3.1.1 Introduction to Internet Governance Frameworks | Jack Goldsmith and a Berkman Center Cybersecurity Team | July 26, 2012

H2O

This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.

3.1.1 Introduction to Internet Governance Frameworks

by Jack Goldsmith and a Berkman Center Cybersecurity Team Show/Hide
Presents an overarching framework for Internet governance and discusses the difficulties that arise with coordinating regulation across the globe in a rapidly changing cyber-environment. EDIT PLAYLIST INFORMATION DELETE PLAYLIST

Edit playlist item notes below to have a mix of public & private notes, or:

MAKE ALL NOTES PUBLIC (5/5 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/5 playlist item notes are private)
  1. 1 Show/Hide More Lawrence B. Solum, Models of Internet Governance, Illinois Public Law Research Paper No. 07-25, U Illinois Law & Economics Research Paper No. LE08-027, September 3, 2008
    This article takes a broad view of Internet governance, presenting three central ideas regarding Internet governance and five different models to Internet governance.
  2. 2 Show/Hide More Robert Knake, Internet Governance in an Age of Cyber Insecurity, Council on Foreign Relations, September 2010
    This article examines the technological decisions enabling the Internet’s success and vulnerabilities, then outlines an agenda that the United States can pursue with allies on the international stage
  3. 3 Show/Hide More Jeremy Ferwerda, Nazli Choucri, and Stuart Madnick, Institutional Foundations for Cyber Security: Current Responses and New Challenges, Working Paper CISL# 2011-05, May 2011
    This article examines the institutions responsible for addressing the security of cyberspace and international relations in the cyber-domain. It highlights emerging challenges while evaluating the strengths and weaknesses of the current institutional framework.
  4. 4 Show/Hide More Jack Goldsmith, Cybersecurity Treaties: A Skeptical View, Future Challenges in National Security and Law, February 2011
    This article explains why international cooperation is considered central to the cybersecurity problem and examines three major hurdles to a global cybersecurity treaty. It then considers the feasibility of narrower and softer forms of cooperation.
  5. 5 Show/Hide More Abraham D. Sofaer, David Clark, and Whitfield Diffie, Cyber Security and International Agreements, Proceedings of a Workshop on Deterring Cyberattacks, pp. 179-206, 2010
    This piece discusses how the threats to cybersecurity are currently being approached at the private, national, and international level, then demonstrates the potential for increased international cooperation. It also covers how to fashion effective international initiatives and the difficulties in such negotiations.
Close

Playlist Information

May 21, 2013

3.1.1

Author Stats

Jack Goldsmith and a Berkman Center Cybersecurity Team

Other Playlists by Jack Goldsmith and a Berkman Center Cybersecurity Team

Find Items

Search below to find items, then drag and drop items onto playlists you own. To add items to nested playlists, you must first expand those playlists.

SEARCH
Leitura Garamond Futura Verdana Proxima Nova Dagny Web
small medium large extra-large