Institutions for Cyber Security: International Responses and Global Imperatives

Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for almost everyone in the developed world and increasingly for people in the developing world. This paper seeks to provide an initial baseline, for representing and tracking institutional responses to a rapidly changing international landscape, real as well as virtual. We shall argue that the current institutional landscape managing security issues in the cyber domain has developed in major ways, but that it is still “under construction.” We also expect institutions for cyber security to support and reinforce the contributions of information technology to the development process. We begin with (a) highlights of international institutional theory and an empirical “census” of the institutions-in-place for cyber security, and then turn to (b) key imperatives of information technology-development linkages and the various cyber processes that enhance developmental processes, (c) major institutional responses to cyber threats and cyber crime as well as select international and national policy postures so critical for industrial countries and increasingly for developing states as well, and (d) the salience of new mechanisms designed specifically in response to cyber threats.

[1]  Inis L. ClaudeJr Collective Legitimization as a Political Function of the United Nations , 1988 .

[2]  cyberdetective Convention on Cybercrime , 2007 .

[3]  Martin C. Libicki Cyberdeterrence and Cyberwar , 2009 .

[4]  D. Mitrany,et al.  The Functional Approach to World Organization , 1948 .

[5]  Stuart E. Madnick,et al.  Explorations in Cyber International Relations (ECIR) - Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System , 2009 .

[6]  C. Hailey,et al.  Notes on the Contributors , 2010 .

[7]  Anne-Marie Slaughter,et al.  Disaggregated Sovereignty: Towards the Public Accountability of Global Government Networks , 2004, Government and Opposition.

[8]  Myriam Dunn Cavelty Cyber-Allies: Strengths and Weaknesses of NATO’s Cyberdefense Posture , 2012 .

[9]  P. Hall,et al.  Political Science and the Three New Institutionalisms , 1996 .

[10]  Ronald J. Deibert,et al.  Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.

[11]  Buffalo B4B Plan for action , 1986, Nature.

[12]  Paul Sturges,et al.  Access Denied: The Practice and Policy of Global Internet Filtering , 2008 .

[13]  STOCKTAKING , 1931 .

[14]  Paul T. Jaeger,et al.  Government policies on the use of social media: legislating for change , 2011, dg.o '11.

[15]  Leland M. Goodrich,et al.  From League of Nations to United Nations , 1947, International Organization.

[16]  A. Klinghoffer,et al.  A Plan for Action , 2019, The New Examination System - GCSE.

[17]  Stuart E. Madnick,et al.  Comparative Analysis of Cybersecurity Metrics to Develop New Hypotheses , 2012 .

[18]  Robert O. Keohane,et al.  Power and interdependence : world politics in transition , 1978 .

[19]  H. Hundley,et al.  Emerging challenge: security and safety in cyberspace , 1995 .

[20]  N. Choucri Cyberpolitics in International Relations , 2012 .

[21]  Raymond R. Panko Computer Security Incident Response Teams (CSIRTs) , 2004 .

[22]  Robert O. Keohane,et al.  The demand for international regimes , 1982, International Organization.

[23]  Theodore J. Lowi,et al.  American Business, Public Policy, Case-Studies, and Political Theory , 1964 .

[24]  Stanley Hoffmann,et al.  International Organization and the International System , 1970, International Organization.

[25]  Richard Hackworth,et al.  OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.

[26]  Inis L. Claude Collective Legitimization as a Political Function of the United Nations , 1966 .

[27]  K. Schwalm National Strategy to Secure Cyberspace , 2006 .

[28]  P. Calvert Access Contested: Security, Identity, and Resistance in Asian Cyberspace , 2012 .

[29]  H. V. Jagadish,et al.  Information warfare and security , 1998, SGMD.

[30]  Stuart E. Madnick,et al.  Experiences and Challenges with using CERT Data to Analyze International Cyber Security , 2009 .

[31]  Simon Reich,et al.  The Four Faces of Institutionalism: Public Policy and a Pluralistic Perspective , 2000 .

[32]  E. Haas International Integration: The European and the Universal Process , 1961, International Organization.

[33]  Oran R. Young,et al.  THE INTERNATIONAL POLITICAL ECONOMY AND INTERNATIONAL INSTITUTIONS , 1996 .