Purpose: This section further explains international agreements, as many scholars believe that all unilateral legal and deterrence strategies are doomed to failure in the cyber realm, and that only through mutual restraint fostered by international agreements can cyberthreats be contained.
EDIT PLAYLIST INFORMATIONDELETE PLAYLIST
Edit playlist item notes below to have a mix of public & private notes, or:
This piece discusses how the threats to cybersecurity are currently being approached at the private, national, and international level, then demonstrates the potential for increased international cooperation. It explains the demand for cyber international agreements and their feasibility and usefulness. It also covers how to fashion effective international initiatives and the difficulties in such negotiations.
This article explains why international cooperation is considered central to the cybersecurity problem and examines three major hurdles to a global cybersecurity treaty. It explains why a cybersecurity agreement of the type Clark and Knake propose might not be feasible, and considers the feasibility of narrower and softer forms of cooperation.
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at firstname.lastname@example.org. Thank you.