‘Private’ Cybersecurity Standards? Cyberspace Governance, Multistake Holderism, and the (Ir)relevance of the TBT Regime

Shin-yi Peng

Cornell International Law Journal2018article
ABDC B
Weight
0.67

Abstract

We are now living in a hyper-connected world, with a myriad of devices continuously linked to the Internet. Our growing dependence on such devices exposes us to a variety of cybersecurity threats. This ever-increasing connectivity means that vulnerabilities can be introduced at any phase of the software development cycle. Cybersecurity risk management, therefore, is more important than ever to governments at all developmental stages as well as to companies of all sizes and across all sectors. The awareness of cybersecurity threats affects the importance placed on the use of standards and certification as an approach.

10 citations

Cite this paper

@article{shin-yi2018,
  title        = {{‘Private’ Cybersecurity Standards? Cyberspace Governance, Multistake Holderism, and the (Ir)relevance of the TBT Regime}},
  author       = {Shin-yi Peng},
  journal      = {Cornell International Law Journal},
  year         = {2018},
}

Paste directly into BibTeX, Zotero, or your reference manager.

Flag this paper

‘Private’ Cybersecurity Standards? Cyberspace Governance, Multistake Holderism, and the (Ir)relevance of the TBT Regime

Flags are reviewed by the Arbiter methodology team within 5 business days.


Evidence weight

0.67

Balanced mode · F 0.40 / M 0.15 / V 0.05 / R 0.40

F · citation impact0.83 × 0.4 = 0.33
M · momentum0.73 × 0.15 = 0.11
V · venue signal0.50 × 0.05 = 0.03
R · text relevance †0.50 × 0.4 = 0.20

† Text relevance is estimated at 0.50 on the detail page — for your query’s actual relevance score, open this paper from a search result.