Depleted Trust in the Cyber Commons
نویسنده
چکیده
Policymakers increasingly recognize the need for agreements to regulate cyber behaviors at the international level. In 2010, the United Nations Group of Governmental Experts on Developments in the Field of Infor mation and Telecommunications in the Context of International Secu rity recommended “dialogue among States to discuss norms pertaining to State use of ICTs [information and communications technology], to reduce collective risk and protect critical national and international in frastructure.”1 Since then, the United States, Russia, China, and several other cyber powers have proposed norms for discussion, and in November 2011, the United Kingdom convened an intergovernmental conference to discuss cyber “rules of the road.”2 These activities are a positive change from the first decade of this century, when the United States and Russia could not agree on what should be discussed and the one existing inter national agreement for cyberspace—the Budapest Convention on Cyber crime—gained little traction. Nevertheless, the search for agreement has a long way to go. Homeland Security secretary Janet Napolitano noted in summer 2011 that efforts for “a comprehensive international frame work” to govern cyber behaviors are still at “a nascent stage.”3 That search may well be disappointing. Council on Foreign Relations fellows Adam Segal and Matthew Waxman caution that “the idea of ultimately negotiat ing a worldwide, comprehensive cybersecurity treaty is a pipe dream.” In their views, differences in ideologies and strategic priorities will keep the United States, Russia, and China from reaching meaningful agreements: “With the United States and European democracies at one end and China
منابع مشابه
Learning cyber trust using a triadic functioning analysis: a qualitative approach
The issue of cyber trust has been scattered in several different fields, including computer science, information science and some social sciences. Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of social informatics on cyber trust. Therefore, it is essential to establish...
متن کاملA Hybrid Trust Management Framework for Wireless Sensor and Actuator Networks in Cyber-Physical Systems
To secure a wireless sensor and actuator network (WSAN) in cyber-physical systems, trust management framework copes with misbehavior problem of nodes and stimulate nodes to cooperate with each other. The existing trust management frameworks can be classified into reputation-based framework and trust establishment framework. There, however, are still many problems with these existing trust manag...
متن کاملTowards a Trust Envisioned Cyber Security
Ensuring trust in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analyzing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and verify trust. Trust can also be established via a third party. But can we kn...
متن کاملNSF Activities in Cyber Trust
“Cyber Trust” is an umbrella term under which NSF/CISE has organized research focused on improving the ability of a computer-based component or system to repel, resist, detect, or tolerate malicious attacks while providing a desired function. Cyber Trust encompasses security (in terms of secrecy, confidentiality, integrity and availability), as well as privacy, correctness, reliability, safety ...
متن کاملIncentive-based Cyber Trust
Many problems in cyber trust exist at least partially because the people and institutions involved are not properly motivated to solve them. The incentives are often perverse, misaligned, or missing. By improving economic, social, and personal incentives, cyber trust can be significantly improved. The incentive-based approach is based on modern enterprise risk management methods and experiences...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012