International Cybersecurity Norms and Responsible Cyber Sovereignty

dc.authorwosideldem, tuba/AAP-9058-2021
dc.contributor.authorEldem, Tuba
dc.contributor.otherSiyaset Bilimi ve Uluslararası İlişkiler Bölümü
dc.date.accessioned2025-01-11T13:01:56Z
dc.date.available2025-01-11T13:01:56Z
dc.date.issued2021
dc.departmentFenerbahçe Universityen_US
dc.department-temp[Eldem, Tuba] Fenerbahce Univ, Siyaset Bilimi & Uluslararasi Iliskiler Bolumu, Iktisadi & Idari Bilimler Fak, Istanbul, Turkey; [Eldem, Tuba] German Inst Int & Secur Affairs SWP, Ctr Appl Turkey Studies CATS, Berlin, Germanyen_US
dc.description.abstractInitially envisioned as a free and open communication space between people, free from state regulation and intervention, cyberspace has become a fundamental subject of national and global politics over the last decade. Allegedly state-sponsored cyber operations against Estonia in 2007, Georgia in 2008 and Iran in 2010 played an important role in turning cybersecurity into a national and international security issue. Although the development of cyber diplomacy and international cybersecurity law were left behind the militarization of cyberspace, nevertheless, there have been many international initiatives to adopt international cybersecurity norms in the past decade. Within the framework of the life cycle model of the norms developed by Martha Finnemore and Kathryn Sikkink (1998), this article aims to shed light on the emergence of international cybersecurity norms by focusing on the negotiations held at the First Committee of the United Nations for more than twenty years. The article argues that those negotiations held under the First Committee dealing with disarmament and international security issues indicate the first stage of the formation of international rules related to cyberspace, and the negotiations to be completed under the UN Open-Ended Working Group in 2021 is critical for the transition of international cybersecurity norms from the first to the second stage.en_US
dc.description.woscitationindexEmerging Sources Citation Index
dc.identifier.citation1
dc.identifier.doi10.26650/mecmua.2021.79.1.0010
dc.identifier.endpage378en_US
dc.identifier.issn2636-7734
dc.identifier.issn2667-6974
dc.identifier.issue1en_US
dc.identifier.scopusqualityN/A
dc.identifier.startpage347en_US
dc.identifier.trdizinid508039
dc.identifier.urihttps://doi.org/10.26650/mecmua.2021.79.1.0010
dc.identifier.urihttps://hdl.handle.net/20.500.14627/195
dc.identifier.volume79en_US
dc.identifier.wosWOS:000644793400010
dc.institutionauthorEldem, Tuba
dc.language.isoenen_US
dc.publisherIstanbul Univ, Fac Lawen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectInternational Politicsen_US
dc.subjectInternational Normsen_US
dc.subjectInternational Cyber Securityen_US
dc.subjectUnited Nationsen_US
dc.subjectInternational Organizationsen_US
dc.subjectCyberspaceen_US
dc.subjectInformation Securityen_US
dc.subjectInternational Lawen_US
dc.subjectCyber Waren_US
dc.subjectCyber Normsen_US
dc.subjectInternational Cybersecurity Normsen_US
dc.titleInternational Cybersecurity Norms and Responsible Cyber Sovereigntyen_US
dc.typeArticleen_US
dspace.entity.typePublication
relation.isAuthorOfPublication3fbe8e01-e2b9-4d5f-aedb-0d05e81458db
relation.isAuthorOfPublication.latestForDiscovery3fbe8e01-e2b9-4d5f-aedb-0d05e81458db
relation.isOrgUnitOfPublicationde46859f-896e-496f-8eb7-033934e89ea1
relation.isOrgUnitOfPublication.latestForDiscoveryde46859f-896e-496f-8eb7-033934e89ea1

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
HMSORUMLUSBEREGEMENLIK.pdf
Size:
991.44 KB
Format:
Adobe Portable Document Format