

Always be attentive to paperwork and what the movers are sending to you.
UNPACKING COMPANIES DOWNLOAD
If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.įor technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. You can help adding them by using this form. We have no bibliographic references for this item. It also allows you to accept potential citations to this item that we are uncertain about. This allows to link your profile to this item.

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here.
UNPACKING COMPANIES HOW TO
See general information about how to correct material in RePEc.įor technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact. When requesting a correction, please mention this item's handle: RePEc:taf:rcybxx:v:3:y:2018:i:1:p:61-76. You can help correct errors and omissions. Suggested CitationĪll material on this site has been provided by the respective publishers and authors. In conclusion, we note that, notwithstanding these efforts, the lack of coordination between different aspects of norm-making processes illustrates the challenges facing the advancement of international cyber norms. We analyse documents containing the company’s policies and strategies, and argue that these efforts consist of an attempt to influence global public policies on cybersecurity. We look at Microsoft’s case to unpack the company’s role in the normative development of cybersecurity globally. In an attempt to determine the position of private actors in this field, we turn to practices such as corporate diplomacy and lobbying as avenues for highlighting the methods in which corporations engage in international policymaking in general, and cyber norms in particular. We explore the tensions between current literature on cyber norms and the role of private actors as potential norm entrepreneurs in global cybersecurity. While state efforts have sought to promote norms of responsible state behaviour in cyberspace, we argue that technology companies are also taking the lead as norm entrepreneurs in the context of the stability and security of cyberspace. Whether it concerns intellectual property rights, the theft of trade secrets, collection of personal data, critical infrastructure protection, DNS security, or geopolitical issues, the rise of cybersecurity as a multifaceted global issue has led to the proliferation of governance mechanisms aimed at responding thereto. Responses to such concerns come in different shapes and sizes, and are proposed by different actors. Concerns over practices in cyberspace are central to the consolidating international agenda for cybersecurity.
