Have a personal or library account? Click to login
Towards Pollution-Control in Cyberspace: Problem Structure and Institutional Design in International Cybersecurity Cover

Towards Pollution-Control in Cyberspace: Problem Structure and Institutional Design in International Cybersecurity

By: Agnes Kasper and  Csaba Krasznay  
Open Access
|Feb 2020

References

  1. BASILICO, Nicola, DE NITTIS, Giuseppe, GATTI, Nicola. A Security Game Model for Environment Protection in the Presence of an Alarm System. In KHOUZANI, MHR, et.al. (eds). Decision and Game Theory for Security: 6th International Conference, GameSec 2015, London, UK, November 4–5, 2015, Proceedings, Cham: Springer International Publishing, 2015), pp.192–207;10.1007/978-3-319-25594-1_11
  2. BIGELOW, Brad. Mission Assurance: Shifting the Focus of Cyber Defence. IN RÕIGAS, Henry et. al. 9thInternational Conference on Cyber Conflict: Defending the Core, Proceedings, 2017, CCDCOE, IEEE, Tallinn.
  3. BREENE, Keith. Who are the cyberwar superpowers? World Economic Forum, 04.05.2016. Available https://www.weforum.org/agenda/2016/05/who-are-the-cyberwar-super-powers/ (accessed 13.09.2019)
  4. CARBERRY, Sean D. Why the private sector is key to cybersecurity? FCW: The Business of Federal Technology, 01.03.2017. Available https://fcw.com/articles/2017/03/01/whythe-private-sector-is-key-to-cybersecurity.aspx (accessed 13.09.2019)
  5. CASEY, William. et al. Cyber Security via Signaling Games: Toward a Science of Cyber Security. In NATARAJAN, R.(eds) Distributed Computing and Internet Technology. ICDCIT 2014. Lecture Notes in Computer Science, vol 8337. Springer, Cham pp. 34–42.10.1007/978-3-319-04483-5_4
  6. EDWARDS, Benjamin Edwards, FURNAS, Alexander, FORREST, Stephanie, AXELROD, Robert. Strategic Aspects of Cyberattack, Attribution, and Blame. Proceedings of the National Academy of Sciences 114, no. 11 (March 14, 2017) pp. 2825–30.10.1073/pnas.1700442114
  7. EMMOTT, Robin. NATO mulls ‘offensive defense’ with cyber warfare rules. Available https://www.reuters.com/article/us-nato-cyber/nato-mulls-offensive-defense-with-cyber-warfare-rules-idUSKBN1DU1G4 (accessed 13.09.2019)
  8. ESPÍNOLA-ARREDONDO, Ana, MUÑOZ-GARCÍA, Félix. Free-Riding in International Environmental Agreements: A Signaling Approach to Non-Enforceable Treaties. Journal of Theoretical Politics, 2011, vol. 23, no. 1, pp. 111–34.10.1177/0951629810391073
  9. EU Commission, High Level Group of Scientific Advisors, Scientific Opinion No. 2/2017. Cybersecurity in the European Digital Single Market, DG for Research and Innovation, Brussels, 24 March 2017. Available https://ec.europa.eu/research/sam/pdf/sam_cybersecurity_report.pdf (accessed 13.09.2019)
  10. HEITZENRATER, Chad, TAYLOR, Greg, SIMPSON, Andrew. When the Winning Move Is Not to Play: Games of Deterrence in Cyber Security. In KHOUZANI, MHR, et.al. (eds). Decision and Game Theory for Security: 6th International Conference, GameSec 2015, London, UK, November 4–5, 2015, Proceedings, Cham: Springer International Publishing, 2015, pp. 250–69.
  11. HENRIKSEN, Anders. The end of the road for the UN GGE process: The future regulation of cyberspace. Journal of Cybersecurity, 2019, vol 5, no. 1.10.1093/cybsec/tyy009
  12. JAKOB, Michael, LESSMANN, Kai. Signaling in International Environmental Agreements: The Case of Early and Delayed Action. International Environmental Agreements: Politics, Law and Economics, 2012, vol. 12, no. 4, pp. 309–25.
  13. JASON, The MITRE Corporation, Science of Cyber-Security, Technical Report, JSR-10-102, November 2010, Available https://fas.org/irp/agency/dod/jason/cyber.pdf (accessed 13.09.2019)
  14. KÄGI, Wolfgang. Economics of Climate Change: The Contribution of Forestry Projects Springer, 2000.10.1007/978-94-015-9600-8
  15. KERIKMÄE, Tanel, RULL, Addi (Eds). The Future of Law and eTechnologies, 2016, Springer-Verlag Heidelberg.10.1007/978-3-319-26896-5
  16. KERIKMÄE, Tanel, SÄRAV, Sandra. Legal Impediments in the EU to New Technologies in the Example of E-Residency. Baltic Journal of Law ---amp--- Politics, 2016, vol. 8., no. 2, pp. 71−90.10.1515/bjlp-2015-0019
  17. KORZAK, Elaine. UN GGE on Cybersecurity: The end of an Era?, The Diplomat, 31.07.2017. Available https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe/ (accessed 13.09.2019)
  18. KUJAWSKI, Edouard. A Probabilistic Game-Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems: Deterrence and Defense Benefits of Security Systems. Systems Engineering, 2016, vol. 19, no. 6, pp. 549–566.10.1002/sys.21376
  19. MARAUHN, Thilo. Customary Rules of Environmental Law. In ZIOLKOWSKI, Katharina (ed). Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy, NATO Cooperative Cyber Defence Centre of Excellence, 2013.
  20. MICHAEL, Barnett, DUVALL, Raymond. Power in International Politics. International Organization, 2005, vol. 59, no. 1, pp. 39–75. JSTOR, www.jstor.org/stable/3877878.10.1017/S0020818305050010
  21. MITCHELL, Ronald B. Problem structure, institutional design, and the relative effectiveness of international environmental agreements. Global Environmental Politics 2006, vol. 6, no. 3, pp. 72–89.10.1162/glep.2006.6.3.72
  22. MOORE, Tyler, FRIEDMAN, Allan, PROCACCIA, Ariel, D. Would A’cyber Warrior’protect Us: Exploring Trade-Offs between Attack and Defense of Information Systems. In Proceedings of the 2010 Workshop on New Security Paradigms (ACM, 2010), pp. 85–94.10.1145/1900546.1900559
  23. PARSON, Edward, A. The Montreal Protocol: The First Adaptive Global Environmental Regime? In PRESTRE et al. (eds.) Protecting the Ozone Layer: Lessons, Models, and Prospects, Kluwer Academic Publishers, 1998.
  24. POLAŃSKI, Paul Przemysław. Cyberspace: A New Branch of International Customary Law? Computer Law ---amp--- Security Review, 2017, vol. 33, no. 3, pp. 371–381.10.1016/j.clsr.2017.03.007
  25. RATTRAY, Gregory, J. An Environmental Approach to Understanding Cyberpower. In KRAMER, Franklin, D. et. al. (eds). Cyberpower and National Security, Potomac Books, 2009.
  26. RID, Thomas, BUCHANAN, Ben. Attributing Cyber Attacks. Journal of Strategic Studies, 2015, vol. 38, no. 1–2, pp. 4–37.10.1080/01402390.2014.977382
  27. RODRIGUES, António. A Game Theoretical Model of Deforestation in Human–environment Relationships. Journal of Theoretical Biology, 2009, vol. 258, no. 1, pp. 127–34.10.1016/j.jtbi.2009.01.005
  28. SABBAH, Cedric. Pressing Pause: A New Approach for International Cybersecurity Norm Development. In MINARIK, T. et al. (eds). Proceedings of 10thInternational Conference on Cyber Conflict – Cycon X: Maximising Effects, NATO CCDCOE, 2018, pp. 263–282.
  29. SINHA, Arunesh et al. From Physical Security to Cybersecurity. Journal of Cybersecurity, November 17, 2015.10.1093/cybsec/tyv007
  30. SUNSTEIN, Cass, R. Of Montreal and Kyoto: A Tale of Two Protocols. Harward Environmental Law Review, 2007, vol. 31.
  31. TAKACS, David. Deep Equity, Zero-sum environmentalism, and a sustainable planet. IN: BAKER, Shalanda, Helen, et.al. Beyond Zero-Sum Environmentalism (May 8, 2017). Environmental Law Reporter, Vol. 47, No. 4, 2017. Available at SSRN: https://ssrn.com/abstract=2945666 (accessed 13.09.2019)
  32. THEILER, Olaf. The New threats: the cyber dimension. NATO Review, Available https://www.nato.int/docu/review/2011/11-september/cyber-threads/en/index.htm (accessed 13.09.2019)
  33. UNDERDAL, Arild. One Question, Two Answers. In MILES, Edward, L, et.al. (eds.) Environmental Regime Effectiveness: Confronting Theory with Evidence, MIT Press, 2002, pp. 3–45.
  34. UNDERDAL, Arild. One Question, Two Answers. In MILES, Edward, L, et.al. (eds.) Environmental Regime Effectiveness: Confronting Theory with Evidence, MIT Press, 2002, pp. 3–45.
  35. VELDERS, Guus, JM, et al. The Importance of the Montreal Protocol in Protecting Climate. Proceedings of the National Academy of Sciences, 2007, vol. 104, no. 12, pp. 4814–4819.10.1073/pnas.0610328104
  36. VALUCH, Jozef, GÁBRIŠ, Tomáš, HAMUĽÁK, Ondrej. Cyber Attacks, Information Attacks and Posstmodern Warfare. Baltic Journal of Law ---amp--- Politics 2017, vol. 10, no. 1, pp. 63–89.10.1515/bjlp-2017-0003
  37. YOUNG, Oran, R. Effectiveness of International Environmental Regimes: Existing Knowledge, Cutting-Edge Themes, and Research Strategies. Proceedings of the National Academy of Sciences 108, no. 50, pp. 19853–60.10.1073/pnas.1111690108
DOI: https://doi.org/10.2478/iclr-2019-0015 | Journal eISSN: 2464-6601 | Journal ISSN: 12138770
Language: English
Page range: 76 - 96
Published on: Feb 7, 2020
Published by: Palacký University Olomouc
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2020 Agnes Kasper, Csaba Krasznay, published by Palacký University Olomouc
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.