Install this application on your home screen for quick and easy access when you’re on the go.
Just tap then “Add to Home Screen”
Install this application on your home screen for quick and easy access when you’re on the go.
Just tap then “Add to Home Screen”
Building: VMP 9, Floor: 1, Room: B136
Friday 14:00 - 15:40 CEST (24/08/2018)
While state authority has been challenged in almost the entire spectrum of internet governance issues, cybersecurity clearly differs in this respect. When it comes to cyber-attacks, espionage and all kinds of malevolent behavior online that might be included in a wide concept of cybersecurity the role of the state is still crucial. Even though attribution is often enough unclear or difficult, states appear as attackers or victims, often both as part of conflict dyads, as sponsors of hacktivism and propaganda, and of course as protectors of citizens and businesses on their territory against all kinds of ‘threats coming from abroad’. With this panel we combine a number of promising papers in order to discuss and redefine the role of states and inter-state conflict in cybersecurity. • How did states adapt to cybersecurity risks? • Which offensive or defensive capabilities do states develop? • How do they approach the challenge of attribution? • Which multilateral efforts do they take to avoid cyber conflict or arms race? We include theoretical or empirical papers that address one or several of the questions listed or cover related topics.
Title | Details |
---|---|
Safeguarding Political IT-Infrastructures – Deterrence Revisited | View Paper Details |
The Politics of Public Attribution | View Paper Details |
Cybersecurities: Understanding Different Logics of German Cybersecurity Policies | View Paper Details |
Damned if You Do, Damned if You Don’t: An Experimental Analysis of State Response to Cyber Operations | View Paper Details |
International Cybersecurity Norm Development: The Role of States | View Paper Details |