Public and Private Governance of Cybersecurity: Challenges and Potential
Editat de Tomoko Ishikawa, Yarik Kryvoien Limba Engleză Hardback – 29 sep 2023
Preț: 661.57 lei
Preț vechi: 727.00 lei
-9% Nou
Puncte Express: 992
Preț estimativ în valută:
126.62€ • 131.97$ • 105.41£
126.62€ • 131.97$ • 105.41£
Carte disponibilă
Livrare economică 16-30 decembrie
Livrare express 30 noiembrie-06 decembrie pentru 34.10 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781009374538
ISBN-10: 1009374532
Pagini: 330
Dimensiuni: 237 x 158 x 24 mm
Greutate: 0.55 kg
Editura: Cambridge University Press
Colecția Cambridge University Press
Locul publicării:Cambridge, United Kingdom
ISBN-10: 1009374532
Pagini: 330
Dimensiuni: 237 x 158 x 24 mm
Greutate: 0.55 kg
Editura: Cambridge University Press
Colecția Cambridge University Press
Locul publicării:Cambridge, United Kingdom
Cuprins
1. Introduction Tomoko Ishikawa and Yarik Kryvoi; 2. International relations perspectives: cybergovernance in the post-liberal order Kiichi Fujiwara and Paul Nadeau; 3. The state-oriented model of internet regulation: the case of China Wakako Ito; 4. Cybercrime, the United Nations, prospects and challenges for international cooperation Summer Walker and Ian Tennant; 5. Responding to public and private cyberattacks: jurisdiction, self-defence, and countermeasures Yarik Kryvoi; 6. International data transfers and cybersecurity: three regulatory approaches and their implications Jens Hillebrand Pohl; 7. International trade law and cybersecurity: balancing free markets and regulation Elizabeth Whitsitt; 8: Cyber threats, human rights and FDI restrictions Tomoko Ishikawa; 9: Public-Private partnerships on cybersecurity and international law: finding multilateral solutions Aleksander Kalisz; 10: The geopolitical divide, norm conflict and public-private partnership in cybersecurity governance Yarik Kryvoi and Tomoko Ishikawa; Index.
Descriere
Analyses the current framework of cybersecurity governance, its limitations and how private actors and geopolitical considerations shape responses to cybersecurity threats.