CBMs, Norms and Cyberdiplomacy

This topic is part of Cyber Security Policy and Strategy
  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 57-70 of 74 results

   
   
Tool

Permanent Council Decision No. 1106: Initial Set of OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the use of Information and Communication Technologies (Russian Federation, Interpretative Statement).

Authors

Year

  • 2013

Description

  • Contains details of the 975th plenary meeting on initial set of OSCE confidence-building measures to…

 

Permanent Council Decision No. 1106: Initial Set of OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the use of Information and Communication Technologies (Russian Federation, Interpretative Statement).

Contains details of the 975th plenary meeting on initial set of OSCE confidence-building measures to reduce the risks of conflict stemming from the use of information and communication technologies (Russian Federation, interpretative statement).

Tool

Permanent Council Decision No. 1202: OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the use of Information and Communication Technologies.

Authors

Year

  • 2016

Description

  • Contains details of the 1092nd Plenary Meeting on the Permanent Council Decision No. 1106: Initial S…

 

Permanent Council Decision No. 1202: OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the use of Information and Communication Technologies.

Contains details of the 1092nd Plenary Meeting on the Permanent Council Decision No. 1106: Initial Set of OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the use of Information and Communication Technologies (Russian Federation, Interpretative Statement).

Tool

Decision No. 5/17 – Enhacing OSCE Efforts to Reduce the Risk of Conflict Stemming from the Use of Information and Communication Technologies

Authors

Year

  • 2017

Description

  • Contains details on Second day of the 2rth OSCE meeting on enhacing OSCE efforts to reduce the risk …

 

Decision No. 5/17 – Enhacing OSCE Efforts to Reduce the Risk of Conflict Stemming from the Use of Information and Communication Technologies

Contains details on Second day of the 2rth OSCE meeting on enhacing OSCE efforts to reduce the risk of conflict stemming from the use of information and communication technologies.

Publication

International Cyber Norms: Legal, Policy and Industry Perspectives

Authors

Year

  • 2016

Description

  • The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a serie…

 

International Cyber Norms: Legal, Policy and Industry Perspectives

The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a series of workshops organised by the NATO CCD COE during 2014-2015.1 The aim of the collection of articles is to shed light on the different approaches to ‘cyber norms’ in various research domains. The articles […]

Publication

Confidence Building Measures and International Cybersecurity

Authors

Year

  • 2013

Description

  • The meeting in Zurich took place at an important moment. Recent events have shown that much remains …

 

Confidence Building Measures and International Cybersecurity

The meeting in Zurich took place at an important moment. Recent events have shown that much remains to be done to ensure and strengthen confidence between states and society around the different uses of cyberspace. Meanwhile, mistrust between states regarding the use of cyberspace continues to rise, not least due […]

Publication

Voluntary, Non-binding Norms for Responsible State Behavior in the Use of ICT – A Commentary

Authors

Year

  • 2017

Description

  • This publication contains a commentary on the voluntary, non-binding norms of responsible State beha…

 

Voluntary, Non-binding Norms for Responsible State Behavior in the Use of ICT – A Commentary

This publication contains a commentary on the voluntary, non-binding norms of responsible State behavior from the 2015 report of the United Nations Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security. In an open call for comments, scholars, experts […]

Publication

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations

Authors

Year

  • 2017

Description

  • The most comprehensive guide for policy advisors and legal experts on how existing International Law…

 

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations

The most comprehensive guide for policy advisors and legal experts on how existing International Law applies to cyber operations. The Tallinn Manual process is continuing with a legal, technical, strategic and operational assessment of cyber scenarios, with the aim of publishing a practical reference source for Cyber Commands. Source – […]

Tool

International Cyber Law in Practice: Interactive Toolkit

Authors

Year

  • 2024

Description

  • The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work w…

 

International Cyber Law in Practice: Interactive Toolkit

The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work with matters at the intersection of international law and cyber operations. The Toolkit may be explored and utilized in a number of different ways. At its core, it presently consists of 32 hypothetical scenarios. Each […]

Tool

Professor Cy Burr’s Graphic Guide to: INTERNATIONAL CYBER NORMS

Authors

Year

  • 2016

Description

  • Let’s start with the basics. We all want a nice, safe, stable world.. …where bad guys don’…

 

Professor Cy Burr’s Graphic Guide to: INTERNATIONAL CYBER NORMS

Let’s start with the basics. We all want a nice, safe, stable world.. …where bad guys don’t do bad things, right? Norms can help us move in that direction. Internationally, norms are one of three tools available to limit destructive behavior by bad actors.The other two are coercion and treatiesor […]

Tool

Decision No. 5/16 OSCE Efforts Related to Reducing the Risks of Conflict Stemming from the Use of ICT

Authors

Year

  • 2016

Description

  • Reaffirming that efforts by OSCE participating States to reduce the risks of conflict stemming from …

 

Decision No. 5/16 OSCE Efforts Related to Reducing the Risks of Conflict Stemming from the Use of ICT

Reaffirming that efforts by OSCE participating States to reduce the risks of conflict stemming from the use of information and communication technologies will be consistent with: international law, including, inter alia, the UN Charter and the International Covenant on Civil and Political Rights; the Helsinki Final Act; and their responsibilities […]

Tool

Norms Package Singapore

Authors

Year

  • 2018

Description

  • From its very beginnings, cyberspace has been designed in a decentralized manner, and therefore rela…

 

Norms Package Singapore

From its very beginnings, cyberspace has been designed in a decentralized manner, and therefore relatively loosely governed. This helped encourage the fledging technology and was likely critical for its rapid growth. Cyberspace has created unprecedented social and economic benefits, but it also created real risks and challenges for international peace […]

Tool

UN GGE 2015 Report

Authors

Year

  • 2015

Description

  • Information and communications technologies (ICTs) provide immense opportunities and continue to gro…

 

UN GGE 2015 Report

Information and communications technologies (ICTs) provide immense opportunities and continue to grow in importance for the international community. However, there are disturbing trends that create risks to international peace and security. Effective cooperation among States is essential to reduce those risks. The 2015 Group of Governmental Experts on Developments in […]

Tool

Online Cyberdiplomacy Training Course

Authors

Year

  • 2019

Description

  • An online training course to encourage greater understanding of the use of ICTs and its implications…

 

Online Cyberdiplomacy Training Course

An online training course to encourage greater understanding of the use of ICTs and its implications for international security.

Tool

Norms Implementation Toolkit

Authors

Year

  • 2018

 

Norms Implementation Toolkit

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.