2,592
Views
4
CrossRef citations to date
0
Altmetric
Special Issue: International Cybersecurity Governance

Authoritarian multilateralism in the global cyber regime complex: The double transformation of an international diplomatic practice

ORCID Icon & ORCID Icon

References

  • Adler-Nissen, R., & Pouliot, V. (2014). Power in practice: Negotiating the international intervention in Libya. European Journal of International Relations, 20(4), 889–911. https://doi.org/10.1177/1354066113512702
  • Allan, B., Vucetic, S., & Hopf, T. (2018). The distribution of identity and the future of international order: China’s hegemonic prospects. International Organization, 72(4), 839–869. https://doi.org/10.1017/S0020818318000267
  • Ambrosio, T. (2008). Catching the ‘Shanghai spirit’: How the Shanghai cooperation organization promotes authoritarian norms in Central Asia. Europe-Asia Studies, 60(8), 1321–1344.
  • Barrinha, A., & Turner, R. (2024). Strategic narratives and the multilateral governance of cyberspace: The cases of European Union, Russia, and India. Contemporary Security Policy, 45(1), 72–109. https://doi.org/10.1080/13523260.2023.2266906
  • Bettiza, G., & Lewis, D. (2020). Authoritarian powers and norm contestation in the liberal international order: Theorizing the power politics of ideas and identity. Journal of Global Security Studies, 5(4), 559–577. https://doi.org/10.1093/jogss/ogz075
  • Blank, S. (2013). Making sense of the Shanghai cooperation organization. Georgetown Journal of International Affairs, 14(2), 39–49.
  • Bradshaw, S., DeNardis, L., Hampson, F. O., Jardine, E., & Raymond, M. (2015). The emergence of contention in global internet governance.
  • Büthe, T., & Walter, M. (2011). The new global rulers: The privatization of regulation in the world economy. Princeton University Press.
  • Carr, M. (2015). Power plays in global internet governance. Millennium: Journal of International Studies, 43(2), 640–659. https://doi.org/10.1177/0305829814562655
  • Casier, T. (2021). Russia and the diffusion of political norms: The perfect rival? Democratization, 29(3), 433–450. https://doi.org/10.1080/13510347.2021.1928078
  • Cooley, A., & Nexon, D. (2020). Exit from hegemony: The unraveling of the American global order. Oxford University Press.
  • Copelovitch, M., & Pevehouse, J. C. W. (2019). International organizations in a New Era of populist nationalism. The Review of International Organizations, 14(2), 169–186. https://doi.org/10.1007/s11558-019-09353-1
  • Creemers, R. (2021). Cybersecurity Law and regulation in China: Securing the smart state. China Law and Society Review, 6, 111–145. https://doi.org/10.1163/25427466-06020001
  • Creemers, R. (2022). China’s emerging data protection framework. Journal of Cybersecurity, 8(1), tyac011. https://doi.org/10.1093/cybsec/tyac011
  • Curato, N., & Fossati, D. (2020). Authoritarian innovations: Crafting support for a less democratic Southeast Asia. Democratization, 27(6), 1006–1020. https://doi.org/10.1080/13510347.2020.1777985
  • Cutler, A. C., Haufler, V., & Porter, T. (1999). Private authority and international affairs. SUNY Press.
  • Daneman, M., & Buskirk, H. (2022). Russian defeat at ITU plenary seen reflecting Ukraine outrage. Communications Daily. https://communicationsdaily.com/news/2022/03/14/russian-defeat-at-itu-sector-plenary-seen-reflecting-ukraine-outrage-2203110058
  • Debre, M. J. (2021). The dark side of regionalism: How regional organizations help authoritarian regimes to boost survival. Democratization, 28(2), 394–413. https://doi.org/10.1080/13510347.2020.1823970
  • DeNardis, L. (2014). The global War for internet governance. Yale University Press.
  • DeNardis, L. (2020). The internet in everything: Freedom and security in a world with No Off switch. Yale University Press.
  • DeNardis, L., & Raymond, M. (2017). The internet of things as a global policy frontier. UC Davis Law Review, 51(2), 475–497.
  • Drezner, D. W. (2019). Technological change and international relations. International Relations, 33(2), 286–303. https://doi.org/10.1177/0047117819834629
  • Ermoshina, K., Loveluck, B., & Musiani, F. (2022). A market of black boxes: The political economy of censorship and surveillance in Russia. Journal of Information Technology and Politics, 19(1), 18–33. https://doi.org/10.1080/19331681.2021.1905972
  • Feng, H., & He, K. (2017). China’s institutional challenges to the international order. Strategic Studies Quarterly, 11(4), 23–49.
  • Finnemore, M., & Hollis, D. B. (2016). Constructing norms for global cybersecurity. American Journal of International Law, 110(3), 425–479. https://doi.org/10.1017/S0002930000016894
  • Fung, C. (2023). China’s use of rhetorical adaptation in development of a global cyber-order: A case study of the norm of the protection of the public core of the internet. Journal of Cyber-Policy, 7(3), 256–274. https://doi.org/10.1080/23738871.2023.2178946
  • Gao, X. (2022). An attractive alternative? China’s approach to cyber-governance and its implications for the western model. The International Spectator, 57(3), 15–30. https://doi.org/10.1080/03932729.2022.2074710
  • Giles, K., & Hagestad, W. (2013). Divided by a common language: Cyber-definitions in Chinese, Russian and English. 5th International Conference on Cyber-Conflict, 1-17. http://www.conflictstudies.org.uk/files/Cyber_Common_Language.pdf
  • Ginsburg, T. (2020). How authoritarians use international Law. Journal of Democracy, 31(4), 44–58. https://doi.org/10.1353/jod.2020.0054
  • Glas, A., van der Linden, C., Hoffmann, M. J., & Denemark, R. A. (2018). Understanding multilateral treaty-making as constitutive practice. Journal of Global Security Studies, 3(3), 339–357. https://doi.org/10.1093/jogss/ogy014
  • Goddard, S. E., & Nexon, D. H. (2016). The dynamics of global power politics: A framework for analysis. Journal of Global Security Studies, 1(1), 4–18. https://doi.org/10.1093/jogss/ogv007
  • Gunitsky, S. (2015). Corrupting the cyber-commons: Social media as a tool of autocratic stability. Perspectives on Politics, 13(1), 42–54. https://doi.org/10.1017/S1537592714003120
  • Hobson, J. M., & Sharman, J. C. (2005). The enduring place of hierarchy in world politics: Tracing the social logics of hierarchy and political change. European Journal of International Relations, 11(1), 63–98. https://doi.org/10.1177/1354066105050137
  • Hoffmann, S., Lazanski, D., & Taylor, E. (2020). Standardising the splinternet: How China’s technical standards could fragment the internet. Journal of Cyber-Policy, 5(2), 239–264. https://doi.org/10.1080/23738871.2020.1805482
  • Hong, Y., & Harwit, E. (2020). China’s globalizing internet: History, power, and governance. Chinese Journal of Communication, 13(1), 1–7. https://doi.org/10.1080/17544750.2020.1722903
  • Hooghe, L., Lenz, T., & Marks, G. (2019). Contested world order: The delegitimation of international governance. The Review of International Organizations, 14(4), 731–743. https://doi.org/10.1007/s11558-018-9334-3
  • Huawei Technologies. (2020). Internet 2030: Towards a new internet for the year 2030 and beyond. International Telecommunications Union. https://www.itu.int/en/ITU-T/studygroups/2017-2020/13/Documents/Internet_2030%20.pdf
  • Huawei Technologies, China Mobile Communications, China Unicom, and Ministry of Industry and Information Technology. (2019). ‘New IP, Shaping Future Network’: Propose to initiate the discussion of strategy transformation for ITU-T. TSAG-C83. International Telecommunication Union.
  • Ikenberry, G. J. (2001). After victory: Institutions, strategic restraint, and the rebuilding of order after major wars. Princeton University Press.
  • Ikenberry, G. J., & Nexon, D. H. (2019). Hegemony studies 3.0: The dynamics of hegemonic orders. Security Studies, 28(3), 395–421. https://doi.org/10.1080/09636412.2019.1604981
  • International Telecommunication Union. (2022). Member states elect Doreen Bogdan-Martin as ITU secretary-general. International Telecommunication Union. https://www.itu.int/en/mediacentre/Pages/PR-2022-09-29-ITU-SG-elected-Doreen-Bogdan-Martin.aspx
  • Keene, E. (2013). International hierarchy and the origins of the modern practice of intervention. Review of International Studies, 39(5), 1077–1090. https://doi.org/10.1017/S0260210513000193
  • Kentikelenis, A., & Voeten, E. (2021). Legitimacy challenges to the liberal world order: Evidence from united nations speeches, 1970-2018. The Review of International Organizations, 16(4), 721–754. https://doi.org/10.1007/s11558-020-09404-y
  • Keohane, R. O. (1990). Multilateralism: An agenda for research. International Journal, 45(4), 731–764. https://doi.org/10.1177/002070209004500401
  • Kim, S. (2022). Roles and limitations of middle powers in shaping global cyber-governance. The International Spectator, 57(3), 31–47. https://doi.org/10.1080/03932729.2022.2097807
  • Koremenos, B., Lipson, C., & Snidal, D. (2001). The rational design of international institutions. International Organization, 55(4), 761–799. https://doi.org/10.1162/002081801317193592
  • Krebs, R. R., & Jackson, P. T. (2007). Twisting tongues and twisting arms: The power of political rhetoric. European Journal of International Relations, 13(1), 35–66. https://doi.org/10.1177/1354066107074284
  • Lake, D. A., Martin, L. L., & Risse, T. (2021). Challenges to the liberal order: Reflections on international organization. International Organization, 75(2), 225–257. https://doi.org/10.1017/S0020818320000636
  • Lemon, E., & Antonov, O. (2020). Authoritarian legal harmonization in the post-soviet space. Democratization, 27(7), 1221–1239. https://doi.org/10.1080/13510347.2020.1778671
  • Levinson, N. S. (2021). Idea entrepreneurs: The united nations open-ended working group & cybersecurity. Telecommunications Policy, 45(6), 102–142. https://doi.org/10.1016/j.telpol.2021.102142
  • McKune, S. (2015). An analysis of the international code of conduct for information security. Citizen Lab. https://citizenlab.ca/2015/09/international-code-of-conduct/
  • McKune, S., & Ahmed, S. (2018). The contestation and shaping of cyber-norms through China’s internet sovereignty agenda. International Journal of Communication, 12, 3835–3855.
  • Milner, H. V., & Solstad, S. U. (2021). Technological change and the international system. World Politics, 73(3), 545–589. https://doi.org/10.1017/S0043887121000010
  • Morgenbesser, L. (2020). The menu of authoritarian innovation. Democratization, 27(6), 1053–1072. https://doi.org/10.1080/13510347.2020.1746275
  • Musiani, F., Cogburn, D. L., DeNardis, L., & Levinson, N. S. (2016). The turn to infrastructure in internet governance. Palgrave Macmillan.
  • Negro, G. (2023). China's perspective on internet governance: A more integrated role in the global discussion. Journal of Chinese Political Science, 28, 105–125. https://doi.org/10.1007/s11366-022-09811-5
  • Nye, J. S. (2014). The regime complex for managing global cyber-activities. Global Commission on Internet Governance Paper Series, 1.
  • Oye, K. A. (1985). Explaining cooperation under anarchy: Hypotheses and strategies. World Politics, 38(1), 1–24.
  • Painter, C. (2021). The united nations’ cyberstability processes: Surprising progress but much left to do. Journal of Cyber-Policy, 6(3), 271–276. https://doi.org/10.1080/23738871.2021.2014920
  • Paris, R. (2020). The right to dominate: How old ideas about sovereignty pose new challenges for world order. International Organization, 74(3), 453–489. https://doi.org/10.1017/S0020818320000077
  • Patapan, H. (2022). The modern manual of authoritarian leadership. Democratization, 29(5), 958–973. https://doi.org/10.1080/13510347.2021.2023500
  • Pepinsky, T. (2020). Authoritarian innovations: Theoretical foundations and practical implications. Democratization, 27(6), 1092–1101. https://doi.org/10.1080/13510347.2020.1775589
  • Pouliot, V. (2016). Hierarchy in practice: Multilateral diplomacy and the governance of international security. European Journal of International Security, 1(1), 5–26. https://doi.org/10.1017/eis.2015.4
  • Pouliot, V. (2021). The gray area of institutional change: How the security council transforms its practices on the fly. Journal of Global Security Studies, 6(3), ogaa043. https://doi.org/10.1093/jogss/ogaa043
  • Radu, R. (2013). Negotiating meanings for cybersecurity in the cyberspace. Info, 15(6), 32–41. https://doi.org/10.1108/info-04-2013-0018
  • Radu, R. (2019). Negotiating internet governance. Oxford University Press.
  • Raustiala, K., & Victor, D. G. (2004). The regime complex for plant genetic resources. International Organization, 58(2), 277–309. https://doi.org/10.1017/S0020818304582036
  • Raymond, M. (2019). Social practices of rule-making in world politics. Oxford University Press.
  • Raymond, M. (2021). Social practices of rule-making for international Law in the cyber-domain. Journal of Global Security Studies, 6(2), ogz065. https://doi.org/10.1093/jogss/ogz065
  • Raymond, M., & DeNardis, L. (2015). Multistakeholderism: Anatomy of an inchoate global institution. International Theory, 7(3), 572–616. https://doi.org/10.1017/S1752971915000081
  • Reus-Smit, C. (1999). The moral purpose of the state: Culture, social identity, and institutional rationality in international relations. Princeton University Press.
  • Ruggie, J. G. (1992). Multilateralism: Anatomy of an institution. International Organization, 46(3), 561–598. https://doi.org/10.1017/S0020818300027831
  • Russian Federation. (2016). Doctrine of information security of the Russian Federation. https://www.mid.ru/en/foreign_policy/official_documents/-/asset_publisher/CptICkB6BZ29/content/id/2563163
  • Sandholtz, W. (2008). Dynamics of international norm change: Rules against wartime plunder. European Journal of International Relations, 14(1), 101–131. https://doi.org/10.1177/1354066107087766
  • Schmitt, O. (2020). How to challenge an international order: Russian diplomatic practices in multilateral security organizations. European Journal of International Relations, 26(3), 922–946. https://doi.org/10.1177/1354066119886024
  • Segal, A. (2020). China’s vision for cyber-sovereignty and the global governance of cyberspace. An Emerging China-Centric Order: China’s Vision for a New World Order in Practice, 85–100.
  • Shanghai Cooperation Organization. (2020a). Shanghai cooperation organization. https://ccdcoe.org/organisations/sco/
  • Shanghai Cooperation Organization. (2020b). Agreement on cooperation in ensuring international information security between the member States of the Shanghai Cooperation Organization.
  • Sherman, J. (2020). Chinese firms’ global advancement of alternative internet protocols. Jamestown China Brief, 20(21), 8–14.
  • Sherman, J. (2022). China’s new organization could threaten the global internet. Slate. https://slate.com/technology/2022/07/china-world-internet-conference-organization-standards.html
  • Sherman, J., & Morgus, R. (2018). Breaking down the vote on Russia’s new cybercrime resolution at the UN. New America. https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/breaking-down-vote-russias-new-cybercrime-resolution-un/
  • Shires, J. (2024). The Budapest Convention and the formative influences of cybercrime negotiators. Contemporary Security Policy, 45(1), 45–71. https://doi.org/10.1080/13523260.2023.2274775
  • Spanu, M. (2019). The hierarchical society: The politics of self-determination and the constitution of New states after 1919. European Journal of International Relations, 26(2), 372–396. https://doi.org/10.1177/1354066119866496
  • Taggart, J., & Abraham, K. J. (2023). Norm dynamics in a post-hegemonic world: Multistakeholder global governance and the End of liberal international order. Review of International Political Economy, 1–28. https://doi.org/10.1080/09692290.2023.2213441
  • United Nations Conference on Disarmament. (2006). Letter from the permanent representative of the People’s Republic of China. CD/1792. https://documents-dds-ny.un.org/doc/UNDOC/GEN/G06/637/18/PDF/G0663718.pdf?OpenElement
  • United Nations General Assembly. (2018). Crime prevention and criminal justice. A/C.3/73/L.9/Rev.1*. https://undocs.org/A/C.3/73/L.9/Rev.1
  • United Nations General Assembly. (2019). Countering the use of information and communications technologies for criminal purposes. A/C.3/74/L.11/Rev.1
  • Urgessa, W. G. (2020). Multilateral cybersecurity governance: Divergent conceptualizations and its origin. Computer Law & Society Review, 36, 105368. https://doi.org/10.1016/j.clsr.2019.105368
  • Weyrauch, D., & Winzen, T. (2021). Internet fragmentation, political structuring, and organizational concentration in transnational engineering networks. Global Policy, 5(1), 51–65. https://doi.org/10.1111/1758-5899.12873
  • Wolff, J. (2024). The role of insurance carriers and underwriters in shaping international cybersecurity. Contemporary Security Policy, 45(1), 141–170. https://doi.org/10.1080/13523260.2023.2279033
  • Yilmaz, G., & Eliküçük Yildirim, N. (2020). Authoritarian diffusion or cooperation? Turkey’s emerging engagement with China. Democratization, 27(6), 1202–1220. https://doi.org/10.1080/13510347.2020.1777984