Cybersecurity and International Relations

Topics of Current Interest

Prof. John E. Savage
Brown University


This curated website provides links to cybersecurity sources, broadly defined. It was created to support two Brown University courses, CSCI 1800, Cybersecurity and International Relations that I taught for nine years and EMC 2600, The Future of Cybersecurity: Technology and Policy that I taught for two years. I have continued to expand it as new sources have been published or discovered. Items highlighted in red are particularly important or interesting.

Some of this material is used in the book Security in the Cyber Age: An Introduction to Policy and Technology by Derek S. Reveron and John E. Savage to be published by Cambridge University Press in 2023.

Go here to replace the following Table of Contents with one that has links to both sections and subsections.

Table of Contents

Historical Context

Internet Technology

  1. The Compositional Architecture of the Internet by Pamela Zave, Jennifer Rexford Communications of the ACM, March 2019, Vol. 62 No. 3, Pages 78-87
  2. The New IP Proposal
    1. Discussion Paper: An analysis of the 'New IP' proposal to the ITU-T by Hascall Sharp (author) and Olaf Kolkman (Internet Society Editor), Internet Society, April 24, 2020.
      [It] is concerning that a proposal has been made to ITU_T ... to start a further long-term research now and in the next study period to develop a 'top-down design for the future network.'"
    2. Some Notes on An Analysis of the 'New IP' proposal to the ITU-T by Dr. Richard Li, Futurewei Technologies and Chairman of ITU Focus Group NET2020, June 2, 2020
      Dr. Li also describes the New IP proposal in a 4min ITU Interview appearing on YouTube posted on September 4, 2019.
    3. The Emergence of Cyber Diplomacy in an Increasingly Post-Liberal Cyberspace by Andre Barrinha and Thomas Renard, Blogpost, The Council on Foreign Relations, June 10, 2020
      The power relations, values, and institutions that governed cyberspace since its initial development in the 1960s are being challenged by those that did not have a say in how it was structured. As conflicting visions for the future of the global internet inevitably collide, cyber diplomats will have to negotiate these difficult choices.
      This article describes several important Chinese initiatives designed to a) replace existing Internet protocols, dubbed New IP, b) rewrite the Cybercrime Convention, and c) engage in serious cyber diplomacy.

    Back to Internet Technology
    Back to Top

The Human Dimension

The Cybersecurity Threat

Responding to the Cybersecurity Threat

Policy Issues

Artificial Intelligence

New Technologies

Social Dimensions

International Issues

China Related Issues

Russian Federation Related Issues

Iran Related Issues

Last Modified: