Abstract
States have accentuated efforts to build cybersecurity strategies and offensive and defensive capabilities in the last two decades. While states have balanced efforts to promote mobility of capital, people, and goods and services with security measures to protect fixed investment and national assets, these efforts suggest a shift in the mix of openness and control. While this balance has long been a part of states’ foreign policy and international relations, the promotion of network security highlights some core tensions between international conflict and cooperation in promoting cybersecurity. The Organization for Economic Cooperation and Development (OECD), and the International Telecommunications Union (ITU) have emphasized cooperation among participants in preventing harm to the network and in enhancing a “culture of security.” The ITU has a longstanding principle of preventing harm to the network, and Anthony Rutkowski argues that this extends to new online networks and services. These international efforts aim to build a broad international community of participants promoting the security of physical networks, applications and uses, content, and data about individuals. The chapter examines these international efforts to advance cooperative approaches to network security and cybersecurity. It assesses these multilateral efforts in light of recent moves by states to advance more strategic national approaches to network security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bajaj, K. (2010). The cybersecurity agenda: Mobilizing for international action. Available via The EastWest Institute. http://www.ewi.info/system/files/Bajaj_Web.pdf.
Bennett, R. (2012). The gathering storm: WCIT and the global regulation of the internet. Available via The Information Technology & Innovation Foundation. Retrieved December 12, 2012. from http://www2.itif.org/2012-gathering-storm-wcit-regulations.pdf.
Berlin, I. (1958). Two concepts of liberty. In Isaiah Berlin (1969), Four essays on liberty. Oxford: Oxford University Press.
Braman, S. (2006). Change of state: Information, policy, and power. Cambridge MIT Press.
Choucri, N., & Goldsmith, D. (2012). Lost in cyberspace: Harnessing the internet, international relations, and global security. Bulletin of the Atomic Scientists, 68(2), 70–77.
Donohue, M. (2003). Consumer protection across borders: OECD work to build consumer trust in the digital economy. Presentation at the OECD/UN/World Bank Global Forum: Integrating ICT in Development Programmes, Paris, 5 March 2003.
EastWest Institute. (2010). Protecting the digital economy: The first worldwide cybersecurity summit in Dallas. Dallas, 2010.
Ford, C. A.(2010). The trouble with cyber arms control. The New Atlantis Fall, 29, 52–67.
Goldsmith, J. (2011). Cybersecurity treaties: a skeptical view. In: Future challenges in national security and law. http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf
Goodman, S. E., Kirk, J. C., & Kirk, M. H. (2007). Cyberspace as a medium for terrorists. Technological Forecasting and Social Change, 74(2), 193–210.
Hughes, R. (2010). A treaty for cyberspace. International Affairs, 86(2), 523–541.
Mathieu, G. (2007). Cyberterrorism: Hype or reality? Computer Fraud & Security, 2007(2), 9–12.
The Information Warfare Site. (2011). Information Warfare Site. http://www.iwar.org.uk/index.htm
International Telecommunications Union. (2012a). Final acts of the world conference on international telecommunications. Dubai: International Telecommunications Union.
International Telecommunications Union. (2012b). Global cybersecurity agenda. http://www.itu.int/osg/csd/cybersecurity/gca/new-gca-brochure.pdf.
International Telecommunications Union. (2012c). WCIT-12:vMyth-busting presentation. http://www.itu.int/en/wcit-12/Pages/WCIT-backgroundbriefs.aspx.
International Telecommunications Union. (2003a). Geneva declaration of principles. In: First phase of the WSIS. Geneva, 10–12 December 2003. Retrieved from http://www.itu.int/wsis/documents/doc_multi.asp?lang=en&id=1161%7C0.
International Telecommunications Union. (2003b). Geneva plan of action. In: First phase of the WSIS. Geneva, 10–12 December 2003. Retrieved from http://www.itu.int/wsis/documents/doc_multi.asp?lang=en&id=1160%7C0.
International Telecommunications Union. (2004). ITU and its activities related to internet-protocol (IP) networks. Geneva: ITU.
International Telecommunications Union. (2005a). Tunis commitment. In: Second phase of the WSIS. Tunis, 16–18 November 2005. Retrieved from http://www.itu.int/wsis/documents/doc_multi.asp?lang=en&id=2266%7C2267.
International Telecommunications Union. (2005b). Tunis agenda for the information society. In: Second phase of the WSIS. Tunis, 16–18 November 2005. Retrieved from http://www.itu.int/wsis/documents/doc_multi.asp?lang=en&id=2266%7C2267.
International Telecommunications Union. (2008). Global security agenda high level experts group global security report. http://www.itu.int/osg/csd/cybersecurity/gca/global_strategic_report/index.html.
International Telecommunications Union. (2011). The ITU national cybersecurity strategy guide. http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf.
International Telecommunications Union. (2012d). Cybersecurity gateway. http://groups.itu.int/Default.aspx?alias=groups.itu.int/cybersecurity-gateway.
Kahin, B., & Abbate, J. (Eds.). (1995). Standards for information infrastructure. Cambridge: MIT Press.
Kahin, B., & Nesson, C. (1997). Borders in cyberspace: Information policy and the global information infrastructure. Cambridge: MIT Press.
Keohane, R. O. (1984). After hegemony: Cooperation and discord in the world political economy. Princeton, NJ: Princeton University Press.
Koh, HH. (2012). International law in cyberspace. Remarks at USCYBERCOM Interagency Legal conference, Ft. Meade, MD. Retrieved September 18, 2012. from http://www.state.gov/s/l/releases/remarks/197924.htm.
Libicki, M. (1996). The emerging primacy of information. Orbis, 40, 261–274.
Nojeim, G. T. (2010). Cybersecurity and freedom on the internet. Journal of National Security law and Policy, 4, 119–137.
Nye, J. S. (2011). Nuclear lessons for cyber security. Strategic Studies Quarterly, 5(4), 18–38.
Organization for Economic Cooperation and Development. (1992). OECD guidelines for the security of information systems, 1992. http://www.oecd.org/internet/ieconomy/oecdguidelinesforthesecurityofinformationsystems1992.htm.
Organization for Economic Cooperation and Development. (1999). Guidelines for consumer protection in electronic commerce. Paris: OECD.
Organization for Economic Cooperation and Development. (2001). Business to consumer electronic commerce: An update on the statistics. Paris: OECD.
Organization for Economic Cooperation and Development. (2002). OECD guidelines for the security of information systems and networks: Towards a culture of security. http://www.oecd.org/dataoecd/16/22/15582260.pdf.
Organization for Economic Cooperation and Development. (2004). Electronic commerce. http://www.oecd.org/development/electroniccommerce.htm.
Organization for Economic Cooperation and Development. (2005). The promotion of a culture of security for information systems and networks: Towards a culture of security. http://oe.cd/2002sg.
Organization for Economic Cooperation and Development. (2007). Development of policies for the protection of critical information infrastructures. In: Report on OECD ministerial meeting on the future of the internet economy. Seoul, 17–18 June 2008. Retrieved from http://www.oecd.org/sti/40761118.pdf.
Organization for Economic Cooperation and Development. (2011). Communique on principles for internet policy-making. In: OECD high level meeting on the internet economy. Paris, 28–29 June 2011. Retrieved from http://www.oecd.org/internet/innovation/48289796.pdf.
Organization for Economic Cooperation and Development. (2012a). Recommendation of the council concerning guidelines for the security of information systems and networks: Towards a culture of security. acts.oecd.org/instruments/ShowInstrumentView.aspx?InstrumentID=116&Lang=en&Book=False.
Organization for Economic Cooperation and Development. (2012b). Cybersecurity policy making at a turning point: Analysing a new generation of national cybersecurity strategies for the internet economy. OECD Digital Economy Papers. doi:10.1787/5k8zq92vdgtl-en.
Organization for Economic Cooperation and Development. (2012c). The role of the 2002 security guidelines: Towards cybersecurity for an open and interconnected economy. OECD Digital Economy Papers. doi: 10.1787/5k8zq930xr5j-en.
Organization for Economic Cooperation and Development, Committee for Information, Computers, and Communications Policy. (1997). Global information infrastructure—Global information society (GII-GIS) policy requirements. Paris: OECD.
Pfanner, E. (2012). US rejects telecommunications treaty. In: The New York Times, Retrieved December 13 from http://www.nytimes.com/2012/12/14/technology/14iht-treaty14.html?_r=0&adxnnl=1&pagewanted=1&adxnnlx=1363493660-nqCPGplj9 LwTJStzmwbxg.
Rothkopf, D. J .(1998). Cyberpolitik: The changing nature of power in the information age. Journal of International Affairs, 51, 325–360.
Rutkowski, A. M. (2005). The ITU treaty provisions for infrastructure protection: How they came to be and why they are relevant today In: ITU meeting on cybersecurity, Geneva, Retrieved 29 June–1 July 2005. from http://www.itu.int/osg/csd/wtpf/wtpf2009/resources/infrastructure_protection_treaty_2%203.pdf.
Rutkowski, A. M. (2011). Public international law of the international telecommunications instruments: Cyber security treaty provisions since 1850. Info, 13(1), 13–31.
Schjolber, S., & Ghernaouti-Helie, S. (2011). A global treaty on cybersecurity and cybercrime. (2nd ed.). http://www.cybercrimelaw.net/documents/A_Global_Treaty_on_Cybersecurity_and_Cybercrime,_Second_edition_2011.pdf.
Sofaer, A. D, Clark, D, Diffie, W. (2010). Cybersecurity and international agreements. In: Proceedings of a workshop on deterring cyberattacks: Informing strategies and developing options for U.S. Policy, Committee on Deterring Cyberattacks: Informing Strategies and Developing Options; National Research Council. Available: https://download.nap.edu/catalog.php?record_id=12997.
Spade, J. M. (2012). Information as power: China’s cyber power and America’s national security. Carlisle Barracks, PA, US Army War College. http://www.carlisle.army.mil/dime/documents/China’s%20Cyber%20Power%20and%20America’s%20National%20Security%20Web%20Version.pdf.
Sternstein, A. (2011). International cybersecurity treaty might not be achievable, Report says. Available via Nextgov. http://www.nextgov.com/cybersecurity/2011/01/international-cybersecurity-treaty-might-not-be-achievable-report-says/48282/.
Sternstein, A. (2012). U.S., Russia, other nations near agreement on cyber early-warning pact. Available via Nextgov. http://www.nextgov.com/cybersecurity/2012/12/us-russia-other-nations-near-agreement-cyber-early-warning-pact/59977/.
Take, I. (2012). Regulating the internet infrastructure: A comparative appraisal of the legitimacy of ICANN, ITU, and the WSIS. Regulation and Governance 6(4).
Tigre, PB and O’Connor, D. (2002). Policies and institutions for e-commerce readiness: What can developing countries learn from OECD experience? In: OECD Development Centre, Technical Papers No. 189. Paris: OECD Publishing.
United Nations. (2003). Creation of a global culture of cyber security. In: General assembly resolution. www.itu.int/osg/spu/cybersecurity/docs/UN_resolution_57_239.pdf.
United States Department of Homeland Security. (2009). National infrastructure protection plan, partnering to enhance protection and resiliency. http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf.
United States. (2002). National strategy to secure cyberspace. http://www.whitehouse.gov/pcipb/.
United States. (1996). A framework for global electronic commerce. http://clinton4.nara.gov/WH/New/Commerce/read.html.
Zacher, M., & Sutton, B. (1996). Governing global networks: International regimes for transportation and communications. Cambridge: Cambridge University Press.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
McDowell, S.D., Nensey, Z., Steinberg, P.E. (2014). Cooperative International Approaches to Network Security: Understanding and Assessing OECD and ITU Efforts to Promote Shared Cybersecurity. In: Kremer, JF., Müller, B. (eds) Cyberspace and International Relations. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37481-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-37481-4_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37480-7
Online ISBN: 978-3-642-37481-4
eBook Packages: Humanities, Social Sciences and LawPolitical Science and International Studies (R0)