Foreword, Sir David Omand GCB
Introduction, Paul Cornish
PART I. Cyber Space: What it is and Why it Matters
1:The Origins of Cyberspace, David Pym
2:Opportunity, Threat and Dependency in the Social Infosphere, Greg Austin
3:A Political History of Cyberspace, Madeline Carr
4:Cyber Power in International Relations, Camino Kavanagh and Tim Stevens
5:Ethical Standards and 'Communication' Technologies, Onora O Neill
PART II. Security in Cyber Space: Cyber Crime
6:Cybercrime: Thieves, Swindlers, Bandits and Privateers in Cyberspace, Roderic Broadhurst
7:Making Sense of Cybersecurity in Emerging Technology Areas, Claire Vishik, Marcello Balduccini, Michael Huth, and Lawrence John
8:Assessing Harm from Cyber Crime, Eva Ignatuschtschenko
9:Toward a Vulnerability Mitigation Model., José Eduardo Malta de Sá Brandão
PART III. Security in Cyber Space: Extremism and Terrorism
10:Managing Risk: Terrorism, Violent Extremism and Anti-Democratic Tendencies in the Digital Space, Alexander Corbeil and Rafal Rohozinski
11:Cyberweapons, Sandro Gaycken
12:Intentions and Cyberterrorism, Florian Egloff
13:Technology: Access and Denial, Caitríona Heinl
PART IV. Security in Cyber Space: State-Sponsored Cyber Attacks
14:Cyber Espionage, Jon Lindsay
15:Cyberwar Redux, Ben Buchanan
16:On Cyber-Enabled Information Warfare and Information Operations, Herbert Lin and Jaclyn Kerr
17:The Deterrence and Prevention of Cyber Conflict, Paul Cornish
PART V. Technical and Corporate Cyber Security
18:Stepping out of the Shadow: Computer Security Incident Response Teams in the Cybersecurity Ecosystem, Nicole van der Meulen
19:Cybersecurity Information Sharing: Voluntary Beginnings and a Mandatory Future, Stuart Murdoch
20:Data Privacy and Security Law, Fred Cate and Rachel Dockery
21:The Insider Threat and the Insider Advocate, Mike Steinmetz
PART VI. Personal Cyber Security
22:Personal Protection: Cyber Hygiene, Dave Clemente
23:Online Child Safety, John Carr
24:Educating for Cyber Security, Roger Bradbury
25:Cyber Security, Human Rights and Empiricism: The Case of Digital Surveillance, Jonathon Penney
PART VII. National Cyber Security
26:Securing the Critical National Infrastructure, David Mussington
27:The Role of Defence in National Cyber Security, Mika Kerttunen
28:Cyber Security Capacity Building, Lara Pace and Paul Cornish
PART VIII. Global Trade and Cyber Security
29:Cyber Security, Multilateral Export Control, and Standard Setting Arrangements, Elaine Korzak
30:Cyber Security, Global Commerce, and International Organisations, David Fidler
31:Global Trade and Cyber Security: Monitoring, Enforcement, and Sanctions, Franz-Stefan Gady and Greg Austin
PART IX. International Cyber Security
32:Semi-Formal Diplomacy: Track 1.5 and Track 2, Nigel Inkster
33:States, Proxies, and (Remote) Offensive Cyber Operations, Tim Maurer
34:Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice, Melissa Hathaway
35:International Law for Cyber Space: Competition and Conflict, Thomas Wingfield and Harry Wingo
PART X. Perspectives on Cyber Security
36:Community of Common Future in Cyberspace: The Proposal and Practice of China, Tang Lan
37:Look West or Look Easta India at the Crossroads of Cyberspace, Arun Mohan Sukumar
38:Cybersecurity in Israel: Organisation and Future Challenges, Lior Tabansky
39:The Evolving Concept of the Japanese Security Strategy, Yoko Nitta
40:Contextualizing Malaysia's Cybersecurity Agenda, Elina Noor
41:The Russian Federation s Approach to Cyber Security, Anton Shingarev and Anastasya Kazakova
PART XI. Future Challenges
42:Rethinking the Governance of Technology in the Digital Age, Joëlle Webb
43:Maturing Autonomous Cyber Weapons Systems: Implications for International Cyber Security and Autonomous Weapons Systems Regimes, Caitríona Heinl
44:The Future Human and Behavioural Challenges of Cyber Security, Debi Ashenden
45:The Future of Democratic Civil Societies in a Post-Western Cybered Era, Chris Demchak
46:Future Normative Challenges, Eneken Tikk
47:Cybersecurity' and 'Development': Contested Futures, Tim Unwin
48:Project Solarium 1953 and the Cyberspace Solarium Commission 2019, Mike Steinmetz
Conclusion, Paul Cornish