Jump to ContentJump to Main Navigation
Social Practices of Rule-Making in World Politics$
Users without a subscription are not able to see the full content.

Mark Raymond

Print publication date: 2019

Print ISBN-13: 9780190913113

Published to Oxford Scholarship Online: March 2019

DOI: 10.1093/oso/9780190913113.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 13 November 2019

Rules for State Conduct in the Cyber Domain

Rules for State Conduct in the Cyber Domain

Chapter:
(p.203) Chapter 5 Rules for State Conduct in the Cyber Domain
Source:
Social Practices of Rule-Making in World Politics
Author(s):

Mark Raymond

Publisher:
Oxford University Press
DOI:10.1093/oso/9780190913113.003.0006

This chapter explains the puzzling 2013 agreement of the UN Group of Governmental Experts (GGE) on cybersecurity that existing international law applies to state military use of information and communication technologies (ICTs), and the 2015 GGE report that extended the consensus reached in 2013. These important developments in the emergence of rules and norms for cyberspace took place despite deteriorating relations between the United States and Russia. They also took place despite increasing global contention over Internet governance and cybersecurity issues more broadly, and occurred with less controversy than related (but lower-priority) Internet governance issues. The chapter argues that the 2013 and 2015 GGE reports were reached in large part as a result of a conscious process of rule-making and interpretation structured by agreed-upon secondary rules, and that the timing of the agreements reflected emerging consensus among participants despite remaining divergence on substantive preferences about governance arrangements for cyberspace.

Keywords:   IR theory, constructivism, rules, procedural rules, secondary rules, social practice, cybersecurity, United Nations, international law, sovereignty

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .