Computer systems and networks have become key determinants for the proper func- tioning of global markets, political institutions, and societies at large. Given their extensive reach into almost all areas of human activity, their safekeeping has become of strategic importance for a diverse range of actors. The proliferation of offensive cyberoperations, such as WannaCry or Petya/NotPetya, has spurred calls for normative measures of restraint, and behaviour-guiding rules of the road. Despite surging numbers of academic publications pertaining to cybersecurity generally, and norm-making processes specifically, the contributions of non-state actors to global cybersecurity governance efforts have remained under-theorised. With a view to offer...
Cyberattacks by non-state actors have evolved with the speed of technology, leaving governments larg...
Classically, States and non-State actors were differentiated not only by disparities in legal status...
This is the author accepted manuscript. The final version is available from CUP via the DOI in this ...
Concerns over practices in cyberspace are central to the consolidating international agenda for cybe...
This article examines the question of whether states can be held responsible for the malicious cyber...
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, co...
Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving pol...
The growing importance of cyberspace to modern society, and its increasing use as an arena for dispu...
As cyber crime becomes ever more sophisticated and a significant asymmetric threat, the need for eff...
Cybersecurity is a complex and contested issue in international politics. The existence of radically...
In 2010, the discovery of the malicious computer worm Stuxnet shocked the world by its sophisticati...
In thinking about strategy and doctrine for cyberspace, one cannot ignore either the cyber domain\u2...
Within the last decade, nation-states and their populations have experienced an exponential rise in ...
This paper interprets the current efforts towards norm development in cyberspace through the lens of...
In their article, Dan Efrony and Yuval Shany claim that post-Tallinn Manual practice demonstrates th...
Cyberattacks by non-state actors have evolved with the speed of technology, leaving governments larg...
Classically, States and non-State actors were differentiated not only by disparities in legal status...
This is the author accepted manuscript. The final version is available from CUP via the DOI in this ...
Concerns over practices in cyberspace are central to the consolidating international agenda for cybe...
This article examines the question of whether states can be held responsible for the malicious cyber...
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, co...
Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving pol...
The growing importance of cyberspace to modern society, and its increasing use as an arena for dispu...
As cyber crime becomes ever more sophisticated and a significant asymmetric threat, the need for eff...
Cybersecurity is a complex and contested issue in international politics. The existence of radically...
In 2010, the discovery of the malicious computer worm Stuxnet shocked the world by its sophisticati...
In thinking about strategy and doctrine for cyberspace, one cannot ignore either the cyber domain\u2...
Within the last decade, nation-states and their populations have experienced an exponential rise in ...
This paper interprets the current efforts towards norm development in cyberspace through the lens of...
In their article, Dan Efrony and Yuval Shany claim that post-Tallinn Manual practice demonstrates th...
Cyberattacks by non-state actors have evolved with the speed of technology, leaving governments larg...
Classically, States and non-State actors were differentiated not only by disparities in legal status...
This is the author accepted manuscript. The final version is available from CUP via the DOI in this ...