1. bookVolume 19 (2019): Issue 2 (December 2019)
Journal Details
License
Format
Journal
eISSN
2464-6601
First Published
08 Jun 2011
Publication timeframe
2 times per year
Languages
English
Open Access

Towards Pollution-Control in Cyberspace: Problem Structure and Institutional Design in International Cybersecurity

Published Online: 07 Feb 2020
Volume & Issue: Volume 19 (2019) - Issue 2 (December 2019)
Page range: 76 - 96
Journal Details
License
Format
Journal
eISSN
2464-6601
First Published
08 Jun 2011
Publication timeframe
2 times per year
Languages
English

BASILICO, Nicola, DE NITTIS, Giuseppe, GATTI, Nicola. A Security Game Model for Environment Protection in the Presence of an Alarm System. In KHOUZANI, MHR, et.al. (eds). Decision and Game Theory for Security: 6th International Conference, GameSec 2015, London, UK, November 4–5, 2015, Proceedings, Cham: Springer International Publishing, 2015), pp.192–207;10.1007/978-3-319-25594-1_11Search in Google Scholar

BIGELOW, Brad. Mission Assurance: Shifting the Focus of Cyber Defence. IN RÕIGAS, Henry et. al. 9thInternational Conference on Cyber Conflict: Defending the Core, Proceedings, 2017, CCDCOE, IEEE, Tallinn.Search in Google Scholar

BREENE, Keith. Who are the cyberwar superpowers? World Economic Forum, 04.05.2016. Available https://www.weforum.org/agenda/2016/05/who-are-the-cyberwar-super-powers/ (accessed 13.09.2019)Search in Google Scholar

CARBERRY, Sean D. Why the private sector is key to cybersecurity? FCW: The Business of Federal Technology, 01.03.2017. Available https://fcw.com/articles/2017/03/01/whythe-private-sector-is-key-to-cybersecurity.aspx (accessed 13.09.2019)Search in Google Scholar

CASEY, William. et al. Cyber Security via Signaling Games: Toward a Science of Cyber Security. In NATARAJAN, R.(eds) Distributed Computing and Internet Technology. ICDCIT 2014. Lecture Notes in Computer Science, vol 8337. Springer, Cham pp. 34–42.10.1007/978-3-319-04483-5_4Search in Google Scholar

EDWARDS, Benjamin Edwards, FURNAS, Alexander, FORREST, Stephanie, AXELROD, Robert. Strategic Aspects of Cyberattack, Attribution, and Blame. Proceedings of the National Academy of Sciences 114, no. 11 (March 14, 2017) pp. 2825–30.10.1073/pnas.1700442114Search in Google Scholar

EMMOTT, Robin. NATO mulls ‘offensive defense’ with cyber warfare rules. Available https://www.reuters.com/article/us-nato-cyber/nato-mulls-offensive-defense-with-cyber-warfare-rules-idUSKBN1DU1G4 (accessed 13.09.2019)Search in Google Scholar

ESPÍNOLA-ARREDONDO, Ana, MUÑOZ-GARCÍA, Félix. Free-Riding in International Environmental Agreements: A Signaling Approach to Non-Enforceable Treaties. Journal of Theoretical Politics, 2011, vol. 23, no. 1, pp. 111–34.10.1177/0951629810391073Search in Google Scholar

EU Commission, High Level Group of Scientific Advisors, Scientific Opinion No. 2/2017. Cybersecurity in the European Digital Single Market, DG for Research and Innovation, Brussels, 24 March 2017. Available https://ec.europa.eu/research/sam/pdf/sam_cybersecurity_report.pdf (accessed 13.09.2019)Search in Google Scholar

HEITZENRATER, Chad, TAYLOR, Greg, SIMPSON, Andrew. When the Winning Move Is Not to Play: Games of Deterrence in Cyber Security. In KHOUZANI, MHR, et.al. (eds). Decision and Game Theory for Security: 6th International Conference, GameSec 2015, London, UK, November 4–5, 2015, Proceedings, Cham: Springer International Publishing, 2015, pp. 250–69.Search in Google Scholar

HENRIKSEN, Anders. The end of the road for the UN GGE process: The future regulation of cyberspace. Journal of Cybersecurity, 2019, vol 5, no. 1.10.1093/cybsec/tyy009Search in Google Scholar

JAKOB, Michael, LESSMANN, Kai. Signaling in International Environmental Agreements: The Case of Early and Delayed Action. International Environmental Agreements: Politics, Law and Economics, 2012, vol. 12, no. 4, pp. 309–25.Search in Google Scholar

JASON, The MITRE Corporation, Science of Cyber-Security, Technical Report, JSR-10-102, November 2010, Available https://fas.org/irp/agency/dod/jason/cyber.pdf (accessed 13.09.2019)Search in Google Scholar

KÄGI, Wolfgang. Economics of Climate Change: The Contribution of Forestry Projects Springer, 2000.10.1007/978-94-015-9600-8Search in Google Scholar

KERIKMÄE, Tanel, RULL, Addi (Eds). The Future of Law and eTechnologies, 2016, Springer-Verlag Heidelberg.10.1007/978-3-319-26896-5Search in Google Scholar

KERIKMÄE, Tanel, SÄRAV, Sandra. Legal Impediments in the EU to New Technologies in the Example of E-Residency. Baltic Journal of Law ---amp--- Politics, 2016, vol. 8., no. 2, pp. 71−90.10.1515/bjlp-2015-0019Search in Google Scholar

KORZAK, Elaine. UN GGE on Cybersecurity: The end of an Era?, The Diplomat, 31.07.2017. Available https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe/ (accessed 13.09.2019)Search in Google Scholar

KUJAWSKI, Edouard. A Probabilistic Game-Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems: Deterrence and Defense Benefits of Security Systems. Systems Engineering, 2016, vol. 19, no. 6, pp. 549–566.10.1002/sys.21376Search in Google Scholar

MARAUHN, Thilo. Customary Rules of Environmental Law. In ZIOLKOWSKI, Katharina (ed). Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy, NATO Cooperative Cyber Defence Centre of Excellence, 2013.Search in Google Scholar

MICHAEL, Barnett, DUVALL, Raymond. Power in International Politics. International Organization, 2005, vol. 59, no. 1, pp. 39–75. JSTOR, www.jstor.org/stable/3877878.10.1017/S0020818305050010Search in Google Scholar

MITCHELL, Ronald B. Problem structure, institutional design, and the relative effectiveness of international environmental agreements. Global Environmental Politics 2006, vol. 6, no. 3, pp. 72–89.10.1162/glep.2006.6.3.72Search in Google Scholar

MOORE, Tyler, FRIEDMAN, Allan, PROCACCIA, Ariel, D. Would A’cyber Warrior’protect Us: Exploring Trade-Offs between Attack and Defense of Information Systems. In Proceedings of the 2010 Workshop on New Security Paradigms (ACM, 2010), pp. 85–94.10.1145/1900546.1900559Search in Google Scholar

PARSON, Edward, A. The Montreal Protocol: The First Adaptive Global Environmental Regime? In PRESTRE et al. (eds.) Protecting the Ozone Layer: Lessons, Models, and Prospects, Kluwer Academic Publishers, 1998.Search in Google Scholar

POLAŃSKI, Paul Przemysław. Cyberspace: A New Branch of International Customary Law? Computer Law ---amp--- Security Review, 2017, vol. 33, no. 3, pp. 371–381.10.1016/j.clsr.2017.03.007Search in Google Scholar

RATTRAY, Gregory, J. An Environmental Approach to Understanding Cyberpower. In KRAMER, Franklin, D. et. al. (eds). Cyberpower and National Security, Potomac Books, 2009.Search in Google Scholar

RID, Thomas, BUCHANAN, Ben. Attributing Cyber Attacks. Journal of Strategic Studies, 2015, vol. 38, no. 1–2, pp. 4–37.10.1080/01402390.2014.977382Search in Google Scholar

RODRIGUES, António. A Game Theoretical Model of Deforestation in Human–environment Relationships. Journal of Theoretical Biology, 2009, vol. 258, no. 1, pp. 127–34.10.1016/j.jtbi.2009.01.005Search in Google Scholar

SABBAH, Cedric. Pressing Pause: A New Approach for International Cybersecurity Norm Development. In MINARIK, T. et al. (eds). Proceedings of 10thInternational Conference on Cyber Conflict – Cycon X: Maximising Effects, NATO CCDCOE, 2018, pp. 263–282.Search in Google Scholar

SINHA, Arunesh et al. From Physical Security to Cybersecurity. Journal of Cybersecurity, November 17, 2015.10.1093/cybsec/tyv007Search in Google Scholar

SUNSTEIN, Cass, R. Of Montreal and Kyoto: A Tale of Two Protocols. Harward Environmental Law Review, 2007, vol. 31.Search in Google Scholar

TAKACS, David. Deep Equity, Zero-sum environmentalism, and a sustainable planet. IN: BAKER, Shalanda, Helen, et.al. Beyond Zero-Sum Environmentalism (May 8, 2017). Environmental Law Reporter, Vol. 47, No. 4, 2017. Available at SSRN: https://ssrn.com/abstract=2945666 (accessed 13.09.2019)Search in Google Scholar

THEILER, Olaf. The New threats: the cyber dimension. NATO Review, Available https://www.nato.int/docu/review/2011/11-september/cyber-threads/en/index.htm (accessed 13.09.2019)Search in Google Scholar

UNDERDAL, Arild. One Question, Two Answers. In MILES, Edward, L, et.al. (eds.) Environmental Regime Effectiveness: Confronting Theory with Evidence, MIT Press, 2002, pp. 3–45.Search in Google Scholar

UNDERDAL, Arild. One Question, Two Answers. In MILES, Edward, L, et.al. (eds.) Environmental Regime Effectiveness: Confronting Theory with Evidence, MIT Press, 2002, pp. 3–45.Search in Google Scholar

VELDERS, Guus, JM, et al. The Importance of the Montreal Protocol in Protecting Climate. Proceedings of the National Academy of Sciences, 2007, vol. 104, no. 12, pp. 4814–4819.10.1073/pnas.0610328104Search in Google Scholar

VALUCH, Jozef, GÁBRIŠ, Tomáš, HAMUĽÁK, Ondrej. Cyber Attacks, Information Attacks and Posstmodern Warfare. Baltic Journal of Law ---amp--- Politics 2017, vol. 10, no. 1, pp. 63–89.10.1515/bjlp-2017-0003Search in Google Scholar

YOUNG, Oran, R. Effectiveness of International Environmental Regimes: Existing Knowledge, Cutting-Edge Themes, and Research Strategies. Proceedings of the National Academy of Sciences 108, no. 50, pp. 19853–60.10.1073/pnas.1111690108Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo