10 research outputs found

    National Security Zone in International Cyber Affairs

    Get PDF
    O artigo descreve como os interesses nacionais no plano da cibersegurança estão interligados com instrumentos jurídicos, explicando como diferentes interpretações de conceitos como liberdade de informação, cooperação internacional ou direito à privacidade são contemplados em termos de Direito internacional. Analisam-se ainda ramificações quanto a abordagens governamentais relativas ao conceito de “segurança nacional”, concluindo-se que nas atuais circunstâncias de fragmentação dos instrumentos legais associados à cibersegurança e ante a inexistência de acordo quanto ao que deve ser o comportamento aceitável dos Estados no plano do ciberespaço, os governos detêm uma larga latitude de discrição jurídica quando dela se socorrem para impor as respetivas perspetivas nacionais quanto a um equilíbrio entre a liberdade e a segurançainfo:eu-repo/semantics/publishedVersio

    Chapter 30 The role of the UN Security Council in cybersecurity

    Get PDF
    The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general

    Laiapõhjalise küberjulgeoleku õiguslik raamistik

    Get PDF
    Käesoleva väitekirja eesmärk on toetada ja arendada erinevate õigusvaldkondade ekspertide vahelist diskussiooni selgitamaks välja kui suures ulatuses on täna rahvusvahelises õiguses eksisteerivate normide ja nende kohaldamise praktika pinnalt võimalik toetada laiapõhjalise küberjulgeoleku sihte ja vajadusi. Töös selgitatakse laiapõhjalise küberjulgeoleku olemust ja elemente ning vajadust õiguse arendamiseks ja rakendamiseks senisest enam interdistsiplinaarsel viisil. Autor loob küberjulgeoleku tarvis kehtiva õiguse kvaliteedi ja kohaldamisulatuse hindamiseks kaks raamistikku. Esimesest, struktuursest raamistikut, nähtub kaasaegse küberjulgeoleku ulatus, erinevate ohtude õiguslik olemus ning neile kohalduvad õigusvaldkonnad ja –instituudid, aga ka võimalikud õigusloome ja –rakendamise tasandid ning seoses riigisisese ja rahvusvahelise õiguse ning vastutusalade vahel. Teisest, analüütilisest raamistikust, kujuneb arusaam küberjulgeoleku olulisematest õigusprobleemide sisust ja tänasest regulatsioonist, valitsevatest seisukohtadest ning suurematest erimeelsustest kehtiva õiguse tõlgendamisel ja rakendamisel ning nähtuvad autori ettepanekud edasiseks analüüsiks.The aim of this dissertation is to support and enhance the discussion between legal experts in determining how international law can be developed and applied to correspond to the aims and needs for a comprehensive cyber security. The author explains the essence and elements of such approach and clarifies the emerging need for interdisciplinary legal analysis and interpretation. The author develops two frameworks for assessing the quality and applicability of the existing law. First, in the structural framework, the author construes the spectrum of cyber security from legal perspective, indicating the legal areas and concepts applicable to different types and stages of cyber incidents and pointing out potential levels and authorities involved in developing further legal remedies and responses. In the instrumental framework, the author discusses emerging cyber security legal issues from different expert and practice perspectives, thereby providing an overview of relevant legal instruments, governing expert views and open questions. The author offers a discussion basis for further analysis of cyber security “rules of behavior”

    Parabasis: Cyber-diplomacy in Stalemate

    No full text
    Governments and industry around the world are working together to bring the next billion users online,1 but their synergies fade when it comes to how to keep online populations safe and secure. Further, the third and fourth billion of Internet users will enter a terrain very different from that available to their predecessors. Vulnerabilities in ICTs as well as de facto exploitation of these vulnerabilities by state and non-state actors has been acknowledged and problematized. Evidence of malicious and hostile operations involving ICTs and the Internet abounds. Uncertain about the true potential of ICTs, governments and users have focused on rules and responsibilities for protecting against cyberattacks, espionage and data manipulation. But where is there an understanding of how to remedy and improve the situation? The first part of this report analyzes and contextualizes the UN First Committee process. The second part offers the authors’ extensions to the theme, analyzing the relative successes and failures of the leading cyberpowers in promoting the world order of their liking. In particular, we analyze how Russia, as the initiator of the First Committee process, has created momentum and gathered support for its calls for specific international regulation and institutionalization of the process on the one hand, and stronger governmental control of the development and use of ICTs and the flow of information on the other. In conclusion, we offer some recommendations for governments wishing to pursue the goal of free and open cyberspace—indeed a rule-based world order

    International Cybersecurity: Orchestral Manoeuvres in the Dark

    No full text
    Tikk and Kerttunen inform new entrants and nonparticipating governments of the discussions and outcomes of the UN First Committee Group of Governmental Experts (GGE) and discuss prospects for the 2019/2020 GGE. They explain why the Group will not able to provide answers to practical cybersecurity issues facing the majority of states. The authors call states to critically review their reasons for and expectations towards the UN First Committee dialogue on international cybersecurity

    The Politics of Stability: Cement and Change in Cyber Affairs

    No full text
    Stability is a delicate attribute of public international order. If pursued to its absolute, it could paralyse the development and progress of humankind. If marginalized, it could fuel injustice, violence and conflict. Several differing concepts of ‘stability’ can be identified in international affairs. The United Nations Security Council uses the term to express a desirable state of affairs, almost synonymous with the concept of ‘peace’. In a 1992 ‘Note by the President of the Security Council’, various sources of instability were seen as threatening peace and security. The Council recognized that otherwise welcomed political changes may bring new risks to stability and security, especially stemming from changes to state structures. As the Council observed, ‘non-military sources of instability in the economic, social, humanitarian and ecological fields’ had become threats to peace and security.1 Similarly, in 2005 the Council discussed the food crisis in Africa as a threat to peace, security and stabilit

    Chapter 30 The role of the UN Security Council in cybersecurity

    No full text
    The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general
    corecore