The Institutionalisation of Security Norms in the Context of Cyber Alignments: The Transatlantic Alignment in the Cyber Domain

Author:

Hosh Mahmoud1ORCID,Issa Numeir1

Affiliation:

1. Damascus University, Syria

Abstract

Realists argue that security alliances are established to confront military threats posed by one state to others. In contrast, this study argues that nonmilitary cyberthreats have become a factor in establishing new security arrangements that do not necessarily take the form of an alliance, but rather emerge in the form of alignments. Cyberthreats lie in the political, economic, societal and military repercussions caused by the employment of cyber technologies, not these technologies themselves. Therefore, alignments are not automatic reflections of cyber capabilities, but depend on common perceptions and meanings that identify a certain behaviour as a security threat. The transatlantic alignment in the cyber domain, having been produced by common EU and US cyber norms, represents this type of security alignment. These norms have constructed common meanings and perceptions of cyberthreat patterns, which are primarily embodied in Chinese and Russian policies and behaviour in the cyber domain, involving a set of alternative and competing norms to those adopted by the former two, and through which China and Russia seek to alter the structure of the prevailing international order.

Publisher

Metropolitan University Prague

Reference99 articles.

1. Asen, E. (2021): Digital Tax Collection Triggers New U.S. Tariffs on France. Tax Foundation, 7 January, .

2. Balzacq, M. & Dunn Cavelty, M. (2016): A Theory of Actor Network for Cyber - Security. European Journal of International Security, 1(2), 176 - 198.

3. Branch, D. (2020): What's in a Name?: Metaphors and Cybersecurity. International Organization, 75(1), 1–32.

4. Broeders, D., Adamson, L. & Creemers, R. (2019): A Coalition of the Unwilling?: Chinese & Russian Perspective Cyberspace. The Hague: The HAGUE Program for Cyber Norms, Leiden Asia Center, & University of Leiden.

5. Buzan, B. & Hansen, L. (2009): The Evolution of International Security Studies. Cambridge: Cambridge University Press.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3