The Role of US Norm Entrepreneurs in Promoting Cybersecurity Norms in the International Stage

Main Article Content

Thanawit Wangpuchakane
Pongphisoot Busbarat

Abstract

This research article critically examines the concept of cybersecurity norms, which has become a subject of global contention since 1998. Specifically, the article focuses on the promotion of Western cyber norms by the United States and the strategies it employs as a norm entrepreneur for this promotion via its various agencies, including the US government, experts, and the private sector. However, despite the persistent efforts of the United States to influence other states, its endeavors have encountered significant obstacles. This is evident in the ongoing debates on information and communication technology security within the United Nations General Assembly. The study highlights the challenges in promoting Western cyber norms. The norms can be interpreted in several ways, including debates on whether cyber domains should be regulated by states, thus leading to various approaches to domestic adoption and practices. Furthermore, competition from other major powers in recent decades has become
a considerable challenge. Such powers, most notably Russia and recently China, are increasingly opposing US-led norm acceptance and are also offering alternative interpretations and models to shape the international debate.

Article Details

How to Cite
Wangpuchakane, T., & Busbarat, P. . (2024). The Role of US Norm Entrepreneurs in Promoting Cybersecurity Norms in the International Stage. Political Science and Public Administration Journal, 15(1), 281–318. Retrieved from https://so05.tci-thaijo.org/index.php/polscicmujournal/article/view/264019
Section
Academic Article

References

Acharya, A. (2004). How Ideas Spread: Whose Norms Matter? Norm Localization and Institutional Change in Asian Regionalism. International Organization, 58(2), 239-275.

Adler, E. (1997). Seizing the Middle Ground: Constructivism in World Politics. European Journal of International Relations, 3(3), 319-363.

Arora, P. (2019). Politics of Algorithms, Indian Citizenship, and the Colonial Legacy. In Punathambekar, A., & Mohan, S. (Eds.). Global Digital Cultures: Perspectives from South Asia (pp. 37–52). N.P.: University of Michigan Press.

Arquilla, J., & Ronfeldt, D. (Eds.). (1997). In Athena's Camp: Preparing for Conflict in the Information Age. Santa Monica: Rand Corporation.

Axelrod, R. (1997). The Complexity of Cooperation: Agent-Based Models of Competition and Collaboration. Princeton: Princeton University Press.

Badescu, C. G. (2011). Humanitarian Intervention and the Responsibility to Protect: Security and Human Rights. New York: Routledge.

Braithwaite, J. (1994). A Sociology of Modelling and the Politics of Empowerment. British Journal of Sociology, 45(3), 445-479.

Cai, C. (2018). Global Cyber Governance: China's Contribution and Approach. China Quarterly of International Strategic Studies, 4(1), 55-76.

Cybersecurity Tech Accord. (2023). Signatories. Retrieved June 4, 2023, from https://cybertechaccord.org/signatories/

Deitelhoff, N., & Wolf, K. (2013). Business and Human Rights: How Corporate Norm Violators Become Norm Entrepreneurs. In Risse, T., Sikkink, K., & Ropp, C. S. (Eds.). The Persistent Power of Human Rights: From Commitment to Compliance (pp. 222-238). Cambridge: Cambridge University Press.

Deitelhoff, N., & Zimmermann, L. (2019). Norms Under Challenge: Unpacking the Dynamics of Norm Robustness. Journal of Global Security Studies, 4(1), 2-17.

DeNardis, L. (2012). Hidden Levers of Internet Control: An Infrastructure-Based Theory of Internet Governance. Information, Communication & Society, 15(5), 720-738.

Finnemore, M. (2017). Cybersecurity and the Concept of Norms. Retrieved February 4, 2023, from https://carnegieendowment.org/2017/11/30/cybersecurity-and-concept-of-norms-pub-74870

Finnemore, M., & Sikkink, K. (1998). International Norm Dynamics and Political Change. International Organization, 50(4), 887-918.

Gleckman, H. (2018). Multistakeholder Governance and Democracy: A Global Challenge. New York: Routledge.

Gold, J. (2021). Unexpectedly, All UN Countries Agreed on a Cybersecurity Report. So What?. Retrieved February 4, 2023, from https://www.cfr.org/blog/unexpectedly-all-un-countries-agreed-cybersecurity-report-so-what

Greenwood, F. (2020). Data Colonialism, Surveillance Capitalism and Drones. In Specht, D. (Ed.). Mapping Crisis: Participation, Datafication and Humanitarianism in the Age of Digital Mapping (pp. 89–118). University of London Press.

Hobbs, C. (Ed.). (2020). Europe’s Digital Sovereignty: From Rulemaker to Superpower in the Age of US-China Rivalry. N.P.: European Council on Foreign Relations.

Hoffmann, M. (2003). Entrepreneurs and Norm Dynamics: An Agent-based Model of the Norm Life Cycle. Retrieved February 4, 2023, from http://www.polisci.upenn.edu/ps-i/Pamla/Hoffmann_norms.doc

Hurel, L. M., & Lobato, C. L. (2018). Unpacking Cyber Norms: Private Companies as Norm Entrepreneurs. Journal of Cyber Policy, 3(1), 61-76.

International Committee of the Red Cross. (1949). Geneva Convention Relative to the Protection of Civilian Persons in Time of War (Fourth Geneva Convention), 12 August 1949, 75 UNTS 287. Retrieved February 4, 2023, from https://www.refworld.org/docid/3ae6b36d2.html

Internet Engineering Task Force. (2023). Mission and Principles. Retrieved February 4, 2023, from https://www.ietf.org/about/introduction/

Jiayi, L. (2021). The Qualities and Strengths of Consultative Democracy Practiced Through the Chinese People’s Political Consultative Conference. Retrieved February 4, 2023, from http://en.qstheory.cn/2022-01/18/c_699097.htm

Katzenstein, P. (Ed.). (1996). The Culture of National Security: Norms and Identity in World Politics. New York: Columbia University Press.

Khalil, L. (2020). Digital Authoritarianism, China and COVID. (Research report). N.P.: Lowy Institute for International Policy.

Kolton, M. (2017). Interpreting China’s Pursuit of Cyber Sovereignty and its Views on Cyber Deterrence. The Cyber Defense Review, 2(1), 119–154.

Kratochwil, F. (1989). Rules, Norms, and Decisions. Cambridge: Cambridge University Press.

Li, Y. (2019). Global Cyberspace Governance: State Actors and the China-US Cyber Relationship. Contemporary International Relations, 29(2), 105-124.

Lotrionte, C. (2018). Reconsidering the Consequences for State-Sponsored Hostile Cyber Operations under International Law. The Cyber Defense Review, 3(2), 73-114.

Lu, W. (2014). Cyber Sovereignty Must Rule Global Internet. Retrieved February 4, 2023, from https://www.huffpost.com/entry/china-cyber-sovereignty_b_6324060

Margaret, K., & Sikkink, K. (1998). Activists Beyond Borders: Transnational Advocacy Networks in International Politics. Ithaca: Cornell University Press.

Mueller, M. (2009). Ruling the Root: Internet Governance and the Taming of Cyberspace. Cambridge, MA: MIT Press.

Mueller, M., Mathiason, J., & Klein, H. (2007). The Internet and Global Governance: Principles and Norms for a New Regime. Global Governance: A Review of Multilateralism and International Organizations, 13(2), 237-254.

O’Connell, E. M., & Arimatsu, L. (2012). Cyber Security and International Law. Retrieved February 4, 2023, from https://www.chathamhouse.org/sites/default/files/public/Research/International%20Law/290512summary.pdf

Ostrom, E. (2000). Collective Action and the Evolution of Social Norms. Journal of Economic Perspectives, 14(3), 137-158.

Risse, T., Ropp, S., & Sikkink, K. (Eds.). (1999). The Power of Human Rights: International Norms and Domestic Change. Cambridge: Cambridge University Press.

Rodriguez, M. (2017). Declaration by the Representative of Cuba at the Final Session of the Group of Governmental Experts. Retrieved February 4, 2023, from https://www.justsecurity.org/wp-content/uploads/2017/06/Cuban-Expert-Declaration.pdf

Schmitt, N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge, UK: Cambridge University Press.

Schmitt, N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Warfare. Cambridge, UK: Cambridge University Press.

Sherman, J. (2021). Digital Authoritarianism and Implications for US National Security. The Cyber Defense Review, 6(1), 107-118.

Smith, B. (2017). The Need for a Digital Geneva Convention. Retrieved June 4, 2023, from https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/

Streinz, T. (2021). RCEP's Contribution to Global Data Governance. Retrieved February 4, 2023, from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3826217

Sukumar, A. M. (2017). The UN GGE Failed. Is International Law in Cyberspace Doomed as Well?. Retrieved February 4, 2023, from https://www.lawfareblog.com/un-gge-failed-international-law-cyberspace-doomed-well

United Nations General Assembly. (1998). Report of the 1st Committee: Role of Science and Technology in the Context of International Security, Disarmament and Other Related Fields. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/264457?ln=en

United Nations General Assembly. (1999). Report of the 1st Committee: General Assembly, 54th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/351558?ln=en&v=pdf

United Nations General Assembly. (2000). Report of the 1st Committee: General Assembly, 55th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/427170?ln=en&v=pdf

United Nations General Assembly. (2001). Report of the 1st Committee: General Assembly, 56th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/452991?ln=en&v=pdf

United Nations General Assembly. (2002). Report of the 1st Committee: General Assembly, 57th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/478670?ln=en&v=pdf

United Nations General Assembly. (2003). Report of the 1st Committee: General Assembly, 58th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/506848?ln=en&v=pdf

United Nations General Assembly. (2004). Report of the 1st Committee: General Assembly, 59th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/535822/files/A_59_454-EN.pdf

United Nations General Assembly. (2005). Report of the 1st Committee: General Assembly, 60th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/561130?ln=en&v=pdf

United Nations General Assembly. (2006). Report of the 1st Committee: General Assembly, 61st session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/587060?ln=en&v=pdf

United Nations General Assembly. (2007). Report of the 1st Committee: General Assembly, 62nd session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/612351?ln=en&v=pdf

United Nations General Assembly. (2008). Report of the 1st Committee: General Assembly, 63rd session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/641397?ln=en&v=pdf

United Nations General Assembly. (2009). Report of the 1st Committee: General Assembly, 64th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/671471?ln=en&v=pdf

United Nations General Assembly. (2010). Report of the 1st Committee: General Assembly, 65th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/693819?ln=en&v=pdf

United Nations General Assembly. (2011). Report of the 1st Committee: General Assembly, 66th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/715997?ln=en&v=pdf

United Nations General Assembly. (2012). Report of the 1st Committee: General Assembly, 67th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/738631?ln=en&v=pdf

United Nations General Assembly. (2013). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 4, 2023, from https://digitallibrary.un.org/record/753055

United Nations General Assembly. (2014). Report of the 1st Committee: General Assembly, 69th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/782912?ln=en&v=pdf

United Nations General Assembly. (2015). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 4, 2023, from https://digitallibrary.un.org/record/799853

United Nations General Assembly. (2016). Report of the 1st Committee: General Assembly, 71st session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/848219?ln=en&v=pdf

United Nations General Assembly. (2018a), Report of the 1st Committee: General Assembly, 73rd session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 4, 2023, from https://digitallibrary.un.org/record/1654007?ln=en

United Nations General Assembly. (2018b). UN Resolution 73/27. Retrieved February 4, 2023, from https://undocs.org/en/A/RES/73/27

United Nations General Assembly. (2019). Report of the 1st Committee: General Assembly, 74th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/3836338?ln=en&v=pdf

United Nations General Assembly. (2020), Report of the General Assembly, Advancing Responsible State Behavior in Cyberspace in the Context of International Security. Retrieved February 17, 2023, from https://digitallibrary.un.org/record/3893847?ln=en

United Nations General Assembly. (2021). Report of the 1st Committee: General Assembly, 76th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/3948700?ln=en&v=pdf

United Nations General Assembly. (2022), Report of the General Assembly, Programme of Action to Advance Responsible State Behaviour in the Use of Information and Communications Technologies in the Context of International Security. Retrieved February 17, 2023, from https://digitallibrary.un.org/record/3996919?ln=en

United Nations. (2024). Charter of the United Nations. Retrieved March 5, 2024, from https://www.un.org/en/sections/un-charter/un-charter-full-text

Yau, H. (2019). An Assessment of Cyberpower Within the Triangular Relations of Taiwan-Us-China and Its Implications. International Journal of Taiwan Studies, 2(2), 264-291.

Yeli, H. (2017). A Three-Perspective Theory of Cyber Sovereignty. PRISM, 7(2), 108-115.