In this Book

  • Conflict and Cooperation in the Global Commons: A Comprehensive Approach for International Security
  • Book
  • Scott Jasper, Editor
  • 2012
  • Published by: Georgetown University Press
summary

More than ever, international security and economic prosperity depend upon safe access to the shared domains that make up the global commons: maritime, air, space, and cyberspace. Together these domains serve as essential conduits through which international commerce, communication, and governance prosper. However, the global commons are congested, contested, and competitive. In the January 2012 defense strategic guidance, the United States confirmed its commitment “to continue to lead global efforts with capable allies and partners to assure access to and use of the global commons, both by strengthening international norms of responsible behavior and by maintaining relevant and interoperable military capabilities.”

In the face of persistent threats, some hybrid in nature, and their consequences, Conflict and Cooperation in the Global Commons provides a forum where contributors identify ways to strengthen and maintain responsible use of the global commons. The result is a comprehensive approach that will enhance, align, and unify commercial industry, civil agency, and military perspectives and actions.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Contents
  2. restricted access
    • Download PDF Download
  1. List of Illustrations
  2. p. vii
  3. restricted access
    • Download PDF Download
  1. Foreword: Contested Superiority in the Commons
  2. pp. ix-xii
  3. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. p. xiii
  3. restricted access
    • Download PDF Download
  1. Abbreviations
  2. pp. xv-xvii
  3. restricted access
    • Download PDF Download
  1. Introduction: A Comprehensive Approach
  2. pp. 1-19
  3. restricted access
    • Download PDF Download
  1. Part I: SECURITY DYNAMICS
  1. 1. Problems in Collective Action
  2. pp. 23-39
  3. restricted access
    • Download PDF Download
  1. 2. The Character of Conflict
  2. pp. 41-53
  3. restricted access
    • Download PDF Download
  1. 3. Strategies of Deterrence
  2. pp. 55-67
  3. restricted access
    • Download PDF Download
  1. Part II: CONFLICT METHODS
  1. 4. The Maritime Commons and Military Power
  2. pp. 71-87
  3. restricted access
    • Download PDF Download
  1. 5. Coercive Aerospace Campaigns
  2. pp. 89-104
  3. restricted access
    • Download PDF Download
  1. 6. Aggression in Cyberspace
  2. pp. 105-119
  3. restricted access
    • Download PDF Download
  1. Part III: COOPERATIVE OPPORTUNITIES
  1. 7. Building Collaborative Capacity for Maritime Security
  2. pp. 123-139
  3. restricted access
    • Download PDF Download
  1. 8. Assuring Joint Operational Access
  2. pp. 141-153
  3. restricted access
    • Download PDF Download
  1. 9. Shaping the Outer Space and Cyberspace Environments
  2. pp. 155-170
  3. restricted access
    • Download PDF Download
  1. Part IV: INTERFACE MECHANISMS
  1. 10. Maritime Security Consortiums
  2. pp. 173-183
  3. restricted access
    • Download PDF Download
  1. 11. Cyber Security Social Contract
  2. pp. 185-198
  3. restricted access
    • Download PDF Download
  1. Part V: BEHAVIORAL NORMS
  1. 12. Setting Norms for Activities in Space
  2. pp. 201-214
  3. restricted access
    • Download PDF Download
  1. 13. Establishing Rules for Cyber Security
  2. pp. 215-232
  3. restricted access
    • Download PDF Download
  1. Conclusion: Avoiding Conflict and Facilitating Cooperation
  2. pp. 233-247
  3. restricted access
    • Download PDF Download
  1. Selected Bibliography
  2. pp. 249-251
  3. restricted access
    • Download PDF Download
  1. Contributors
  2. pp. 253-256
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 257-260
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.