THE MAIN CHALLENGES OF GOVERNANCE IN THE FIELD OF CYBERSECURITY
Abstract
The cross-border nature of cyberspace, its dependence on complex information technologies, the active use of sites and services of cyberspace by all countries in the globalized world not only provide new opportunities but also produce new threats to national security.
Some entities benefit from public goods without contributing to their production and support (the problem of free use). They can use the efforts of others because public goods have no price for consumers, are uncompetitive and cannot be excluded. Many countries are unable to protect the World Wide Web from their own hackers for technical, economic, political, etc. reasons. The assistance of third countries or the international community may be useful here. However, it should be pointed that those who protect foreign networks may use them in their own interests, including for espionage, because the same knowledge allows for both defensive and offensive nature. Probably not all states are ready to compromise their national security in this way.
In contrast, support for cybersecurity through technical and legal assistance is a low-risk model for the recipients. It is already quite actively practiced on a bilateral and multilateral basis. The United States is one of the most active providers of cybersecurity assistance. When considering such assistance to undemocratic regimes, it should be understood that it can be used to monitor and intimidate political dissidents, so there should be clear control and monitoring of the use of this assistance.
Initiatives to build trust in cyberspace require robust monitoring regimes, which can, however, be easily abused for espionage purposes, so a policy of collective deterrence of cyber threats requires institutional safeguards against such risks. Finally, there is the problem of focusing on relative benefits: the state suffers from different levels of vulnerability, opportunities and public-private relations. Because of this, global regulation of any particular aspect of cybersecurity is accompanied by an asymmetric distribution of relative benefits. Again, this problem can be overcome only by building trust in cooperation between different actors, both global and national.
Downloads
References
Axelrod, R. (2009). [1984]. Die Evolution der Kooperation. München: Oldenbourg.
Billo, C., Chang, W. (2004). Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States. Institute for Security Technology Studies at Dartmouth College. Hanover, NH.
Bygrave L.A., Bing J. Internet Governance: Infrastructure and Institutions. Oxford: Oxford University Press.
Carr, J. (2010). Inside Cyber Warfare. Sebastopol; CA: O’Reilly Media.
Clarke, R.A., Knake, R.K. (2010). Cyberwar: The Next Threat to National Security and What to Do about it. New York: Harper / Collins.
Daun, A. (2011). Auge um Auge? Intelligence-Kooperation in den deutsch-amerikanischen Beziehungen. Wiesbaden: VS Verlag für Sozialwissenschaften.
Falliere, N., O’Murchu, L., Chien, E. (2011). W32. Stuxnet Dossier. Symantec. Whitepaper. URL: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf.
Gaycken, S. (2011). Cyberwar: Das Internet als Kriegsschauplatz. München: Open Source Press. 9. Gilpin, R. (1981). War and Change in World Politics. Cambridge: Cambridge University Press. 10. Hansel, M. (2013). Internationale Beziehungen im Cyberspace. Macht, Institutionen und Wahrnehmung. Wiesbaden: VS Verlag.
Hansel, M. (2011). Stuxnet und die Sabotage des iranischen Atomprogramms: Ein neuer Kriegsschauplatz im Cyberspace? / Handbuch Kriegstheorien. T. Jäger, R. Beckmann (Eds.). Wiesbaden: VS Verlag, 564–576.
Harris, S. (2009). The Cyber Defense Perimeter. National Journal, 02.05.2009. URL: http://www.nationaljournal.com/njmagazine/id_20090502_5834.php.
ITU (2007). ITU Cybersecurity Work Programme to Assist Developing Countries 2007–2009. URL: http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-cybersecurity-workprogrammedeveloping-countries.pdf.
Keohane, R.O. (1984). After Hegemony: Cooperation and Discord in the World Political Economy. Princeton; NJ: Princeton University Press.
Kindleberger, C.P. (1981). Dominance and Leadership in the International Economy Exploitation. Public Goods and Free Rides. International Studies Quarterly, vol. 25, № (2), 242–254.
Klimburg, (2011). Mobilising Cyber Power. Survival, 53 (1), 41–60.
Libicki, M. C. (2009). Cyberdeterrence and Cyberwar. Santa Monica; CA: RAND.
Lord, K. M., Sharp, T. (2011). America’s Cyber Future: Security and Prosperity in the Information Age. Vol. I. Washington; DC: Center for a New American Security.
Mathiason, J. (2009). Internet Governance: The new Frontier of Global Institutions. London; New York: Routledge.
Nakashima, E. (2011). NSA Alies with Internet Carriers to Thwart Cyber Attacks against Defense Firms. Washington Post, 16.06.2011. URL : http://www.washingtonpost.com/national/major-internet-service-providerscooperating-with-nsa-on-monitoring-traffic/2011/06/07/AG2dukXH_story.html.
Offe, C. (2008). Governance – “Empty Signifier” oder sozialwissenschaftliches Forschungsprogramm / Governance in einer sich wandelnden Welt., G.F. Schuppert, M. Zürn (Eds.). Wiesbaden: VS Verlag. 61–76.
Olson, M. (1965). The Logic of Collective Action: Public Goods and the Theory of Groups. Cambridge: Harvard University Press.
Rieger, F. (2010). Der digitale Erstschlag ist erfolgt. Frankfurter Allgemeine Zeitung. URL : http://www.faz.net/s/RubCEB3712D41B64C3094E31BDC1446D18E/Doc~E8A0D43832567452FB DEE07AF579E893C~ATpl~Ecommon~Scontent.html.
Rohozinski, R., Haralampieva, V. (2008). Internet Filtering in the Commonwealth of Independent States / Access Denied: The Practice and Policy of Global Internet Filtering. Ronald Deibert et al. (Eds.). Cambridge; MA: The MIT Press. 177–185.
Samuelson, P.A. (1954). The Pure Theory of Public Expenditures. Review of Economics and Statistics, 36 (4), 387–389.
Sklerov, M.J. (2010). Responding to International Cyber Attacks as Acts of War. / Inside Cyber Warfare. Jeffrey Carr (Ed.). Sabastopol; CA : O’Reilly Media.
Sofaer, A.D., Clark, D., Diffie, W. (2010). Cyber Security and International Agreements. National Research Council / Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington; DC: National Academies Press. 179–206.
Sosa, G.C. (2009). Country Report on Cybercrime: The Phillipines. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) (Eds.). Work Product of the 104th International Training Course “The Crminal Justice Response to Cybercrime”. Tokio. URL: http://www.unafei.or.jp/english/pdf/RS_No79/No79_12PA_Sosa.pdf.
The White House (2011). International Strategy for Cyberspace: Prosperity, Security, and Openess in a Networked World. May 2011. URL : http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.
The White House (2009). Cyberspace Policy Review, Washington, DC. URL : http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.
Thomas, T.L. (2009). Nation-state Cyber Strategies: Examples from China and Russia / Cyberpower and National Security. F.D. Kramer, S.H. Starr, L.K. Wentz (Eds.). Washington; DC: National Defense University Press, 465–488.
Thomas, T.L. (2000). Like Adding Wings to the Tiger. Chinese Information War Theory and Practice / Foreign Military Studies Office. Fort Leavenworth, KS. URL: http://libweb.uoregon.edu/ec/e-asia/read/tigerwings.pdf.
Zetter, K. (2010). Countries Should be Held Responsible for Cyber Attacks. Wired, 30.07.2010. URL: http://www.wired.co.uk/news/archive/2010-07/30/cyber-attack-countries.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).