2014
DOI: 10.1007/978-3-642-55007-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Rise of a Cybered Westphalian Age: The Coming Decades

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
15
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(21 citation statements)
references
References 7 publications
0
15
0
1
Order By: Relevance
“…While it seems fairly clear that traditional media began to fill some dependency gaps during this period, the interviews reported here especially speak to not treating national-level changes as monolithic or in oversimplified terms. The eventual -and still being negotiated -outcome in the Egyptian case also suggests that movements no longer exist in only physical terms but also in online spaces that can potentially be separated and fragmented (Demchak and Dombrowski, 2011).…”
Section: Discussionmentioning
confidence: 99%
“…While it seems fairly clear that traditional media began to fill some dependency gaps during this period, the interviews reported here especially speak to not treating national-level changes as monolithic or in oversimplified terms. The eventual -and still being negotiated -outcome in the Egyptian case also suggests that movements no longer exist in only physical terms but also in online spaces that can potentially be separated and fragmented (Demchak and Dombrowski, 2011).…”
Section: Discussionmentioning
confidence: 99%
“…There is so much development and interest at stake for a nation's security that the establishment and control of "cyber borders" is an important step toward insuring protection of their critical infrastructure from cyber based threats. 55 Related to responsibility and liability is the problem of attribution. The level of difficulty in carrying out cyber-attacks and probability of getting caught must be raised higher.…”
Section: Proposals For Addressing the Misbehaviour Of States In Cybermentioning
confidence: 99%
“…8.E.g., Buchanan 2016; Choucri 2012; Demchak and Dombrowski 2011; Gartzke 2013; Kello 2017; Lindsay 2013; Rid 2013; Valeriano and Maness 2015. A wider array of approaches has also emerged, relating cybersecurity to Internet governance (DeNardis 2014; Raymond and DeNardis 2015), securitization (Hansen and Nissenbaum 2009), Science and Technology Studies (Dunn Cavelty 2018), norm development (Finnemore and Hollis 2016), history (Healey 2013; Warner 2012), territoriality (Herrera 2007; Lambach 2020; Sheniak 2014), and language (Dunn Cavelty 2013; Lawson 2020; Lupovici 2016).…”
mentioning
confidence: 99%
“…163.E.g., Gartzke and Lindsay 2015 on deception in communication networks, or Demchak and Dombrowski (2011, 35) on the Internet as a “substrate.”…”
mentioning
confidence: 99%