International Cybersecurity Norms and Responsible Cyber Sovereignty
dc.authorwosid | eldem, tuba/AAP-9058-2021 | |
dc.contributor.author | Eldem, Tuba | |
dc.contributor.other | Siyaset Bilimi ve Uluslararası İlişkiler Bölümü | |
dc.date.accessioned | 2025-01-11T13:01:56Z | |
dc.date.available | 2025-01-11T13:01:56Z | |
dc.date.issued | 2021 | |
dc.department | Fenerbahçe University | en_US |
dc.department-temp | [Eldem, Tuba] Fenerbahce Univ, Siyaset Bilimi & Uluslararasi Iliskiler Bolumu, Iktisadi & Idari Bilimler Fak, Istanbul, Turkey; [Eldem, Tuba] German Inst Int & Secur Affairs SWP, Ctr Appl Turkey Studies CATS, Berlin, Germany | en_US |
dc.description.abstract | Initially envisioned as a free and open communication space between people, free from state regulation and intervention, cyberspace has become a fundamental subject of national and global politics over the last decade. Allegedly state-sponsored cyber operations against Estonia in 2007, Georgia in 2008 and Iran in 2010 played an important role in turning cybersecurity into a national and international security issue. Although the development of cyber diplomacy and international cybersecurity law were left behind the militarization of cyberspace, nevertheless, there have been many international initiatives to adopt international cybersecurity norms in the past decade. Within the framework of the life cycle model of the norms developed by Martha Finnemore and Kathryn Sikkink (1998), this article aims to shed light on the emergence of international cybersecurity norms by focusing on the negotiations held at the First Committee of the United Nations for more than twenty years. The article argues that those negotiations held under the First Committee dealing with disarmament and international security issues indicate the first stage of the formation of international rules related to cyberspace, and the negotiations to be completed under the UN Open-Ended Working Group in 2021 is critical for the transition of international cybersecurity norms from the first to the second stage. | en_US |
dc.description.woscitationindex | Emerging Sources Citation Index | |
dc.identifier.citation | 1 | |
dc.identifier.doi | 10.26650/mecmua.2021.79.1.0010 | |
dc.identifier.endpage | 378 | en_US |
dc.identifier.issn | 2636-7734 | |
dc.identifier.issn | 2667-6974 | |
dc.identifier.issue | 1 | en_US |
dc.identifier.scopusquality | N/A | |
dc.identifier.startpage | 347 | en_US |
dc.identifier.trdizinid | 508039 | |
dc.identifier.uri | https://doi.org/10.26650/mecmua.2021.79.1.0010 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14627/195 | |
dc.identifier.volume | 79 | en_US |
dc.identifier.wos | WOS:000644793400010 | |
dc.institutionauthor | Eldem, Tuba | |
dc.language.iso | en | en_US |
dc.publisher | Istanbul Univ, Fac Law | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | International Politics | en_US |
dc.subject | International Norms | en_US |
dc.subject | International Cyber Security | en_US |
dc.subject | United Nations | en_US |
dc.subject | International Organizations | en_US |
dc.subject | Cyberspace | en_US |
dc.subject | Information Security | en_US |
dc.subject | International Law | en_US |
dc.subject | Cyber War | en_US |
dc.subject | Cyber Norms | en_US |
dc.subject | International Cybersecurity Norms | en_US |
dc.title | International Cybersecurity Norms and Responsible Cyber Sovereignty | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 3fbe8e01-e2b9-4d5f-aedb-0d05e81458db | |
relation.isAuthorOfPublication.latestForDiscovery | 3fbe8e01-e2b9-4d5f-aedb-0d05e81458db | |
relation.isOrgUnitOfPublication | de46859f-896e-496f-8eb7-033934e89ea1 | |
relation.isOrgUnitOfPublication.latestForDiscovery | de46859f-896e-496f-8eb7-033934e89ea1 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- HMSORUMLUSBEREGEMENLIK.pdf
- Size:
- 991.44 KB
- Format:
- Adobe Portable Document Format