Information and telecommunications diplomacy in the context of international security at the United Nations

Author:

Pauletto Christian

Abstract

Purpose The development of technologies for the conduct of cyber operations represents an opportunity for states to defend their interests in international relations but also bears risks and challenges. Since the early 2000s, the United Nations “group of governmental experts (GGE) on developments in the field of information and telecommunications in the context of international security” debates on this issue. This paper aims to investigate how states are challenged in the development of international cyber norms and where capacity to act is idle, i.e. to assess how much has been reached in the international community’s debate on cyber threats and malicious behaviors in the international security context and to identify directions to move GGE work further. Design/methodology/approach The methodology uses an extensive text-based desk research and relies on a thorough collection, analysis and interpretation of the United Nations (UNs) documents. When specific substantial topics are addressed in the GGE, the content of the debate was confronted with issue-specific academic literature on those matters. Findings The results highlight that the GGE managed to gather consensus on a number of cooperation and normative measures in this politically highly sensitive topic and more deliverables are expected during this and next year. The paper identifies a weakness in terms of operational implementation though. The paper proposes a few examples of concrete headways that could complement existing consensus, especially on the implementation side. Originality/value Because of its political sensitivity, the GGE has worked with discretion and has attracted little academic attention. This paper is an original and timely attempt to assess the achievements and possible outlook of this endeavor of the international community, including the incipient work of a recently established open-ended working group. It also attempts to connect the subject matter discussed in the UN with related academic literature, including in respect of definitional and conceptual issues.

Publisher

Emerald

Subject

Information Systems and Management,Computer Science Applications,Public Administration

Reference38 articles.

1. Role of types of electoral rigging, socio-economic status, politics and voting behavior in the formation of attitudes toward electoral integrity;Transforming Government: People, Process and Policy,2017

2. Why we need a new definition of information security;Computers and Security,2003

3. Information warfare: a comparative framework for business information security;Journal of Information System Security,2005

4. The contemporary cybercrime ecosystem: a multi-disciplinary overview of the state of affairs and developments;Computer Law and Security Review,2018

5. Malware at its worst: death and destruction;International Journal of Accounting and Information Management,2018

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3