Within this Book Full site



Filter my results

ISBN of the Book

Material or Process Book or Chapter Title Author or Editor Publication dates

Routledge Handbook of International Cybersecurity

Edited by: Eneken Tikk , Mika Kerttunen

Print publication date:  February  2020
Online publication date:  January  2020

Print ISBN: 9781138489011
eBook ISBN: 9781351038904
Adobe ISBN:

 Cite  Marc Record

Book description

The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security.

Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development.

The volume is split into four thematic sections:

  • Concepts and frameworks;
  • Challenges to secure and peaceful cyberspace;
  • National and regional perspectives on cybersecurity;
  • Global approaches to cybersecurity.

This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general.

Table of contents

Prelims Download PDF
Introduction Download PDF
Chapter  1:  Cybersecurity between hypersecuritization and technological routine Download PDF
Chapter  2:  Correlates of state-sponsored cyber conflict Download PDF
Chapter  3:  Cybered conflict, hybrid war, and informatization wars Download PDF
Chapter  4:  The politics of stability Download PDF
Chapter  5:  In search of human rights in multilateral cybersecurity dialogues Download PDF
Chapter  6:  International governance of/in cyberspace Download PDF
Chapter  7:  The becoming of cyber-military capabilities Download PDF
Chapter  8:  Cyber vulnerability Download PDF
Chapter  9:  Ensuring the security and availability of critical infrastructure in a changing cyber-threat environment Download PDF
Chapter  10:  Steps to an ecology of cyberspace as a contested domain Download PDF
Chapter  11:  Cybercrime Download PDF
Chapter  12:  Cyberterrorism Download PDF
Chapter  13:  Information operations Download PDF
Chapter  14:  National cyber commands Download PDF
Chapter  15:  Cyber capacity-building and international security Download PDF
Chapter  16:  Challenges in building regional capacities in cybersecurity Download PDF
Chapter  17:  Singapore, ASEAN, and international cybersecurity Download PDF
Chapter  18:  Sub-regional views on international cybersecurity Download PDF
Chapter  19:  Regional cybersecurity approaches in Africa and Latin America Download PDF
Chapter  20:  A regional view on international cybersecurity Download PDF
Chapter  21:  Risk, resilience, and retaliation Download PDF
Chapter  22:  International information security Download PDF
Chapter  23:  People’s Republic of China Download PDF
Chapter  24:  Cyber diplomacy Download PDF
Chapter  25:  Confidence-building measures in cyberspace Download PDF
Chapter  26:  Export controls Download PDF
Chapter  27:  Global cybersecurity and the private sector Download PDF
Chapter  28:  Putting the technical community back into cyber (policy) Download PDF
Chapter  29:  Economic cybersecurity law Download PDF
Chapter  30:  The role of the UN Security Council in cybersecurity Download PDF
Chapter  31:  International law and cyber conflict Download PDF
Chapter  32:  Exploring the general principles of international law in the cybersecurity context Download PDF
Chapter  33:  What do we talk about when we talk about international cybersecurity Download PDF
Index Download PDF
Search for more...

Back to top

Use of cookies on this website

We are using cookies to provide statistics that help us give you the best experience of our site. You can find out more in our Privacy Policy. By continuing to use the site you are agreeing to our use of cookies.