Building an International Cybersecurity Regime : : Multistakeholder Diplomacy / / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors.

"Providing a much-needed study on cybersecurity regime building, this comprehensive book is a detailed analysis of cybersecurity norm-making processes and country positions, through the lens of multi-stakeholder diplomacy. Multi-disciplinary and multi-national scholars and practitioners use ins...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:Northampton : : Edward Elgar Publishing,, 2023.
Year of Publication:2023
Edition:First edition.
Language:English
Series:Elgar International Law and Technology Series
Physical Description:1 online resource (282 pages)
Notes:Includes index.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993626662004498
ctrlnum (MiAaPQ)EBC30752265
(Au-PeEL)EBL30752265
(CKB)28284168900041
(NjHacI)9928284168900041
(UtOrBLW)eep9781035301546
(EXLCZ)9928284168900041
collection bib_alma
record_format marc
spelling Building an International Cybersecurity Regime : Multistakeholder Diplomacy / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors.
First edition.
Northampton : Edward Elgar Publishing, 2023.
1 online resource (282 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Elgar International Law and Technology Series
Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index.
Description based on print version record.
Includes index.
"Providing a much-needed study on cybersecurity regime building, this comprehensive book is a detailed analysis of cybersecurity norm-making processes and country positions, through the lens of multi-stakeholder diplomacy. Multi-disciplinary and multi-national scholars and practitioners use insights drawn from high-level discussion groups to provide a rigorous analysis of how major cyber powers view multi-stakeholder diplomacy. Looking at how past cybersecurity initiatives and multi-stakeholder negotiations in other fields illuminate its dynamics, this book will help put states' approaches towards multi-stakeholder cyber diplomacy into perspective, and frame the role of private actors in cybersecurity regime building. Evaluating the most promising institutional arrangements and mechanisms for implementing cybersecurity, this book combines top-down analyses relevant to the design of international cybersecurity regimes with bottom-up case studies, tracing the approaches of important states towards multi-stakeholder participation in cyber diplomacy. With a wealth of policy-relevant findings, this book will be welcomed by practitioners and scholars of international law, international organisation and international cybersecurity as well as multi-stakeholder governance and multilateral regimes. Policymakers and diplomats involved in international cybersecurity processes will also benefit from its cutting-edge comparative analysis of the approaches of key cyber powers"-- Provided by publisher.
Creative Commons Attribution - NonCommercial - NoDerivatives 4.0 International CC BY-NC-ND 4.0 cc https://creativecommons.org/licenses/by-nc-nd/4.0/
Includes bibliographical references and index.
Open Access. unrestricted online access http://purl.org/coar/access_right/c_abf2
Computer security Law and legislation.
Cyber intelligence (Computer security)
Internet Law and legislation.
Print version: Johnstone, Ian Building an International Cybersecurity Regime Cheltenham : Edward Elgar Publishing Limited,c2023
Johnstone, Ian, editor.
Sukumar, Arun, editor.
Trachtman, Joel, editor.
Edward Elgar Publishing, publisher.
language English
format eBook
author2 Johnstone, Ian,
Sukumar, Arun,
Trachtman, Joel,
Edward Elgar Publishing,
author_facet Johnstone, Ian,
Sukumar, Arun,
Trachtman, Joel,
Edward Elgar Publishing,
author2_variant i j ij
a s as
j t jt
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
title Building an International Cybersecurity Regime : Multistakeholder Diplomacy /
spellingShingle Building an International Cybersecurity Regime : Multistakeholder Diplomacy /
Elgar International Law and Technology Series
Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index.
title_sub Multistakeholder Diplomacy /
title_full Building an International Cybersecurity Regime : Multistakeholder Diplomacy / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors.
title_fullStr Building an International Cybersecurity Regime : Multistakeholder Diplomacy / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors.
title_full_unstemmed Building an International Cybersecurity Regime : Multistakeholder Diplomacy / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors.
title_auth Building an International Cybersecurity Regime : Multistakeholder Diplomacy /
title_new Building an International Cybersecurity Regime :
title_sort building an international cybersecurity regime : multistakeholder diplomacy /
series Elgar International Law and Technology Series
series2 Elgar International Law and Technology Series
publisher Edward Elgar Publishing,
publishDate 2023
physical 1 online resource (282 pages)
edition First edition.
contents Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index.
isbn 1-03-530154-7
callnumber-first K - Law
callnumber-subject K - General Law
callnumber-label K564
callnumber-sort K 3564 C6 B855 42023
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8026
dewey-sort 15.8026
dewey-raw 005.8026
dewey-search 005.8026
work_keys_str_mv AT johnstoneian buildinganinternationalcybersecurityregimemultistakeholderdiplomacy
AT sukumararun buildinganinternationalcybersecurityregimemultistakeholderdiplomacy
AT trachtmanjoel buildinganinternationalcybersecurityregimemultistakeholderdiplomacy
AT edwardelgarpublishing buildinganinternationalcybersecurityregimemultistakeholderdiplomacy
status_str n
ids_txt_mv (MiAaPQ)EBC30752265
(Au-PeEL)EBL30752265
(CKB)28284168900041
(NjHacI)9928284168900041
(UtOrBLW)eep9781035301546
(EXLCZ)9928284168900041
carrierType_str_mv cr
is_hierarchy_title Building an International Cybersecurity Regime : Multistakeholder Diplomacy /
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1796653663347802112
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01495nam a2200385 i 4500</leader><controlfield tag="001">993626662004498</controlfield><controlfield tag="005">20231010153508.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">231010s2023 enk o 101 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-03-530154-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC30752265</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30752265</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)28284168900041</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)9928284168900041</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(UtOrBLW)eep9781035301546</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)9928284168900041</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">pcc</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">K564.C6</subfield><subfield code="b">.B855 2023</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8026</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Building an International Cybersecurity Regime :</subfield><subfield code="b">Multistakeholder Diplomacy /</subfield><subfield code="c">Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Northampton :</subfield><subfield code="b">Edward Elgar Publishing,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (282 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Elgar International Law and Technology Series</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Providing a much-needed study on cybersecurity regime building, this comprehensive book is a detailed analysis of cybersecurity norm-making processes and country positions, through the lens of multi-stakeholder diplomacy. Multi-disciplinary and multi-national scholars and practitioners use insights drawn from high-level discussion groups to provide a rigorous analysis of how major cyber powers view multi-stakeholder diplomacy. Looking at how past cybersecurity initiatives and multi-stakeholder negotiations in other fields illuminate its dynamics, this book will help put states' approaches towards multi-stakeholder cyber diplomacy into perspective, and frame the role of private actors in cybersecurity regime building. Evaluating the most promising institutional arrangements and mechanisms for implementing cybersecurity, this book combines top-down analyses relevant to the design of international cybersecurity regimes with bottom-up case studies, tracing the approaches of important states towards multi-stakeholder participation in cyber diplomacy. With a wealth of policy-relevant findings, this book will be welcomed by practitioners and scholars of international law, international organisation and international cybersecurity as well as multi-stakeholder governance and multilateral regimes. Policymakers and diplomats involved in international cybersecurity processes will also benefit from its cutting-edge comparative analysis of the approaches of key cyber powers"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">Creative Commons Attribution - NonCommercial - NoDerivatives 4.0 International</subfield><subfield code="f">CC BY-NC-ND 4.0</subfield><subfield code="2">cc</subfield><subfield code="u">https://creativecommons.org/licenses/by-nc-nd/4.0/</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access.</subfield><subfield code="f">unrestricted online access</subfield><subfield code="u">http://purl.org/coar/access_right/c_abf2</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Johnstone, Ian</subfield><subfield code="t">Building an International Cybersecurity Regime</subfield><subfield code="d">Cheltenham : Edward Elgar Publishing Limited,c2023</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Johnstone, Ian,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sukumar, Arun,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trachtman, Joel,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Edward Elgar Publishing,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Elgar International Law and Technology Series</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-14 02:07:29 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2023-09-26 11:00:43 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5350268390004498&amp;Force_direct=true</subfield><subfield code="Z">5350268390004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350268390004498</subfield></datafield></record></collection>