Building an International Cybersecurity Regime : : Multistakeholder Diplomacy / / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors.
"Providing a much-needed study on cybersecurity regime building, this comprehensive book is a detailed analysis of cybersecurity norm-making processes and country positions, through the lens of multi-stakeholder diplomacy. Multi-disciplinary and multi-national scholars and practitioners use ins...
Saved in:
TeilnehmendeR: | |
---|---|
Place / Publishing House: | Northampton : : Edward Elgar Publishing,, 2023. |
Year of Publication: | 2023 |
Edition: | First edition. |
Language: | English |
Series: | Elgar International Law and Technology Series
|
Physical Description: | 1 online resource (282 pages) |
Notes: | Includes index. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993626662004498 |
---|---|
ctrlnum |
(MiAaPQ)EBC30752265 (Au-PeEL)EBL30752265 (CKB)28284168900041 (NjHacI)9928284168900041 (UtOrBLW)eep9781035301546 (EXLCZ)9928284168900041 |
collection |
bib_alma |
record_format |
marc |
spelling |
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors. First edition. Northampton : Edward Elgar Publishing, 2023. 1 online resource (282 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Elgar International Law and Technology Series Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index. Description based on print version record. Includes index. "Providing a much-needed study on cybersecurity regime building, this comprehensive book is a detailed analysis of cybersecurity norm-making processes and country positions, through the lens of multi-stakeholder diplomacy. Multi-disciplinary and multi-national scholars and practitioners use insights drawn from high-level discussion groups to provide a rigorous analysis of how major cyber powers view multi-stakeholder diplomacy. Looking at how past cybersecurity initiatives and multi-stakeholder negotiations in other fields illuminate its dynamics, this book will help put states' approaches towards multi-stakeholder cyber diplomacy into perspective, and frame the role of private actors in cybersecurity regime building. Evaluating the most promising institutional arrangements and mechanisms for implementing cybersecurity, this book combines top-down analyses relevant to the design of international cybersecurity regimes with bottom-up case studies, tracing the approaches of important states towards multi-stakeholder participation in cyber diplomacy. With a wealth of policy-relevant findings, this book will be welcomed by practitioners and scholars of international law, international organisation and international cybersecurity as well as multi-stakeholder governance and multilateral regimes. Policymakers and diplomats involved in international cybersecurity processes will also benefit from its cutting-edge comparative analysis of the approaches of key cyber powers"-- Provided by publisher. Creative Commons Attribution - NonCommercial - NoDerivatives 4.0 International CC BY-NC-ND 4.0 cc https://creativecommons.org/licenses/by-nc-nd/4.0/ Includes bibliographical references and index. Open Access. unrestricted online access http://purl.org/coar/access_right/c_abf2 Computer security Law and legislation. Cyber intelligence (Computer security) Internet Law and legislation. Print version: Johnstone, Ian Building an International Cybersecurity Regime Cheltenham : Edward Elgar Publishing Limited,c2023 Johnstone, Ian, editor. Sukumar, Arun, editor. Trachtman, Joel, editor. Edward Elgar Publishing, publisher. |
language |
English |
format |
eBook |
author2 |
Johnstone, Ian, Sukumar, Arun, Trachtman, Joel, Edward Elgar Publishing, |
author_facet |
Johnstone, Ian, Sukumar, Arun, Trachtman, Joel, Edward Elgar Publishing, |
author2_variant |
i j ij a s as j t jt |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR |
title |
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / |
spellingShingle |
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / Elgar International Law and Technology Series Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index. |
title_sub |
Multistakeholder Diplomacy / |
title_full |
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors. |
title_fullStr |
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors. |
title_full_unstemmed |
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors. |
title_auth |
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / |
title_new |
Building an International Cybersecurity Regime : |
title_sort |
building an international cybersecurity regime : multistakeholder diplomacy / |
series |
Elgar International Law and Technology Series |
series2 |
Elgar International Law and Technology Series |
publisher |
Edward Elgar Publishing, |
publishDate |
2023 |
physical |
1 online resource (282 pages) |
edition |
First edition. |
contents |
Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index. |
isbn |
1-03-530154-7 |
callnumber-first |
K - Law |
callnumber-subject |
K - General Law |
callnumber-label |
K564 |
callnumber-sort |
K 3564 C6 B855 42023 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8026 |
dewey-sort |
15.8026 |
dewey-raw |
005.8026 |
dewey-search |
005.8026 |
work_keys_str_mv |
AT johnstoneian buildinganinternationalcybersecurityregimemultistakeholderdiplomacy AT sukumararun buildinganinternationalcybersecurityregimemultistakeholderdiplomacy AT trachtmanjoel buildinganinternationalcybersecurityregimemultistakeholderdiplomacy AT edwardelgarpublishing buildinganinternationalcybersecurityregimemultistakeholderdiplomacy |
status_str |
n |
ids_txt_mv |
(MiAaPQ)EBC30752265 (Au-PeEL)EBL30752265 (CKB)28284168900041 (NjHacI)9928284168900041 (UtOrBLW)eep9781035301546 (EXLCZ)9928284168900041 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1796653663347802112 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01495nam a2200385 i 4500</leader><controlfield tag="001">993626662004498</controlfield><controlfield tag="005">20231010153508.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">231010s2023 enk o 101 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-03-530154-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC30752265</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30752265</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)28284168900041</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)9928284168900041</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(UtOrBLW)eep9781035301546</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)9928284168900041</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">pcc</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">K564.C6</subfield><subfield code="b">.B855 2023</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8026</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Building an International Cybersecurity Regime :</subfield><subfield code="b">Multistakeholder Diplomacy /</subfield><subfield code="c">Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Northampton :</subfield><subfield code="b">Edward Elgar Publishing,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (282 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Elgar International Law and Technology Series</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Providing a much-needed study on cybersecurity regime building, this comprehensive book is a detailed analysis of cybersecurity norm-making processes and country positions, through the lens of multi-stakeholder diplomacy. Multi-disciplinary and multi-national scholars and practitioners use insights drawn from high-level discussion groups to provide a rigorous analysis of how major cyber powers view multi-stakeholder diplomacy. Looking at how past cybersecurity initiatives and multi-stakeholder negotiations in other fields illuminate its dynamics, this book will help put states' approaches towards multi-stakeholder cyber diplomacy into perspective, and frame the role of private actors in cybersecurity regime building. Evaluating the most promising institutional arrangements and mechanisms for implementing cybersecurity, this book combines top-down analyses relevant to the design of international cybersecurity regimes with bottom-up case studies, tracing the approaches of important states towards multi-stakeholder participation in cyber diplomacy. With a wealth of policy-relevant findings, this book will be welcomed by practitioners and scholars of international law, international organisation and international cybersecurity as well as multi-stakeholder governance and multilateral regimes. Policymakers and diplomats involved in international cybersecurity processes will also benefit from its cutting-edge comparative analysis of the approaches of key cyber powers"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">Creative Commons Attribution - NonCommercial - NoDerivatives 4.0 International</subfield><subfield code="f">CC BY-NC-ND 4.0</subfield><subfield code="2">cc</subfield><subfield code="u">https://creativecommons.org/licenses/by-nc-nd/4.0/</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access.</subfield><subfield code="f">unrestricted online access</subfield><subfield code="u">http://purl.org/coar/access_right/c_abf2</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Johnstone, Ian</subfield><subfield code="t">Building an International Cybersecurity Regime</subfield><subfield code="d">Cheltenham : Edward Elgar Publishing Limited,c2023</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Johnstone, Ian,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sukumar, Arun,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trachtman, Joel,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Edward Elgar Publishing,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Elgar International Law and Technology Series</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-14 02:07:29 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2023-09-26 11:00:43 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350268390004498&Force_direct=true</subfield><subfield code="Z">5350268390004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350268390004498</subfield></datafield></record></collection> |