NUK - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 97
1.
  • Subversion Inc: The Age of ... Subversion Inc: The Age of Private Espionage
    Deibert, Ronald J Journal of democracy, 04/2022, Volume: 33, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Over the last decade, a sophisticated and lucrative industry has sprung up that puts potent surveillance and intelligence capabilities in the hands of a wide range of private actors. Clandestine ...
Full text
2.
  • A tale of two cybers - how ... A tale of two cybers - how threat reporting by cybersecurity firms systematically underrepresents threats to civil society
    Maschmeyer, Lennart; Deibert, Ronald J.; Lindsay, Jon R. Journal of information technology & politics, 01/2021, Volume: 18, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Public and academic knowledge of cyber conflict relies heavily on data from commercial threat reporting. There are reasons to be concerned that these data provide a distorted view of cyber threat ...
Full text

PDF
3.
  • Toward a Human-Centric Appr... Toward a Human-Centric Approach to Cybersecurity
    Deibert, Ronald J. Ethics & international affairs, 12/2018, Volume: 32, Issue: 4
    Journal Article
    Peer reviewed

    A “national security–centric” approach currently dominates cybersecurity policies and practices. Derived from a realist theory of world politics in which states compete with each other for survival ...
Full text
4.
  • The Ethical and Legal Dilem... The Ethical and Legal Dilemmas of Digital Accountability Research and the Utility of International Norm-Setting
    Anstis, Siena; Dalek, Jakub; Deibert, Ronald J. AJIL unbound, 02/2024, Volume: 118
    Journal Article
    Peer reviewed
    Open access

    Nearly every aspect of our life is impacted by digital technologies manufactured and sold by companies. Legislative frameworks to limit the harms of such technologies have been slow to develop and ...
Full text
5.
  • Global Governance and the S... Global Governance and the Spread of Cyberspace Controls
    Deibert, Ronald J; Crete-Nishihata, Masashi Global governance, 07/2012, Volume: 18, Issue: 3
    Journal Article
    Peer reviewed

    States are moving to assert their interests more forcefully in cyberspace and associated governance regimes. Traditionally, transnational networks of engineers, based primarily in the United States ...
Full text
6.
  • Online Surveillance, Censor... Online Surveillance, Censorship, and Encryption in Academia
    Tanczer, Leonie Maria; Deibert, Ronald J; Bigo, Didier ... International studies perspectives, 02/2020 21
    Journal Article
    Peer reviewed
    Open access

    Abstract The Internet and digital technologies have become indispensable in academia. A world without email, search engines, and online databases is practically unthinkable. Yet, in this time of ...
Full text

PDF
7.
Full text
8.
  • Risking Security: Policies ... Risking Security: Policies and Paradoxes of Cyberspace Security
    Deibert, Ronald J.; Rohozinski, Rafal International political sociology, 03/2010, Volume: 4, Issue: 1
    Journal Article
    Peer reviewed

    Conceptualizations of cyberspace security can be divided into two related dimensions, articulated as 'risks': risks to the physical realm of computer and communication technologies (risks to ...
Full text
9.
  • Access Contested Access Contested
    Deibert, Ronald; Palfrey, John; Rohozinski, Rafal ... 09/2011
    eBook
    Open access

    Experts examine censorship, surveillance, and resistance across Asia, from China and India to Malaysia and the Philippines.
Full text
10.
  • Cyclones in cyberspace: Inf... Cyclones in cyberspace: Information shaping and denial in the 2008 Russia–Georgia war
    Deibert, Ronald J.; Rohozinski, Rafal; Crete-Nishihata, Masashi Security dialogue, 02/2012, Volume: 43, Issue: 1
    Journal Article
    Peer reviewed

    While the rhetoric of cyber war is often exaggerated, there have been recent cases of international conflict in which cyberspace has played a prominent role. In this article, we analyze the impact of ...
Full text
1 2 3 4 5
hits: 97

Load filters