Query Result Set
Skip Navigation Links
   ActiveUsers:1897Hits:19318713Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER GOVERNANCE (4) answer(s).
 
SrlItem
1
ID:   187022


Attractive Alternative? China’s Approach to Cyber Governance and Its Implications for the Western Model / Gao, Xinchuchu   Journal Article
Gao, Xinchuchu Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract China’s cyber norm-building efforts can be usefully explored based on the concept of the norm life cycle developed by Finnemore and Sikkink. Although China puts cyber sovereignty and government involvement at the core of its cyber governance approach, its Internet policies are a result of interactions between state agencies and business units, and recent reforms suggest greater involvement of Chinese companies. Moreover, many countries, including some from the West, have placed increasing emphasis on intergovernmental involvement and data sovereignty when developing their Internet policies. The EU, for instance, believes that digital sovereignty is necessary to protect its own market from US and Chinese technology giants. Despite the fundamental differences between Brussels's digital sovereignty and Beijing’s cyber sovereignty, the dichotomy between China’s sovereignty-oriented approach and the more open approach of Western countries is more blurred than it may appear, leading to Western countries, the EU in particular, potentially becoming more receptive to China’s cyber norms.
Key Words EU  China  Cyber Governance  Cyber Sovereignty 
        Export Export
2
ID:   145002


China's cyber power / Inkster, Nigel 2016  Book
Inkster, Nigel Book
0 Rating(s) & 0 Review(s)
Publication London, IISS, 2016.
Description 155p.pbk
Series Adelphi Series; no. 456
Standard Number 9781138211162
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058653303.48830951/INK 058653MainOn ShelfGeneral 
058755303.48830951/INK 058755MainOn ShelfGeneral 
3
ID:   187024


Different Shades of Norms: Comparing the Approaches of the EU and ASEAN to Cyber Governance / Chen, Xuechen; Yang, Yifan   Journal Article
Yang, Yifan Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In order to better capture the dynamics of global cyber governance, it is important to go beyond the established West vs. non-West dichotomy in the scholarly literature and thus develop a more nuanced understanding of the variations of cyber governance norms and approaches within and beyond the traditional Western camp, as well as to take into account the role of regional organisations in reshaping the normative framework of cyber governance. Indeed, the European Union is emerging as a new norm entrepreneur and autonomous regional actor in cyber governance by proactively projecting its regulatory and normative power in the digital sphere. In contrast, the development of ASEAN’s cyber governance norms is a process of norm subsidiarity based on ASEAN’s unique diplomatic culture and normative structure characterised by the ASEAN Way and the principle of ASEAN centrality.
Key Words ASEAN  EU  Norms  Cyber Governance  Westlessness 
        Export Export
4
ID:   187023


Roles and Limitations of Middle Powers in Shaping Global Cyber Governance / Kim, Saeme   Journal Article
Kim, Saeme Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Global cyber governance is characterised by a West vs. non-West paradigm that glosses over a significant body of states that exhibit more nuanced positions. Such dichotomy has gained greater traction in the midst of geopolitical tensions between the United States on the one hand and China and Russia on the other. Examining the roles and limitations of middle powers, such as Singapore and South Korea, in their efforts to shape global cyber governance allows moving beyond the West vs. non-West paradigm. By employing a range of middle-power behaviours, Singapore and South Korea have been able to carve out a unique role as middle powers and, to some extent, shape the arena in which debates on global cyber governance take place, although not without constraints.
Key Words Middle Power  Cyber Governance  Westnon-West 
        Export Export