Deviation from the Norms - The Necessity and Challenges - USENIX Enigma 2017
Offered By: USENIX Enigma Conference via YouTube
Course Description
Overview
Explore the complexities of establishing global norms for acceptable behavior in the digital domain through this 22-minute conference talk from USENIX Enigma 2017. Delve into the challenges and opportunities of norm diffusion in cybersecurity, focusing on the increasing demand for retaliatory capabilities in the private sector. Examine the hurdles to norm implementation, including technical verification difficulties, outdated policies, and collective action problems. Understand the importance of US leadership in shaping global digital norms and the necessity of collaboration between tech and policy communities. Gain insights into the implications of offense-based behavior for security and privacy, and explore topics such as cyber militias, hacking back capabilities, and the concept of cyber sovereignty. Learn about the multi-stakeholder model, competing norms, and the need for policy innovation in addressing these critical issues.
Syllabus
Intro
WHAT TARGETS ARE OFF LIMITS?
STATE OF THE SECURITY LANDSCAPE (P2)
WHEN IT COMES TO DIGITAL OFFENSE
THE PURSUIT OF NORMS
A BRIEF HISTORY OF U.S. DIGITAL OFFENSE RESPONSES
NORMS 101
EXAMPLE: SEATBELT USAGE
NORM PROPAGATION S-CURVE
MULTI-STAKEHOLDER MODEL
CYBER SOVEREIGNTY
COMPETING NORMS: FROM THEORY TO PRACTICE
FORUM SHOPPING: FORUMS FOR NORM DIFFUSION
POLICY INNOVATION & ENGAGEMENT REQUIRED
Taught by
USENIX Enigma Conference
Related Courses
Adventures in Authentication and AuthorizationUSENIX Enigma Conference via YouTube Navigating the Sandbox Buffet
USENIX Enigma Conference via YouTube Meaningful Hardware Privacy for a Smart and Augmented Future
USENIX Enigma Conference via YouTube Working on the Frontlines - Privacy and Security with Vulnerable Populations
USENIX Enigma Conference via YouTube Myths and Lies in InfoSec
USENIX Enigma Conference via YouTube