2015
DOI: 10.1017/s1752971915000081
|View full text |Cite
|
Sign up to set email alerts
|

Multistakeholderism: anatomy of an inchoate global institution

Abstract: Building on John Ruggie's pioneering study of multilateralism, this paper presents an analogous study of multistakeholder governance, or multistakeholderism. Its central argument is that multistakeholderism is, as yet, a much less well-defined institutional form. Cases exhibit significant variation both in the combinations of actor classes entitled to participate and the nature of authority relations among those actors. The first section discusses multistakeholderism as an institutional form, and proposes a ta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
61
0
5

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 138 publications
(68 citation statements)
references
References 62 publications
1
61
0
5
Order By: Relevance
“…The cyber/information security discourse differs a lot in Russia, China, and the US. 35 The analysis of threat perceptions in Russia, China, and the US reveals common grounds in cyber threat perceptions for further cooperation 32 to mitigate the negative effect for a national security (see Tab.2). 36 Colored boxes indicate what threat or contentious issue is under the country's focus.…”
Section: "The Question Of When a Threat Becomes A National Security Tmentioning
confidence: 99%
See 1 more Smart Citation
“…The cyber/information security discourse differs a lot in Russia, China, and the US. 35 The analysis of threat perceptions in Russia, China, and the US reveals common grounds in cyber threat perceptions for further cooperation 32 to mitigate the negative effect for a national security (see Tab.2). 36 Colored boxes indicate what threat or contentious issue is under the country's focus.…”
Section: "The Question Of When a Threat Becomes A National Security Tmentioning
confidence: 99%
“…Each sub-issue is 30 Finnemore, M., Sikkink, K. represented and treated differently in the political process and at different points in time. 32 That is why the theory of securitization introduced by Buzan, Weaver and De Wilde can be useful to draw the link between a national security and cyber domain.…”
mentioning
confidence: 99%
“…In this section, I briefly characterize existing governance arrangements as well as three potential cyber futures, and discuss some major value tradeoffs at stake in these various possible alternative futures. Governance arrangements in the cyber domain remain highly privatized, and highly decentralized (Raymond 2013/14;Raymond and DeNardis 2015;Raymond 2016). However, these governance arrangements are also rapidly evolving, and are doing so in ways characterized by considerable political contention (Nye 2014;Bradshaw et al 2015).…”
Section: Cyber Futures and Value Tradeoffsmentioning
confidence: 99%
“…29 For example, Raymond and DeNardis argue that this process often fails to live up to its multi-party rhetoric and that "across a number of crucial governance functions, the reality is perhaps closer to industry self-regulation than to genuine multistakeholder governance". 30 Madeline Carr argues that this process serves, in large part, to reinforce existing power relations (that is, those of the US government and those aligned with a US agenda), and that civil society remains relatively disempowered, even though it performs an important role of legitimacy for other stakeholders; summing up, "the private sector is dominated by US multinationals (…), and governments show no significant signs of relinquishing their conventional hold on sovereign power".…”
Section: A Governing the Internet?mentioning
confidence: 99%