Publication
Accountability in Cyberspace: Lessons from and for Latin America
About
Type
In this research paper, Marie Louise Hurel explores the concept of accountability in cyberspace, drawing insights relevant to Latin America.
As governments increasingly depend on third-party solutions in a privatized cybersecurity market, the notion of cyber accountability should be viewed as a shared responsibility. However, the first section of the paper reveals that discussions around state responsibility and accountability must be contextualized within the unique historical and cultural landscape of Latin America.
The second section examines the various approaches countries have taken to implement and demonstrate positive accountability. It emphasizes that accountability should not be seen as an absolute objective; rather, domestic policymaking may face internal challenges, especially as accountability gains more political visibility within the cybersecurity agenda.
In the third part, the paper addresses the obstacles and barriers to realizing accountability in the region. It highlights issues ranging from intragovernmental incentives to the risks posed by delegating cybersecurity tasks, including human rights abuses facilitated by intrusive commercial cyber tools in Latin America.
Related resources
Publication
Advancing Accountability in Cyberspace: Models, Mechanisms, and Multistakeholder Approaches
Authors
Year
- 2024
Description
- In this research paper, Marie Louise Hurel explores the concept of accountability in cyberspa…
Advancing Accountability in Cyberspace: Models, Mechanisms, and Multistakeholder Approaches
This report, a product of Stimson’s Cyber Accountability Project, presents findings from a two-year research effort aimed at improving international cyber accountability and deterring malicious cyber activities. Led by Allison Pytlak, James Siebens, and a team of experts, the project draws parallels between cyberspace and other threat domains, such as […]
Publication
Cyber Accountability Building
Authors
Year
- 2024
Description
- In this research paper, Marie Louise Hurel explores the concept of accountability in cyberspa…
Cyber Accountability Building
This paper from Andrea Calderaro emphasizes the critical role of capacity in establishing accountability in cyberspace. It argues that for states to implement norms of responsible behavior, they must develop technical capabilities, access to information, and institutional resources. While capacity-building efforts have primarily targeted nation-states, the paper advocates for a […]
Publication
Deterrence and Accountability
Authors
Year
- 2024
Description
- In this research paper, Marie Louise Hurel explores the concept of accountability in cyberspa…
Deterrence and Accountability
In cyberspace, the effectiveness of deterrence remains contested. Deterrence involves influencing adversary behavior in a way that prevents them from engaging in malicious acts. Deterrence necessitates similar conditions as accountability, such as transparency, openness, and the ability to impose consequences for undesirable behavior. To explore the relationship between accountability and […]
Tool
Introduction to Cybersecurity Governance – A Tool for Members of Parliament
Authors
Year
- 2019
Description
- In this research paper, Marie Louise Hurel explores the concept of accountability in cyberspa…
Introduction to Cybersecurity Governance – A Tool for Members of Parliament
This introduction, a Tool for members of parliament, explains the main elements of cybersecurity and its governance: cybercrime, cyberwar, cyberterrorism, cyberespionage and hacktivism and the challenges and opportunities in governing them. Each section is complemented with a list of possible questions that members of parliament can raise in relation to […]
Tool
NIST Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
Authors
Year
- 2017
Description
- In this research paper, Marie Louise Hurel explores the concept of accountability in cyberspa…
NIST Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
This publication describes the Risk Management Framework (RMF) and provides guidelines for applying the RMF to information systems and organizations. The RMF provides a disciplined, structured, and flexible process for managing security and privacy risk that includes information security categorization; control selection, implementation, and assessment; system and common control authorizations; […]
Other resources
Project
ITU Cyberdrill for the ASP region
Implementors
Themes & Topics
- Cyber Incident Management & Critical Information Protection
- National Computer Security Incident Response
Assessment of Cybersecurity Ecosystem in the Republic of Serbia
The aim of the project, under the Norway for You programme, is to increase Serbia’s cybersecurity and preparedness against cyber-attacks through the strengthening of cybersecurity governance, legal framework and Critical Information Infrastructure (CII) protection. Specifically, this project is aimed at facilitation of adoption and implementation of a coherent, holistic, strategic […]
Tool
Establish a Clearinghouse for Gathering Systemic Risk Conditions Data in Global Networks
Authors
Year
- 2017
Description
- Internet networks are replete with systemic vulnerabilities. CERTs and other trusted operators req…
Establish a Clearinghouse for Gathering Systemic Risk Conditions Data in Global Networks
Internet networks are replete with systemic vulnerabilities. CERTs and other trusted operators require reliable information about their network’s health over time. Various organisations have set up systems to scan networks for vulnerabilities and/or monitor cyber-attacks. Many of these sources are open, but their provenance and collection processes are often opaque. […]
Project
ITU Sixth Africa Region Cyberdrill
Beneficiary Countries
Beneficiary groups
Implementors
Themes & Topics
- Cyber Incident Management & Critical Information Protection
- National Computer Security Incident Response






