Governing Cyberspace: Behavior, Power and Diplomacy

Total Page:16

File Type:pdf, Size:1020Kb

Governing Cyberspace: Behavior, Power and Diplomacy Governing Cyberspace OPEN ACCESS The publication of this book is made possible by a grant from the Open Access Fund of the Universiteit Leiden. Open Access content has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) license. Digital Technologies and Global Politics Series Editors: Andrea Calderaro and Madeline Carr While other disciplines like law, sociology, and computer science have engaged closely with the Information Age, international relations scholars have yet to bring the full analytic power of their discipline to developing our understanding of what new digital technologies mean for concepts like war, peace, security, cooperation, human rights, equity, and power. This series brings together the latest research from international relations scholars—par- ticularly those working across disciplines—to challenge and extend our understanding of world politics in the Information Age. Governing Cyberspace: Behavior, Power, and Diplomacy, edited by Dennis Broeders and Bibi van den Berg Governing Cyberspace Behavior, Power, and Diplomacy Edited by Dennis Broeders Bibi van den Berg ROWMAN & LITTLEFIELD Lanham • Boulder • New York • London Published by Rowman & Littlefield An imprint of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www.rowman.com 6 Tinworth Street, London, SE11 5AL, United Kingdom Copyright © 2020 by Dennis Broeders and Bibi van den Berg All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without written permission from the publisher, except by a reviewer who may quote passages in a review. British Library Cataloguing in Publication Information Available Library of Congress Cataloging-in-Publication Data Names: Broeders, D. (Dennis), editor. | Berg, Bibi van den, editor. Title: Governing cyberspace : behavior, power, and diplomacy / edited by Dennis Broeders, Bibi van den Berg. Description: Lanham : Rowman & Littlefield, [2020] | Series: Digital technologies and global politics | Includes bibliographical references and index. | Summary: “Contributes to the discussion of growing insecurity and the unpredictable and often authoritarian use of the digital ecosystem”—Provided by publisher. Identifiers: LCCN 2020004795 (print) | LCCN 2020004796 (ebook) | ISBN 9781786614940 (cloth) | ISBN 9781786614957 (paperback) | ISBN 9781786614964 (epub) Subjects: LCSH: Computer networks—Law and legislation. | Internet—Law and legislation. | Cyberspace. Classification: LCC K564.C6 G685 2020 (print) | LCC K564.C6 (ebook) | DDC 343.09/944—dc23 LC record available at https://lccn.loc.gov/2020004795 LC ebook record available at https://lccn.loc.gov/2020004796 ∞ ™ The paper used in this publication meets the minimum requirements of American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials, ANSI/NISO Z39.48-1992. Contents Acknowledgments vii 1 Governing Cyberspace: Behavior, Power, and Diplomacy 1 Dennis Broeders and Bibi van den Berg PART I: INTERNATIONAL LEGAL AND DIPLOMATIC APPROACHES 2 International Law and International Cyber Norms: A Continuum? 19 Liisi Adamson 3 Electoral Cyber Interference, Self-Determination and the Principle of Non-intervention in Cyberspace 45 Nicholas Tsagourias 4 Violations of Territorial Sovereignty in Cyberspace—an Intrusion-based Approach 65 Przemysław Roguski 5 What Does Russia Want in Cyber Diplomacy? A Primer 85 Xymena Kurowska 6 China’s Conception of Cyber Sovereignty: Rhetoric and Realization 107 Rogier Creemers v vi Contents PART II: POWER AND GOVERNANCE: INTERNATIONAL ORGANIZATIONS, STATES, AND SUBSTATE ACTORS 7 A Balance of Power in Cyberspace 145 Alexander Klimburg and Louk Faesen 8 International Law in Cyberspace: Leveraging NATO’s Multilateralism, Adaptation, and Commitment to Cooperative Security 173 Steven Hill and Nadia Marsan 9 Cybersecurity Norm-Building and Signaling with China 187 Geoffrey Hoffman 10 Ambiguity and Appropriation: Cybersecurity and Cybercrime in Egypt and the Gulf 205 James Shires 11 The Power of Norms Meets Normative Power: On the International Cyber Norm of Bulk Collection, the Normative Power of Intelligence Agencies and How These Meet 227 Ilina Georgieva PART III: MULTISTAKEHOLDER AND CORPORATE DIPLOMACY 12 Non-State Actors as Shapers of Customary Standards of Responsible Behavior in Cyberspace 245 Jacqueline Eggenschwiler and Joanna Kulesza 13 Big Tech Hits the Diplomatic Circuit: Norm Entrepreneurship, Policy Advocacy, and Microsoft’s Cybersecurity Tech Accord 263 Robert Gorwa and Anton Peez 14 Cyber-Norms Entrepreneurship? Understanding Microsoft’s Advocacy on Cybersecurity 285 Louise Marie Hurel and Luisa Cruz Lobato Index 315 About the Editors and Contributors 323 Acknowledgments This book resulted from the inaugural conference of the Hague Program for Cyber Norms, titled “Novel Horizons: Responsible Behaviour in Cyber- space,” which was held in the Hague on November 5–7, 2018. The editors thank the participants for a great conference and especially those that submit- ted their work for this edited volume. A first round of editorial comments was done for the conference itself, and we thank Liisi Adamson, Els de Busser, Ilina Georgieva, and Zine Hom- burger, who were at the time all affiliated to the program, for their editorial contribution. We also thank Corianne Oosterbaan for all her hard work orga- nizing the conference and her invaluable help with the editorial process. Lastly, we would like to thank the Dutch Ministry of Foreign Affairs who generously fund the Hague Program for Cyber Norms and all of its activities and publications. The Hague, 2.12.2019 Dennis Broeders and Bibi van den Berg vii Chapter 1 Governing Cyberspace Behavior, Power, and Diplomacy Dennis Broeders and Bibi van den Berg WELCOME TO CYBERSPACE When states look at cyberspace, they do not necessarily see the same as most end users do. Sure, they see the massive added value in terms of the digital economy and, like their citizens, they have difficulties imagining life without the constant interactions and communication that is the bedrock of modern digital society. However, many parts of the government see cyberspace increasingly as a source of threat, insecurity, and instability. Where states looked at the early stages of the development of cyberspace with a certain degree of “benign neglect,” it became much more of a gov- ernment interest when the digital economy started off in earnest. Now, states increasingly view cyberspace through a lens of security. Not just in terms of cybercrime but more and more in terms of the high politics of international security (Klimburg 2017; Segal 2016; DeNardis 2014; Deib- ert 2013; Betz and Stevens 2011). Many states have formally declared the cyber domain to be the fifth domain of warfare—after land, sea, air, and space—and increasingly states conduct intelligence and pseudo-military operations in the cyber domain that fall short of “cyber war” but do create a permanent state of “unpeace” (Kello 2017; see also Boeke and Broeders 2018). The increase in cyber-attacks among states, or at least those that come out into the open, seem to be intensifying in terms of damage and impact, and provoke reactions from states and corporations. Cyber operations like WannaCry and NotPetya, politically attributed to North Korea and Russia, respectively, were both damaging and indiscriminate, which added to the feeling of vulnerability in the digital domain. However, even with NotPetya, of which the global damages have been estimated at roughly $10 billion (Greenberg 2018), no state was willing to say this operation was in violation 1 2 Dennis Broeders and Bibi van den Berg of international law. More in general, all public attributions of cyberattacks to states have not invoked international law other than in the most general terms possible (Efrony and Shany 2018). In cyberspace, a state of unpeace is heating up and although most states agree in principle that international law applies in cyberspace as it does in the analogue world, they do not seem to be able to agree on specifics. Furthermore, “the” regulation of “the” Internet does not exist. Nye (2014) has shown that the Internet is regulated through an elaborate cyber regime complex that has pockets of dense regulation in some subject areas as well as patches that are largely unregulated. Moreover, there are many aspects on which states are still struggling to find an effective governance structure to address the issues at hand (see also Klimburg and Faesen 2020 in this volume). Moreover, some elements of governance are firmly in the hands of private parties (companies, the technical community), whereas others—for example, military, intelligence, and diplomatic—are firmly in the hands of states. The mix between public and private actors in Internet governance is called “multistakeholder governance,” a concept that is embraced by Western liberal states (at least in theory) but is disputed by states that favor a much stronger role for sovereign states in the regulation and governance of cyberspace. States like Russia and China would like to bring “Internet governance” into a multilateral setting where sovereign states, rather than a wide array of stakeholders, steer the direction of cyberspace. This archetypical divide between multistakeholderism and multilateralism when talking about cybersecurity and Internet governance structures is connecting
Recommended publications
  • Classical Islamic Political Thought: Study of Sunni Perspectives
    ISLAH: Journal of Islamic Literature and History Vol. 1, No. 2, December 2020: p. 137-153 DOI: 10.18326/islah.v1i2.137-153 ISSN : 2723-407X Website: https://e-journal.iainsalatiga.ac.id/index.php/islah Classical Islamic Political Thought: Study of Sunni Perspectives Suyadi Universitas Islam Negeri (UIN) Waliwongo [email protected] Ahmad Fikri Sabiq Institut Agama Islam Negeri (IAIN) Salatiga [email protected] Submission Track: Received: 27-08-2020 Final Revision: 20-01-2021 Available Online: 20-01-2021 Abstract The purpose of this study is to determine the Islamic political thought in classical Islam in the perspective of the Sunni sect. This research is a qualitative research which is library research. Data collection method is library data that has been selected, searched, presented and analyzed. This study uses data analysis techniques in the form of content analysis. Content analysis is a scientific analysis of the message content of a data. One of the characteristics of the classical era Islamic political thought is that it does not question the position of religion and state, whether integrated or separate. The debates that occurred in the classical era on the establishment of a state, the election of a head of state, and the conditions that a head of state must-have. Besides, political thought that develops also tends to be a response to the prevailing socio-political conditions. The emergence of Sunni ideology is a form of anxiety over the viewpoints developed by groups that tend to discredit the position of the Prophet's companions who are considered by some on the opposite side to have committed treason or treason.
    [Show full text]
  • FY08 Technical Papers by GSMTPO Staff
    AURA/NOAO ANNUAL REPORT FY 2008 Submitted to the National Science Foundation July 23, 2008 Revised as Complete and Submitted December 23, 2008 NGC 660, ~13 Mpc from the Earth, is a peculiar, polar ring galaxy that resulted from two galaxies colliding. It consists of a nearly edge-on disk and a strongly warped outer disk. Image Credit: T.A. Rector/University of Alaska, Anchorage NATIONAL OPTICAL ASTRONOMY OBSERVATORY NOAO ANNUAL REPORT FY 2008 Submitted to the National Science Foundation December 23, 2008 TABLE OF CONTENTS EXECUTIVE SUMMARY ............................................................................................................................. 1 1 SCIENTIFIC ACTIVITIES AND FINDINGS ..................................................................................... 2 1.1 Cerro Tololo Inter-American Observatory...................................................................................... 2 The Once and Future Supernova η Carinae...................................................................................................... 2 A Stellar Merger and a Missing White Dwarf.................................................................................................. 3 Imaging the COSMOS...................................................................................................................................... 3 The Hubble Constant from a Gravitational Lens.............................................................................................. 4 A New Dwarf Nova in the Period Gap............................................................................................................
    [Show full text]
  • Informational Materials
    Received by NSD/FARA Registration Unit 08/28/2019 1:05:54 PM Huawei Twitter and Facebook August 26 - 27 4% HuaweiUSA© (©HuaweiUSA • Aug 26 v Huawei hosted a reception @OneWorldNYC where media enjoyed stunning views and company updates 1 ■ I—h HuaweiUSA© @HuaweiUSA • Aug 26 4'A Huawei's Dongguan facility is "a lot like a Disneyland for tech research." HUAWEI @TechRadar takes a tour of the European-style campus. Huawei has built the Disneyland of tech R&D Its new campus is full of recreated European cities (P techradar.com Q 2 tl 2 O 12 £ Received by NSD/FARA Registration Unit 08/28/2019 1:05:54 PM Received by NSD/FARA Registration Unit 08/28/2019 1:05:54 PM #4 HuaweiUSAO @HuaweiUSA • Aug 26 v HUAWEI "S435 million. That's how much public US companies reported losing in the second quarter due to the ban." @Light_Reading discusses the impact of the decision to ban Huawei in the US. Here's What Trump's Huawei Ban Cost US Firms in Q... Several US companies put a dollar amount on the fssss "■aaaaai losses they incurred from President Trump's Huawei... ess: c$> Iightreading.com Q 2 U 3 O 10 £ HuaweiUSA fk @HuaweiUSA • Aug 26 Customer success is critical. Control Manager for Huawei Mayanmar, Ye Lin HUAWEI Aung, is dedicated to listening first and making sure client concerns are heard and understood. #WeAreHuawei Huawei: Achieve Your Potential ©* I'm Ye Lin Aung, a control manager for #Huawei in Myanmar. My employer believes in developing my youtube.com Q 1 n 2 0? 6 Received by NSD/FARA Registration Unit 08/28/2019 1:05:54 PM Received by NSD/FARA Registration Unit 08/28/2019 1:05:54 PM HuaweiUSAO @HuaweiUSA • Aug 26 v The talk around #5G is about trust.
    [Show full text]
  • Chinese Internet Companies and Their Quest for Globalization
    International Conference on Information, Business and Education Technology (ICIBIT 2013) Chinese Internet Companies and Their Quest for Globalization Harlan D. Whatley1 1Swiss Management Center, Zurich, Switzerland Abstract players in the technology market (Sun, 2009). Chinese internet companies have seen an This qualitative research paper unprecedented growth over the past explores the quest for globalization of decade. However, very few are two successful Chinese internet recognized brands outside of China while companies: Baidu and Tencent Holdings. some seek to develop their brands in In this case study, the focus is on the foreign markets. This paper analyzes the marketing strategies of these expanding marketing strategies of two internet multinational enterprises and the companies: Baidu and Tencent and their challenges they face to become quest for globalization. recognized as global brands. All of the firms in this study were founded as Keywords: Baidu, Tencent, internet, private enterprises with no ownership ties branding, marketing, globalization, China to the Chinese government. Furthermore, an analysis of the countries and markets 1. Introduction targeted by the firms is included in the study. In addition to a review of the Innovation efforts by technology current academic literature, interviews companies in China are driven by adding were conducted with marketing and significant value to imported foreign strategy professionals from the technologies or by developing new perspective firms as well as journalists products to satisfy specific domestic that closely follow Chinese internet firms demands (Li, Chen & Shapiro, 2010). and the technology sector. This study on Firms in the emerging market of China do the globalization of Chinese internet not possess the R&D resources that their firms will contribute to marketing developed Western counterparts have.
    [Show full text]
  • Building Resilience & Confronting Risk In
    BUILDING RESILIENCE & CONFRONTING RISK IN THE COVID-19 ERA A PARENTS & CAREGIVERS GUIDE TO ONLINE RADICALIZATION POLARIZATION AND EXTREMISM RESEARCH AND INNOVATION LAB (PERIL) PERIL brings the resources and expertise of the university sector to bear CONTENTS on the problem of growing youth polarization and extremist radicalization, through scalable research, intervention, and public education ideas to PARENT & CAREGIVER GUIDE 3 reduce rising polarization and hate. WHAT IS ONLINE RADICALIZATION? WHY SHOULD YOU CARE? 4 SOUTHERN POVERTY LAW CENTER NEW RISKS IN THE COVID-19 ERA 5 The SPLC seeks to be a catalyst for racial justice in the South and RECOGNIZING WARNING SIGNS 6 beyond, working in partnership with communities to dismantle white UNDERSTANDING THE DRIVERS 7 supremacy, strengthen intersectional movements, and advance the ENGAGE AND EMPOWER 9 human rights of all people. RESPONDING TO HATE 11 HOW TO GET HELP 12 APPENDIX: STAYING ALERT TO SITES, PLATFORMS AND APPS FREQUENTLY EXPLOITED BY EXTREMISTS 17 ENDNOTES 19 CREDITS 20 ILLUSTRATIONS BY CLAUDIA WHITAKER PARENT & CAREGIVER GUIDE Who is this guide for? We wrote this guide with a wide Whether you live with a young person, or work virtually range of caregivers in mind. with youth, radicalization to extremism is something we all should be concerned about. Extremists looking Caregivers living with children and young adults. This to recruit and convert children are predatory. Like all includes parents, grandparents, foster parents, extended forms of child exploitation, extremist recruitment drives families, and residential counselors who are the a wedge between young people and the adults they would guardians and caregivers of children and youth living typically trust.
    [Show full text]
  • Hujjat Allah Al-Balighah: the Uniqueness of Shah Wali Allah Al-Dihlawi's Work
    ISSN 2039-2117 (online) Mediterranean Journal of Social Sciences Vol 6 No 5 S1 ISSN 2039-9340 (print) MCSER Publishing, Rome-Italy September 2015 Hujjat Allah Al-Balighah: The Uniqueness of Shah Wali Allah Al-Dihlawi’s Work Fadlan Mohd Othman1 Lutpi Mustafa1 Mohd Arif Nazri1 Ahamad Asmadi Sakat1 Abur Hamdi Usman2 Mohd Akil Muhamed Ali1 Muhamad Rozaimi Ramle3 1 Faculty of Islamic Studies, The National University of Malaysia, Malaysia 2 International Islamic University College Selangor (KUIS), Malaysia; Corresponding Author Email: [email protected] 3 Faculty of Human Sciences, Sultan Idris Education University, Malaysia Doi:10.5901/mjss.2015.v6n5s1p403 Abstract This study reviews on the uniqueness of the book Hujjat Allah al-Baligha by al-Dihlawi that emphasizes two important aspects, in terms of thought and debate on the topics presented by him. The study found al-Dihlawi’s thoughts in this book reflect his idealism as an Islamic scholar. He expressed impressive thoughts with the Qur’an as a fundamental ingredient and Sunna as a commentator to the Qur’an. While the reflection may generate useful perspective from the point of significance or preference according to the prevailing realities. Due to dissension between the Islamic parties during that time was considered chronically. This anxiety inspired a number of ideas to him to rebuild civilization of life in the name of Islam without mingling with the seeds of superstition and believing in mythical. Keywords: Hujjat Allah al-Balighah, al-Dihlawi, Sufism, Juriprudence 1. Preliminary Shah Wali Allah al-Dihlawi (d. 1762) is not only an extremely impressive thinker, but also, when he is not being Indian, a thoroughly Islamic one.
    [Show full text]
  • Gamers Who Hate: an Introduction to ISD's Gaming and Extremism Series
    Gaming and Extremism Gamers Who Hate: An Introduction to ISD’s Gaming and Extremism Series Jacob Davey About the series This briefing is the first in ISD’s Gaming and Extremism Series exploring the role online gaming plays in the strategy of far-right extremists in the UK and globally. This is part of a broader programme on the ‘Future of Extremism’ being delivered by ISD in the second half of 2021, charting the transformational shifts in the extremist threat landscape two decades on from 9/11, and the policy strategies required to counter the next generation of extremist threats. This briefing provides an introduction to the series and presents the key findings that ISD analysts found in an exploratory study into extremist activity on four gaming-related platforms, Steam, Discord, DLive and Twitch. Gaming and Extremism Contents 3 Contents Introduction 4 Key Findings 6 Methodology 10 Endnotes 11 Gaming and Extremism Gamers Who Hate 4 Introduction Globally, gaming is now the most profitable To help fill this crucial evidence gap ISD engaged in a entertainment industry, far surpassing both music scoping project exploring the use of the gaming-related and film.1 According to the gaming market data platforms Steam, Discord, Twitch and DLive by the company Newzoo, there are 2.81 billion gamers extreme right, concentrating specifically on the UK. worldwide2 and in the United Kingdom 39% of the This work is presented in our Gaming and Extremism population play video games, a figure that rises series, providing a series of snapshot analyses designed to 73% within the 16 – 24 year old age range.3 to identify key trends and patterns which can provide The industry is expansive and allows huge the groundwork for future analysis.
    [Show full text]
  • Issues Paper: Reining in China's Technology Giants
    Mapping China’s Technology Giants Reining in China’s technology giants Fergus Ryan, Audrey Fritz and Daria Impiombato S OF AS AR PI E S Y T Y R T A T N E E G Y W T Issues paper 2 0 1 01 - 20 2 Report No. 46/2021 About the authors Fergus Ryan is an analyst with ASPI’s International Cyber Policy Centre. Audrey Fritz is a researcher with ASPI’s International Cyber Policy Centre. Daria Impiombato is a researcher with ASPI’s International Cyber Policy Centre Acknowledgements Thank you to Danielle Cave, Cheryl Yu and Elena Yi-Ching Ho for all of their work on this project. We would like to also thank our external peer reviewers, Elliott Zaagman and Peter Cai. We’re also grateful for the valuable comments and assistance provided by Michael Shoebridge and Fergus Hanson. This research report forms part of Mapping China’s Technology Giants, a multi-year project mapping and analysing the overseas expansion of key Chinese technology companies. This project seeks to: (1) Analyse the global expansion of a key sample of China’s tech giants by mapping their major points of overseas presence, and (2) Provide the public with analysis of the governance structures and party-state politics in which these companies have emerged, and are deeply entwined. The Mapping China’s Technology Giants project is produced by researchers at ASPI’s International Cyber Policy Centre. The re-launch of this project, and associated research, was funded with a US$270,000 grant from the US State Department.
    [Show full text]
  • Post-Abolition in the Atlantic World
    Revista Brasileira de História ISSN 1806-9347 Post-Abolition in the Atlantic World The Revista Brasileira de História integrates the portals SciELO, Redalyc and Periódicos Capes, accessible through the following URLs: http://www.scielo.br/rbh • http://redalyc.uaemex.mx • HTTP://www.periodicos.capes.gov.br Indexing data bases: Scopus, ISI Web of Knowledge, ABC-CLIO, Hispanic American Periodicals Index (HAPI) Revista Brasileira de História – Official Organ of the National Association of History. São Paulo, AN PUH, vol. 35, no 69, Jan.-June 2015. Semiannual ISSN: 1806-9347 CO DEN: 0151/RBHIEL Correspondence: ANPUH – Av. Prof. Lineu Prestes, 338 Cidade Universitária. CEP 05508-000 – São Paulo – SP Phone/Fax: (11) 3091-3047 – e-mail: [email protected] Revision (Portuguese): Armando Olivetti Desktop publishing: Flavio Peralta (Estúdio O.L.M.) Revista Brasileira de História Post-Abolition in the Atlantic World ANPUH Revista Brasileira de História no 69 Founder: Alice P. Canabrava August 2013 – July 2015 Editor in charge Alexandre Fortes, Universidade Federal Rural do Rio de Janeiro, Nova Iguaçu, RJ – Brasil. E-mail: [email protected] Editorial committee (RBH) Alexandre Fortes, Universidade Federal Rural do Rio de Janeiro, Nova Iguaçu, RJ – Brasil Ana Teresa Marques Gonçalves, Universidade Federal de Goiás, Goiânia, GO – Brasil Carla Simone Rodeghero, Universidade Federal do Rio Grande do Sul, Porto Alegre, RS – Brasil Cláudia Maria Ribeiro Viscardi, Universidade Federal de Juiz de Fora, Juiz de Fora, MG – Brasil Fátima Martins Lopes, Universidade
    [Show full text]
  • Microsoft 2012 Citizenship Report
    Citizenship at Microsoft Our Company Serving Communities Working Responsibly About this Report Microsoft 2012 Citizenship Report Microsoft 2012 Citizenship Report 01 Contents Citizenship at Microsoft Serving Communities Working Responsibly About this Report 3 Serving communities 14 Creating opportunities for youth 46 Our people 85 Reporting year 4 Working responsibly 15 Empowering youth through 47 Compensation and benefits 85 Scope 4 Citizenship governance education and technology 48 Diversity and inclusion 85 Additional reporting 5 Setting priorities and 16 Inspiring young imaginations 50 Training and development 85 Feedback stakeholder engagement 18 Realizing potential with new skills 51 Health and safety 86 United Nations Global Compact 5 External frameworks 20 Supporting youth-focused 53 Environment 6 FY12 highlights and achievements nonprofits 54 Impact of our operations 23 Empowering nonprofits 58 Technology for the environment 24 Donating software to nonprofits Our Company worldwide 61 Human rights 26 Providing hardware to more people 62 Affirming our commitment 28 Sharing knowledge to build capacity 64 Privacy and data security 8 Our business 28 Solutions in action 65 Online safety 8 Where we are 67 Freedom of expression 8 Engaging our customers 31 Employee giving and partners 32 Helping employees make 69 Responsible sourcing 10 Our products a difference 71 Hardware production 11 Investing in innovation 73 Conflict minerals 36 Humanitarian response 74 Expanding our efforts 37 Providing assistance in times of need 76 Governance 40 Accessibility 77 Corporate governance 41 Empowering people with disabilities 79 Maintaining strong practices and performance 42 Engaging students with special needs 80 Public policy engagement 44 Improving seniors’ well-being 83 Compliance Cover: Participants at the 2012 Imagine Cup, Sydney, Australia.
    [Show full text]
  • The Neural Basis of Social Cognition and Its Relationship to Social Functioning in Young People at Risk for Schizophrenia
    The Neural Basis of Social Cognition and Its Relationship to Social Functioning in Young People at Risk for Schizophrenia The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Lincoln, Sarah Hope. 2015. The Neural Basis of Social Cognition and Its Relationship to Social Functioning in Young People at Risk for Schizophrenia. Doctoral dissertation, Harvard University, Graduate School of Arts & Sciences. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:23845421 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The neural basis of social cognition and its relationship to social functioning in young people at risk for schizophrenia A dissertation presented by Sarah Hope Lincoln to The Department of Psychology in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the subject of Psychology Harvard University Cambridge, Massachusetts May 2015 © 2015 Sarah Hope Lincoln All rights reserved. Dissertation Advisor: Professor Christine I. Hooker Sarah Hope Lincoln The neural basis of social cognition and its relationship to social functioning in young people at risk for schizophrenia Abstract These three studies seek to contribute to the neurological characterization of the development of schizophrenia as well as begin to branch into understanding how neuroanatomical structure and function may relate to specific deficits in social cognition and social functioning within in this population.
    [Show full text]
  • Trump's Twiplomacy
    Trump’s Twiplomacy: A New Diplomatic Norm? Kajsa Hughes Two-year Political Science MA programme in Global Politics and Societal Change Dept. of Global Political Studies Course: Political Science Master’s thesis ST631L (30 credits) Thesis submitted: Summer, 2020 Supervisor: Corina Filipescu Kajsa Hughes 19940526-2867 Political Science: Global Politics Abstract This study examined how Trump frames various countries and their leaders and whether the framing changes from different factors. It also observed whether foreign leaders were following the same path as Trump in their diplomatic communication and interaction on Twitter. This was to contribute more knowledge that connects global politics with social media to see if changes of frames through Twitter caused any global politica l consequences. Theories including realist constructivism and framing theory, along with concepts of social norms, political context, events, and enemy images, were applied to the study. Using directed content analysis, together with longitudinal and comparative elements, the findings showed a separation between Trump’s and the other leaders’ tweets. Almost all tweets were connected to the concepts, and various techniques of framing were identified in tweets from most leaders. However, Trump’s informa l, disdain, and dramatics in his tweets have distanced himself from the rest of the leaders’ posts. Although a couple of leaders’ attempt to be hostile towards Trump and the U.S. in their tweets, they were still formal. It shows that not only is Trump’s Twiplomacy a reflection of American superpower forcefulne ss, but also a unique form that the rest choose to ignore. Keywords: framing, social norms, Trump, Twiplomacy, Twitter, Word count: 21,979 1 Kajsa Hughes 19940526-2867 Political Science: Global Politics Table of Contents 1.
    [Show full text]