‘Private’ Cybersecurity Standards? Cyberspace Governance, Multistake Holderism, and the (Ir)relevance of the TBT Regime
Shin-yi Peng
Cornell International Law Journal2018article
ABDC B
Weight
0.67
Abstract
We are now living in a hyper-connected world, with a myriad of devices continuously linked to the Internet. Our growing dependence on such devices exposes us to a variety of cybersecurity threats. This ever-increasing connectivity means that vulnerabilities can be introduced at any phase of the software development cycle. Cybersecurity risk management, therefore, is more important than ever to governments at all developmental stages as well as to companies of all sizes and across all sectors. The awareness of cybersecurity threats affects the importance placed on the use of standards and certification as an approach.
10 citations
Evidence weight
0.67
Balanced mode · F 0.40 / M 0.15 / V 0.05 / R 0.40
F · citation impact
0.83 × 0.4 = 0.33
M · momentum
0.73 × 0.15 = 0.11
V · venue signal
0.50 × 0.05 = 0.03
R · text relevance †
0.50 × 0.4 = 0.20
† Text relevance is estimated at 0.50 on the detail page — for your query’s actual relevance score, open this paper from a search result.