Title Cover-WP-Cyber-Web

Share this article


Cyberspace is commonly defined as ‘the online world of computer networks, particularly the Internet.’ Its utilisation spans both personal and professional domains, encompassing activities from entertainment and communication to business and the arts, thereby accommodating the full spectrum of contemporary human endeavours. The users of cyberspace include nation-states, corporations, educational institutions, and individuals, among others. The ubiquitous nature of this emergent global common presents unique challenges and a multitude of associated issues. This Working Paper aims to identify the commonalities and differences between cyberspace and other global commons. It will explore the issues related to both direct and indirect threats to national and international security posed by or through cyberspace. Towards the end, the paper will examine the governance of cyberspace and present salient conclusions to mitigate the threats emerging from this domain.

Recent Publications

Browse through the list of recent publications.

Daniel McDowell, Bucking the Buck

Daniel McDowell’s book Bucking the Buck: US Financial Sanctions and the International Backlash against the Dollar is a notable addition to the literature on the de-dollarisation trend and its underlying motives. In it, McDowell critically analyses the influence of the overuse of economic sanctions by the United States (US)


Read More »

Why is this a Ripe Time to Promote Solarisation?

A shift towards solar power use has been taking place across Pakistan recently, as declining prices of solar panels, coupled with frequent hikes in electricity tariffs, have galvanised end-consumers to embrace solar solutions. However, this rapid pace of solarisation has sparked concerns within some policy-making circles. Speculations regarding policy changes affecting solar photovoltaic (PV) participants


Read More »

Share Wisely: Protecting Data in the Digital Age

From the moment an individual  wakes up in the morning to the time s/he sets the alarm for the following day – and even while sleeping, one’s life is now being captured in a continuous loop of digital surveillance via tech gadgets. Individual actions, interactions, preferences, and nearly every aspect of the  digital life  is being monitored and converted into data points. This surveillance extends to personal data from sources such as search history, social media platforms, web page views


Read More »

Stay Connected

Follow and Subscribe

Join Our Newsletter
And get notified everytime we publish new content.


Developed By Team CASSTT

Contact CASS

CASS (Centre for Aerospace & Security Studies), Old Airport Road, Islamabad
+92 51 5405011

All views and opinions expressed or implied are those of the authors/speakers/internal and external scholars and should not be construed as carrying the official sanction of CASS.