Completed
CYBER SOVEREIGNTY
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Deviation from the Norms - The Necessity and Challenges - USENIX Enigma 2017
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 WHAT TARGETS ARE OFF LIMITS?
- 3 STATE OF THE SECURITY LANDSCAPE (P2)
- 4 WHEN IT COMES TO DIGITAL OFFENSE
- 5 THE PURSUIT OF NORMS
- 6 A BRIEF HISTORY OF U.S. DIGITAL OFFENSE RESPONSES
- 7 NORMS 101
- 8 EXAMPLE: SEATBELT USAGE
- 9 NORM PROPAGATION S-CURVE
- 10 MULTI-STAKEHOLDER MODEL
- 11 CYBER SOVEREIGNTY
- 12 COMPETING NORMS: FROM THEORY TO PRACTICE
- 13 FORUM SHOPPING: FORUMS FOR NORM DIFFUSION
- 14 POLICY INNOVATION & ENGAGEMENT REQUIRED