Internet Security and Networked Governance in International Relations

This paper asks whether the Internet's heavy reliance on nonhierarchical, networked forms of governance is compatible with growing concerns about cyber-security from traditional state actors. Networked governance is defined as a semipermanent, voluntary negotiation system that allows interdependent actors to opt for collaboration or unilateral action in the absence of an overarching authority. Two case studies—Internet routing security and the response to a large-scale botnet known as Conficker—show the prevalence of networked governance on the Internet and provide insight into its strengths and limitations. The paper concludes that both cases raise doubts about the claim that introducing security concerns into Internet governance necessarily leads to more hierarchy and/or a greater role for governments.

[1]  R. Coase The Nature of the Firm , 1937 .

[2]  Civil Service Recruitment , 1958 .

[3]  Jeffrey H. Rohlfs A theory of interdependent demand for a communications service , 1974 .

[4]  O. Williamson Markets and hierarchies, analysis and antitrust implications : a study in the economics of internal organization , 1975 .

[5]  Mark S. Granovetter Economic Action and Social Structure: The Problem of Embeddedness , 1985, American Journal of Sociology.

[6]  H. Thorelli Networks: Between Markets and Hierarchies , 1986 .

[7]  O. Williamson,et al.  The Economic Institutions of Capitalism: Firms, Markets, Relational Contracting . By Oliver E. Williamson. (New York: Free Press, 1985. Pp. 450. $27.95.) , 1986 .

[8]  R. Werle,et al.  Policy Networks in the German Telecommunications Domain , 1991 .

[9]  F. Scharpf,et al.  Games in Hierarchies and Networks: Analytical and Empirical Approaches to the Study of Governance Institutions , 1994 .

[10]  Laurent Joncheray,et al.  Representation of IP Routing Policies in a Routing Registry (ripe-81++) , 1995, RFC.

[11]  N. Economides The economics of networks , 1996 .

[12]  F. Scharpf Games Real Actors Play: Actor-centered Institutionalism In Policy Research , 1997 .

[13]  Anne-Marie Slaughter,et al.  The Real New World Order , 1997 .

[14]  Wolfgang H. Reinicke Global Public Policy , 1997 .

[15]  S. Borgatti,et al.  A General Theory of Network Governance: Exchange Conditions and Social Mechanisms , 1997 .

[16]  Tanja A. Börzel,et al.  Organizing Babylon ‐ On the Different Conceptions of Policy Networks , 1998 .

[17]  Reflections of the Evolving Concept of 'Private Policing' , 1999 .

[18]  P. Adler Market, Hierarchy, and Trust: The Knowledge Economy and the Future of Capitalism , 2001 .

[19]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.

[20]  Karen Seo,et al.  Public-key infrastructure for the Secure Border Gateway Protocol (S-BGP) , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[21]  Kal Raustiala,et al.  The Architecture of International Cooperation: Transgovernmental Networks and the Future of International Law , 2002 .

[22]  Hans Klein,et al.  ICANN and Internet Governance: Leveraging Technical Coordination to Realize Global Public Policy , 2002, Inf. Soc..

[23]  Grahame F. Thompson,et al.  Between Hierarchies and Markets , 2003 .

[24]  Zeev Maoz,et al.  International Relations: A Network Approach , 2003 .

[25]  Grahame F. Thompson Between Hierarchies and Markets: The Logic and Limits of Network Forms of Organization , 2003 .

[26]  Joan V. Robinson,et al.  The Nature of the Firm , 2004 .

[27]  THE ENEMY WITHIN , 2004 .

[28]  Michalis Faloutsos,et al.  Analyzing BGP policies: methodology and tool , 2004, IEEE INFOCOM 2004.

[29]  Anne-Marie Slaughter,et al.  A New World Order , 2004 .

[30]  E. Brophy Ruling the Root: Internet Governance and the Taming of Cyberspace , 2004 .

[31]  P. Howard New Media Campaigns and the Managed Citizen , 2005 .

[32]  Jürgen Bitzer,et al.  Intrinsic motivation in open source software development , 2007 .

[33]  E. Krahmann Security Governance and Networks: New Theoretical Perspectives in Transatlantic Security , 2005 .

[34]  M. Savage,et al.  Social networks and the study of relations: networks as method, metaphor and form , 2006 .

[35]  Stephen T. Kent,et al.  An Infrastructure Supporting Secure Internet Routing , 2006, EuroPKI.

[36]  M. Caparini,et al.  Private actors and security governance , 2006 .

[37]  Sheri Berman Case Studies and Theory Development in the Social Sciences , 2007, Perspectives on Politics.

[38]  Mette Eilstrup-Sangiovanni Varieties of Cooperation: Government Networks in International Security , 2007 .

[39]  Brian Fitzgerald,et al.  Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Projects , 2007 .

[40]  David A. Lake,et al.  The Politics of Networks: Interests, Power, and Human Rights Norms , 2007 .

[41]  Michalis Faloutsos,et al.  Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today? , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[42]  Jock Given,et al.  The wealth of networks: How social production transforms markets and freedom , 2007, Inf. Econ. Policy.

[43]  E. Sørensen,et al.  Theories of democratic network governance , 2007 .

[44]  Myriam Dunn Cavelty Cyber-Security and Threat Politics: US Efforts to Secure the Information Age , 2007 .

[45]  Han Dorussen,et al.  Intergovernmental Organizations and the Kantian Peace , 2008 .

[46]  Reformatting Politics: Information Technology and Global Civil Society , 2008 .

[47]  Emilie Marie Hafner-Burton,et al.  Network Analysis for International Relations , 2008, International Organization.

[48]  Tillmann Werner,et al.  Proactive Botnet Countermeasures An Offensive Approach , 2009 .

[49]  Doug Montgomery,et al.  A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.

[50]  A. Ohanyan Policy Wars for Peace: Network Model of NGO Behavior , 2009 .

[51]  Milton L. Mueller Networks and States: The Global Politics of Internet Governance , 2010 .

[52]  Patrick D. McDaniel,et al.  A Survey of BGP Security Issues and Solutions , 2010, Proceedings of the IEEE.

[53]  D. Clark Untangling Attribution , 2010 .

[54]  States, Citizens and the Privatization of Security: Introduction , 2010 .

[55]  Mark Bowden Worm: The First Digital World War , 2011 .

[56]  Milton L. Mueller,et al.  Negotiating a New Governance Hierarchy: An Analysis of the Conflicting Incentives to Secure Internet Routing , 2011 .

[57]  Myriam Dunn Cavelty From Cyber‐Bombs to Political Fallout: Threat Representations with an Impact in the Cyber‐Security Discourse , 2012 .

[58]  Andreas Schmidt,et al.  At the boundaries of peer production: The organization of Internet security production in the cases of Estonia 2007 and Conficker , 2012 .

[59]  Ronald J. Deibert,et al.  Global Governance and the Spread of Cyberspace Controls , 2012 .

[60]  J. P. Singh Information Technologies, Meta-power, and Transformations in Global Politics† , 2013 .

[61]  Archon Fung,et al.  Six Models for the Internet + Politics , 2013 .

[62]  R. Coase,et al.  The Problem of Social Cost , 1960, The Journal of Law and Economics.

[63]  D. Stetson,et al.  The enemy within: endogenous retroelements and autoimmune disease , 2014, Nature Immunology.