268390004498