SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Cyber Terrorism and Information Security across National Policies and International Diplomacy

1 min read
in Career, Document, Paper

 

Abstract

This article analyses the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG).

First, it reveals how – through the extension of preemptive measures to low-impact cyber activities and online content – national policies progressively articulate cyber terrorism as an issue of information security.

Second, it problematizes how – through the adoption of comprehensive and imprecise definitions – the diplomatic language on cyber terrorism might lend international support to those authoritarian regimes keen on leveraging counter-terrorism to persecute domestic oppositions and vulnerable groups.

Third, it concludes that – with UN diplomatic efforts increasingly discussing countering (dis)information operations – combining normative debates on cyber terrorism with those on information security requires precision of language to safeguard human rights globally.

 

GET DOCUMENT

Related

Tags: DocumentsPaperTerrorist GroupTerrorist Group Paper
4
VIEWS
ADVERTISEMENT

Related Posts

PCI POINT-TO-POINT ENCRYPTION (P2PE) ASSESSOR

PCI POINT-TO-POINT ENCRYPTION (P2PE) ASSESSOR

May 20, 2022
PCI FORENSIC INVESTIGATOR (PFI)

PCI FORENSIC INVESTIGATOR (PFI)

May 20, 2022
3DS ASSESSOR QUALIFICATION

3DS ASSESSOR QUALIFICATION

May 20, 2022
INTERNAL SECURITY ASSESSOR (ISA)

INTERNAL SECURITY ASSESSOR (ISA)

May 20, 2022

More Articles

MS-100: Microsoft 365 Identity and Services Certification

April 12, 2021
Book

HIPAA for Health Care Professionals

April 1, 2022

Cloud service provider

November 16, 2020

Firewall

November 18, 2020

Malicious Life: – THE INVISIBLE WAR / EPISODE 18

May 11, 2022
Alerts

ISC Releases Security Advisory for BIND

October 28, 2021
Book

Security Information and Event Management

March 15, 2022
Incidents

Oregon medical group notifies 750,000 patients of data breach

December 15, 2021
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....