International Cybersecurity: De-escalating tensions in a digital Era

dc.contributor.advisorBeyer, Jessica
dc.contributor.authorChampagne, Amy
dc.contributor.authorDrainville, Nick
dc.contributor.authorFelt, Coley
dc.contributor.authorGao, Zhiqin
dc.contributor.authorHerriford, Connor
dc.contributor.authorHobbs, Evan
dc.contributor.authorJain, Mardav
dc.contributor.authorKalderash, Nicola
dc.contributor.authorKoeck, Sara
dc.contributor.authorKrabill, Eleanor
dc.contributor.authorManning, Brooke
dc.contributor.authorMiranda, Angelia
dc.contributor.authorNonnast, Philipp
dc.contributor.authorO’Laughlin, Victoria
dc.contributor.authorSanguinet, Sarah
dc.contributor.authorWang, Haiyan
dc.contributor.editorO'Laughlin, Victoria
dc.contributor.editorSanguinet, Sarah
dc.contributor.otherMcConnell, Bruce
dc.contributor.otherMiranda, Angelia
dc.contributor.other
dc.contributor.other
dc.date.accessioned2019-05-17T21:55:18Z
dc.date.available5/16/2019
dc.date.available2019-05-17T21:55:18Z
dc.date.issued2019
dc.description.abstractWithin the last decade, nation-states and their populations have experienced an exponential rise in cyberattacks against critical infrastructure. Cyberattacks are an attractive addition to traditional warfare for adversaries, as nation-state actors who utilize them can more easily evade attribution. However, cybertactics that target critical infrastructure cause the same grave damage as purely kinetic attacks. Developing international cybersecurity norms encourages a more peaceful and collaborative international sphere, averting cyberattacks before they occur. This report aims to provide a cohesive understanding of a range of nation-state cyber actor types and preferences, investigating what constitutes the basis of each country’s current cyberstrategy and using that as a foundation for understanding each country’s stance towards creating international norms. To do this, we conducted 14 country case studies to understand country preferences in negotiations to develop international cybersecurity norms. Across our cases, we find that country preferences are determined by perspectives on international collaboration, national sovereignty, cybercapability development, and political constraints. We also surveyed existing international agreements and conversations, which signify a common willingness to cooperate in shaping international cybersecurity norms.
dc.identifier.urihttp://hdl.handle.net/1773/43755
dc.titleInternational Cybersecurity: De-escalating tensions in a digital Era
dc.typereport

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TaskForce_B_Beyer.pdf
Size:
2.58 MB
Format:
Adobe Portable Document Format