Verified Document

International Diplomacy And Rise Of Cyber Security Threats Thesis

International Diplomacy and Rise of Cyber Security Threats Cyber security is considered to be an ongoing issue for governments, the private sector and individuals all over the world. It is now unusual for more than a month to pass without news of a large and often significant cyber-attack (Kanuck). However, for some victims these attacks are an irritation while for others they are expensive and do result in negotiated secrets, taken proprietary designs or damage that is considered to be reputational. For example, research shows that the May 2011 attacks against Sony's online PlayStation gaming networks were projected to have cost 145 million dollars in impairment and lost proceeds. Studies also show that in the same month, American defense independent worker Lockheed Martin suffered a grave breach that was assisted by electronic identity tokens that were stolen in an earlier attack that was against the security. With that said, this essay will exam and address the wicked problem of International Diplomacy and Rise of Cyber Security Threats.

What is a Wicked Problem?

For the reason of these factors and others, cyber security appears to fall directly into the group of a 'wicked problem'. First being coined in the year of1973 by academics Professor Melvin Webber and Professor Horst Rittel, wicked problems normally tend to be discovered in the realm of public and strategy preparation, where social underlying forces add difficulty, and progress is frequently slow and incremental. However, some examples include things such as urban planning, narcotics trafficking, health care climate change, gang crime, and cyber security. These difficulties resist easy description and are made even more complex by independent or interdependent shareholders, each of which backs their own preferred definition and 'answer' to the issue.

Nevertheless, wicked difficulties can sometimes be objectively solved; they can merely be made worse or better. They are the conflicting of 'tame' problems, for instance creating a vaccine or constructing a skyscraper, which may be complex or even simple, but which can be resolved by putting on standardized techniques or approaches (Narangoa). For instance, when it comes to International Diplomacy and Cyber Security Threats a tame problem can be described and it is clear when the problem solving procedure is done.

Lately, wicked problems in either international diplomacy or cyber security have not been following such a clear pattern (Chen). The reason for this has been because gaining agreement on what the problem is seems hard enough when a dozen business board members, representatives or urban organizers are sitting around the table. Nevertheless even when agreement has been achieved, implementation can be slow and recurrent experimentation may be needed before any improvement is exposed. Before progress can be evaluated the essential resources could possibly even dry up, or a change in corporate political leadership possibly will cause the issue (or answer) to be made clear yet again.

Wicked Problem of International Diplomacy

One of the problems is that the diplomats are not appreciating the implications of their work in both bilateral and multilateral settings. Research shows that more than this, the need to cooperate with other stakeholders in diverse policy environments makes a demand that state and non-state actors do need to be aware of the 'rules of the game' that are informing both their own and others' actions, and where these converge and diverge. However, most are not doing this when it comes to the international affairs, thus causing some problems. As the present global financial crisis -- and the central place of banks and credit rating agencies that are within it -- establishes, the rules and norms informing the behavior of such critical actors have implications for the ways in which diplomacy is conducted. However, this is not being done properly. One of the other problems is that it is not being recognized at the importance of this mutual sensitivity to the norms and riles conditioning the actions of others is one side of the altering part of professional diplomats and, thus, the essential skills and training strategies that are suitable for the 21st century foreign service (Kanuck).

Another wicked problem when it comes to International Diplomacy is the deficits. Research shows that the legitimacy deficit reflects a decreased level of trust in the institutions of international government and a fall in public confidence in the organizations of representative democracy (Korns). In part, this is for the reason that in many nations the foundations of legitimacy have removed from foundations in sovereignty and patriotism to the distribution of an expanding range of services and the development of single-issue politics for example environmental policies. This has a...

One of the problems has a lot to do with the trade sphere. Negotiators are not recognizing that advice from the commercial community is an essential constituent in the framing of trade policy. In the same way, NGOs command knowledge and access to information which governments are often unable to match. However, they are not doing a good job in this area even though they have become key players in environmental diplomacy. They have, for example, turned into key actors in environmental diplomacy but lack the skills needed. In the face of growing resource constraints, they lack the knowledge capacity of government which has diminished just as the demands imposed on it have grown. NGOs, firms together with think tanks and academia, have a window of opportunity to fill this gap by capitalizing on their own expertise.
Another problem is the lack of communication. One of the central challenges to the practice of integrative diplomacy is the need to be able to adapt to and achieve altering styles of communication and the machineries that underpin them. The problem with the international diplomacy is that developing collaborative relationships with a range of stakeholders through policy networks are growing like they should. However, the growing focus on the implication of soft power and the utilization of public diplomacy strategies together with rapid change in communications technologies have been posing several interlinked issues when it comes to international diplomacy.

Wicked problem of Rise of Cyber Security Threats

Research shows that the wicked problem framework is useful for descriptive and understanding the nature of multifaceted difficulties that surround and frustrate people -- cyber security being a prime example. It inspires deeper analysis in addition to recurrent experimentation with potential answers (Korns). It rejects over-explanation and helps to clarify why wicked difficulties tend to stay behind for years or decades, challenging the best efforts of societies and governments.

Research also shows that once the scale of a challenge like cyber security is made less impervious, the path is then opened for creative ideas that are more sufficiently address not just the signs but the root reasons of the problem (Rotfeld). Studies, show that the process of recognizing wicked problems was talked about by and Webber and Rittell in ten rules, which have afterward been lessened down to about six rules by author and independent researcher, Dr. Jeff Conklin (Chen). The problem of cyber security can never be solved (total security of any network is considered to be a myth); basically it can only be made worse or better. There have been previous studies that had made some attempts to try and improve security or even try and optimize the current situation which varied depending on the obtainability of limited resources for instance time, reputation, money, and political will.

Applying a Complex, Chaotic National Security Environments

The social, political or cultural dynamics that underpin or exacerbate a problem with national security problems vary widely. Cyber-crime may appear to follow broadly similar patterns a;; over the world, but the motivations that drive it, the legal and political environments inside which it takes place, and the resources available to speak to it vary meaningfully and cannot be widespread. It is important to make sure that there is a more complex national security environment in order to make sure everything is okay. The reason for this is because low barriers to entry in cyberspace mean that anyone can contribute as stated by their motivation and knowledge. It permits the freedom for 'permission less innovation', meaning that formation, obliteration and interruption will occur with consistency. The early modernizers and makers of cyberspace actually retain some kind of an advantage. Nevertheless chances for substantive unilateral action, for instance one nation or establishment continuing control or verbalizing the 'rules' of cyberspace, are going away as the domain becomes truly worldwide and shareholders multiply exponentially (Chen). For the expectable future, cultures must learn to live with a level of insecurity (actual or apparent) that is superior than that which we have become familiarized to in domains that are physical.

When it comes to national security and cyber security threats, stakeholders are key. Necessary stakeholders are individuals or organizations with a genuine interest in an assumed state of affairs or cause, in this case it is efforts to upsurge state and local cyber security…

Sources used in this document:
Works Cited

Chen, P. "Cyber public diplomacy as china's smart power strategy in an information age: Case study of anti-carrefour incident in 2008." International Journal of China Studies 34.9 (2012): 189-217.

Kanuck, S. "Sovereign discourse on cyber conflict under international law." Texas Law Review 38.8 (2010): 1571-1597.

Korns, S.W., & Kastenberg, J.E. "Georgia's cyber left hook." Parameters 23.9 (2009): 60-76.

Narangoa, L. "Mongolia and preventive diplomacy: Haunted by history and becoming cosmopolitan." Asian Survey, 49.2 (2009): 358-379.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Espionage
Words: 4895 Length: 16 Document Type: Case Study

Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state

Russia S Special Military Operation in Ukraine
Words: 4807 Length: 16 Document Type: Term Paper

Trump, Biden National Security Strategies, and RussiaIntroductionThe U.S. has a National Security Strategy to protect the safety and security of the nation through cooperative efforts and partnerships with other nations and organizations. This strategy provides a comprehensive vision for the use of diplomatic, economic, military and intelligence efforts to protect U.S. interests abroad, deter potential adversaries, respond effectively to threats, and meet alliances and global responsibilities. The National Security Strategy

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now