PART II: How Comparisons Constitute Governance Objects

  • Figure 8.1:

    Comparing the economic impact of environmental crimes (largest estimate given)

  • Figure 9.1:

    Number of state-sponsored cyber operations by country, 2005–2020

  • Adler, E. and Faubert, M. (2022) ‘Epistemic communities of practice’, in A. Drieschova, C. Bueger and T. Hopf (eds) Conceptualizing International Practices: Directions for the Practice Turn in International Relations, Cambridge: Cambridge University Press, pp 4776.

    • Search Google Scholar
    • Export Citation
  • Bateman, S. (2015) Piracy Monitoring Wars: Responsibilities for Countering Piracy, RSIS Commentary No. 115, 13 May, www.files.ethz.ch/isn/191045/CO15115.pdf [Accessed 9 February 2023].

    • Search Google Scholar
    • Export Citation
  • Berling, T.V. (2011) ‘Science and securitization: objectivation, the authority of the speaker and mobilization of scientific facts’, Security Dialogue, 42(4–5): 38597.

    • Search Google Scholar
    • Export Citation
  • Berling, T.V. and Bueger, C. (eds) (2015) Security Expertise: Practices, Power and Responsibility, London: Routledge.

  • Bigo, D. (2014) ‘The (in)securitization practices of the three universes of EU border control: military/navy – border guards/police – database analysts’, Security Dialogue, 45(3): 20925.

    • Search Google Scholar
    • Export Citation
  • Boraz, S.C. (2009) ‘Maritime domain awareness. Myths and realities’, Naval War College Review, 62(3): 13746.

  • Bueger, C. (2015a) ‘Making things known: epistemic practice, the United Nations and the translation of piracy’, International Political Sociology, 9(1): 119.

    • Search Google Scholar
    • Export Citation
  • Bueger, C. (2015b) ‘From dusk to dawn? Maritime domain awareness in Southeast Asia’, Contemporary Southeast Asia: A Journal of International & Strategic Affairs, 37(2): 15782.

    • Search Google Scholar
    • Export Citation
  • Bueger, C. (2020) ‘A glue that withstands heat? The promise and perils of maritime domain awareness’, in E.R. Lucas, S. Rivera-Paez, T. Crosbie and F.F. Jensen (eds) Maritime Security: Counter-Terrorism Lessons from Maritime Piracy and Narcotics Interdiction, Amsterdam: IOS Press, pp 23545.

    • Search Google Scholar
    • Export Citation
  • Bueger, C. (2021) ‘Does maritime security require a new United Nations structure?’, Global Observatory, 26 August, https://theglobalobservatory.org/2021/08/does-maritime-security-require-a-new-united-nations-structure/ [Accessed 9 February 2023].

    • Search Google Scholar
    • Export Citation
  • Bueger, C. and Edmunds, T. (2017) ‘Beyond seablindness: a new agenda for maritime security studies’, International Affairs, 93(6): 1293311.

    • Search Google Scholar
    • Export Citation
  • Bueger, C. and Edmunds, T. (2023) ‘The European Union’s quest to become a global maritime security provider’, Naval War College Review, 76(2): 6786.

    • Search Google Scholar
    • Export Citation
  • Bueger, C. and Edmunds, T. (2024) Understanding Maritime Security, New York, NY, Oxford: Oxford University Press.

  • Bueger, C. and Stockbruegger, J. (2022) ‘Maritime security and the western Indian Ocean’s militarisation dilemma’, African Security Review, 31(2): 195210.

    • Search Google Scholar
    • Export Citation
  • Bueger, C. and Stockbruegger, J. (2024) ‘Oceans, Objects, Infrastructures: Making Modern Piracy’ [unpublished manuscript].

  • Dittmer, J. (2021) ‘The state, all at sea: interoperability and the global network of navies’, Environment and Planning C: Politics and Space, 9(7): 1389406.

    • Search Google Scholar
    • Export Citation
  • Hansen, L. (2006) Security as Practice. Discourse Analysis and the Bosnian War, London: Routledge.

  • Ho, J. (2009) ‘Combating piracy and armed robbery in Asia: the ReCAAP Information Sharing Centre (ISC)’, Marine Policy, 33(2): 43234.

    • Search Google Scholar
    • Export Citation
  • Joubert, L. (2020) What We Know about Piracy. Report by the Transnational Organized Crime at Seas (TOCAS) Project, Stable Seas & Safe Seas, 18 May, www.safeseas.net/wp-content/uploads/2020/05/What-We-Know-About-Piracy.pdf [Accessed 9 February 2023].

    • Search Google Scholar
    • Export Citation
  • Joubert, L., Edmunds, T. and Edwards, S. (2021) What We Know about Maritime Illicit Trades. Report by the Transnational Organized Crime at Seas (TOCAS) Project, Stable Seas & Safe Seas, 7 June, www.safeseas.net/wp-content/uploads/2021/04/what_we_know_about_maritime_illicit_trades.pdf [Accessed 9 February 2023].

    • Search Google Scholar
    • Export Citation
  • Lycan, T., Van Buskirk, L., Bueger, C., Edmunds, T., Edwards, S. and Seyle, C. (2021) What We Know About Maritime Environmental Crime. Report by the Transnational Organized Crime at Seas (TOCAS) Project, Stable Seas & Safe Seas, 6 September, www.safeseas.net/wp-content/uploads/2021/09/What_We_Know_About_Maritime_Environmental_Crime.pdf [Accessed 9 February 2023].

    • Search Google Scholar
    • Export Citation
  • Menzel, A. (2018) ‘Institutional adoption and maritime crime governance: the Djibouti code of conduct’, Journal of the Indian Ocean Region, 14(2): 15269.

    • Search Google Scholar
    • Export Citation
  • Percy, S. (2018) ‘Maritime security’, in A. Gheciu and W.C. Wohlforth (eds) The Oxford Handbook of International Security, Oxford: Oxford University Press, pp 60721.

    • Search Google Scholar
    • Export Citation
  • Poseidon Aquatic Resource Management Ltd. and Global Initiative against Transnational Organized Crime (no date) ‘About the IUU Fishing Index’, https://iuufishingindex.net/about [Accessed 18 September 2023].

    • Search Google Scholar
    • Export Citation
  • Stable Seas (2021) Maritime Security Index, www.stableseas.org/services [Accessed 18 September 2023].

  • Yücel, H. (2021) ‘Sovereignty and transnational cooperation in the Gulf of Guinea: how a network approach can strengthen the Yaoundé architecture’, Scandinavian Journal of Military Studies, 4(1): 14657.

    • Search Google Scholar
    • Export Citation
  • Amburn, B. (2005) ‘The Failed States Index 2005’, Foreign Policy, 22 October, https://foreignpolicy.com/2009/10/22/the-failed-states-index-2005/ [Accessed 9 May 2023].

    • Search Google Scholar
    • Export Citation
  • Bhuta, N. (2015) ‘Measuring stateness, ranking political orders: indices of state fragility’, in A. Cooley and J. Snyder (eds) Ranking the World, Cambridge: Cambridge University Press, pp 85111.

    • Search Google Scholar
    • Export Citation
  • Carment, D., Samy, Y. and Prest, S. (2008) ‘State fragility and implications for aid allocation: an empirical analysis’, Conflict Management and Peace Science, 25(4): 34973.

    • Search Google Scholar
    • Export Citation
  • Castellanet, C., Solanet, G. and Ficatier, Y. (2010) Adapter les pratiques opérationnelles des bailleurs dans les États fragiles, Paris: Agence Française de Développement.

    • Search Google Scholar
    • Export Citation
  • Chandler, D. (2007) ‘The security–development nexus and the rise of “anti-foreign policy”’, Journal of International Relations and Development, 10(4): 36286.

    • Search Google Scholar
    • Export Citation
  • Coppedge, M. and Gerring, J. (2022) The V-Dem Dataset 2022, www.v-dem.net/data/the-v-dem-dataset/ [Accessed 18 September 2023].

  • Desai, H. (2020) States of Fragility and Official Development Assistance, OECD Development Co-operation Working Papers, No. 76, Paris: OECD Publishing.

    • Search Google Scholar
    • Export Citation
  • Draude, A., Börzel, T.A. and Risse, T. (eds) (2018): The Oxford Handbook of Governance and Limited Statehood, Oxford: Oxford University Press.

    • Search Google Scholar
    • Export Citation
  • Duffield, M.R. (2001) Global Governance and the New Wars: The Merging of Development and Security, London, New York, NY: Zed Books.

  • Etsy, D.C., Goldstone, J. and Gurr, T.R. (1995) Working Papers: State Failure Task Force Report, Arlington, VA: Central Intelligence Agency.

    • Search Google Scholar
    • Export Citation
  • Ferreira, I.A. (2017) ‘Measuring state fragility: a review of the theoretical groundings of existing approaches’, Third World Quarterly, 38(6): 1291309.

    • Search Google Scholar
    • Export Citation
  • Fisher, J. (2014) ‘When it pays to be a “fragile state”: Uganda’s use and abuse of a dubious concept’, Third World Quarterly, 35(2): 31632.

    • Search Google Scholar
    • Export Citation
  • FFP (Fund for Peace) (no date) ‘What We Do’, https://fundforpeace.org/what-we-do/ [Accessed 9 May 2023].

  • FSI (Fragile States Index) (no date) ‘Methodology’, https://fragilestatesindex.org/methodology/ [Accessed 9 May 2023].

  • G7+ (2013) Note on the Fragility Spectrum, www.g7plus.org/wp-content/uploads/2023/07/Fragility-Spectrum-in-English.pdf [Accessed 24 January 2024].

    • Search Google Scholar
    • Export Citation
  • Grimm, S., Lemay-Hébert, N. and Nay, O. (2014) ‘Fragile states: introducing a political concept’, Third World Quarterly, 35(2): 197209.

    • Search Google Scholar
    • Export Citation
  • Gruffydd Jones, B. (2013) ‘“Good governance” and “state failure”: genealogies of imperial discourse’, Cambridge Review of International Affairs, 26(1): 4970.

    • Search Google Scholar
    • Export Citation
  • Helman, G.B. and Ratner, S.R. (1992) ‘Saving failed states’, Foreign Policy, (89): 320.

  • IBRD (International Bank for Reconstruction and Development) (2012) ‘Political activity prohibited. Article 4, Section 10’, in IBRD, Articles of Agreement, Washington DC: The World Bank Group, p 10.

    • Search Google Scholar
    • Export Citation
  • IDPS (International Dialogue on Peacebuilding and Statebuilding) (2011) A New Deal for Engagement in Fragile States, https://gsdrc.org/document-library/a-new-deal-for-engagement-in-fragile-states/ [Accessed 24 January 2024].

    • Search Google Scholar
    • Export Citation
  • IDPS (International Dialogue on Peacebuilding and Statebuilding) (2014) Guidance Note on Fragility Assessments, www.pbsbdialogue.org/media/filer_public/96/fb/96fb5ae4-7b0d-4007-bf9e-1ed869db21da/rd_4_fragility_assessment_guidance_note_final.pdf [Accessed 18 September 2023].

    • Search Google Scholar
    • Export Citation
  • Jackson, R.H. (1991) Quasi-States: Sovereignty, International Relations and the Third World, Cambridge: Cambridge University Press.

  • Jütersonke, O. and Kartas, M. (2012) Resilience: Conceptual Reflections, Geneva: The Graduate Institute of International and Development Studies, Centre on Conflict, Development and Peacebuilding.

    • Search Google Scholar
    • Export Citation
  • Jütersonke, O., Kobayashi, K., Krause, K. and Yuan, X. (2021) ‘Norm contestation and normative transformation in global peacebuilding order(s): the cases of China, Japan, and Russia’, International Studies Quarterly, 65(4): 94459.

    • Search Google Scholar
    • Export Citation
  • Kaplan, R. (1994) ‘The coming anarchy’, The Atlantic Monthly, 273(2): 4476, www.theatlantic.com/past/docs/politics/foreign/anarchy.htm [Accessed 9 May 2023].

    • Search Google Scholar
    • Export Citation
  • Kaufmann, D., Kraay, A. and Mastruzzi, M. (2010) The Worldwide Governance Indicators. Methodology and Analytical Issues, World Bank Policy Research Working Paper 5430, https://documents1.worldbank.org/curated/en/630421468336563314/pdf/WPS5430.pdf [Accessed 18 September 2023].

    • Search Google Scholar
    • Export Citation
  • Law Insider (2023) ‘Medically fragile definition’, www.lawinsider.com/dictionary/medically-fragile [accessed 18 September 2023].

  • League of Nations (1920) The Covenant of the League of Nations, 20 February, https://libraryresources.unog.ch/ld.php?content_id=32971179 [Accessed 18 September 2023].

    • Search Google Scholar
    • Export Citation
  • Lindemann, S. (2014) ‘Was ist ein fragiler Staat?’, https://www.kfw-entwicklungsbank.de/PDF/Download-Center/PDF-Dokumente-Development-Research/2014-08-21_FE_Was-ist-ein-fragiler-Staat.pdf [Accessed 18 September 2023].

    • Search Google Scholar
    • Export Citation
  • Marc, A., Willman, A., Aslam, G., Rebosio, M. and Balasuriya, K. (2013) Societal Dynamics and Fragility: Engaging Societies in Responding to Fragile Situations, Washington DC: World Bank.

    • Search Google Scholar
    • Export Citation
  • Milliken, J. and Krause, K. (2002) ‘State failure, state collapse and state reconstruction: concepts, lessons and strategies’, Development and Change, 33(5): 75574.

    • Search Google Scholar
    • Export Citation
  • Müller, T., Albert, M. and Langer, K. (2022) ‘Practices of comparison and the making of international orders’, Journal of International Relations and Development, 25(3): 83459.

    • Search Google Scholar
    • Export Citation
  • Neocleous, M. (2013) ‘Resisting resilience’, Radical Philosophy, 178: 25.

  • Nilsson, C. and Grelsson, G. (1995) ‘The fragility of ecosystems: a review’, The Journal of Applied Ecology, 32(4): 67792.

  • OECD (Organisation for Economic Cooperation and Development) (2007) Principles for Good International Engagement in Fragile States and Situations, Paris: OECD Publishing.

    • Search Google Scholar
    • Export Citation
  • OECD (2008) Concepts and Dilemmas of State Building in Fragile Situations: From Fragility to Resilience, Paris: OECD Publishing.

  • OECD (2020) States of Fragility 2020, Paris: OECD Publishing.

  • OECD (2022) ‘The International Network on Conflict and Fragility (INCAF)’, www.oecd.org/dac/conflict-fragility-resilience/incaf-network.htm [Accessed 9 May 2023].

    • Search Google Scholar
    • Export Citation
  • OECD-DAC (Organisation for Economic Cooperation and Development-Development Assistance Committee) (2009) Armed Violence Reduction: Enabling Development, Paris: OECD Publishing.

    • Search Google Scholar
    • Export Citation
  • Pospisil, J. (2017) ‘“Unsharing” sovereignty: G7+ and the politics of international statebuilding’, International Affairs, 93(6): 141734.

    • Search Google Scholar
    • Export Citation
  • Richardson, H.J. (1996) ‘Failed states, self-determination, and preventive diplomacy: colonialist nostalgia and democratic expectations’, Temple International and Comparative Law Journal, 10(1): 178.

    • Search Google Scholar
    • Export Citation
  • Richmond, O.P. and Franks, J. (2008) ‘Liberal peacebuilding in Timor Leste: the emperor’s new clothes?’, International Peacekeeping, 15(2): 185200.

    • Search Google Scholar
    • Export Citation
  • Roberts, A. (2015) Fragile States: A Concept with a History, London: British Academy.

  • SDC (Swiss Agency for Development and Cooperation) (2022) ‘Action in Fragile States: Sustainable Support for Governments and Populations’, www.eda.admin.ch/deza/en/home/themes-sdc/fragile-contexts-and-prevention/sdc-work-fragile-contexts.html [Accessed 9 May 2023].

    • Search Google Scholar
    • Export Citation
  • Stewart, F. and Brown, G. (2010) Fragile States. Overview, Number 3, Oxford: Center for Research on Inequality, Human Security and Ethnicity (CRISE), https://assets.publishing.service.gov.uk/media/57a08b17ed915d3cfd000b1c/CRISE-Overview-3.pdf [Accessed 18 September 2023].

    • Search Google Scholar
    • Export Citation
  • Transparency International (2022) Corruption Perception Index, www.transparency.org/en/cpi/2022 [Accessed 9 May 2023].

  • United Nations and World Bank (2018) Pathways for Peace, Washington DC: World Bank.

  • Woodward, S.L. (1995) Balkan Tragedy: Chaos and Dissolution after the Cold War, Washington DC: Brookings Institution Press.

  • Woodward, S.L. (2017) The Ideology of Failed States: Why Intervention Fails, Cambridge: Cambridge University Press.

  • World Bank (2011) World Development Report 2011: Conflict, Security, and Development – Overview, http://documents.worldbank.org/curated/en/806531468161369474/World-development-report-2011-conflict-security-and-development-overview [Accessed 9 May 2023].

    • Search Google Scholar
    • Export Citation
  • World Bank (2022a) ‘Classification of Fragile and Conflict-Affected Situations’, www.worldbank.org/en/topic/fragilityconflictviolence/brief/harmonized-list-of-fragile-situations [Accessed 9 May 2023].

    • Search Google Scholar
    • Export Citation
  • World Bank (2022b) ‘Historical Overview: The World Bank Group’s Classification of Fragile and Conflict Affected Situations since 2006’, https://thedocs.worldbank.org/en/doc/373511582764863285-0090022020/original/FCSHistorialnote.pdf [Accessed 24 January 2024].

    • Search Google Scholar
    • Export Citation
  • World Bank Independent Evaluation Group (2010) The World Bank’s Country Policy and Institutional Assessment: An Evaluation, Washington DC: World Bank Group.

    • Search Google Scholar
    • Export Citation
  • Zartman, I.W. (ed) (1995) Collapsed States: The Disintegration and Restoration of Legitimate Authority, Boulder, CO: Lynne Rienner Publishers.

    • Search Google Scholar
    • Export Citation
  • Andreas, P. and Greenhill, K.M. (2010a) ‘Introduction: the politics of numbers’, in P. Andreas and K.M. Greenhill (eds) Sex, Drugs, and Body Counts. The Politics of Numbers in Crime and Conflict, Ithaca, NY: Cornell University Press, pp 122.

    • Search Google Scholar
    • Export Citation
  • Andreas, P. and Greenhill, K.M. (eds) (2010b) Sex, Drugs and Body Counts. The Politics of Numbers in Global Crime and Conflict, Ithaca, NY: Cornell University Press.

    • Search Google Scholar
    • Export Citation
  • Andreas, P. and Nadelmann, E. (2006) Policing the Globe. Criminalization and Crime Control in International Relations, Oxford, New York, NY: Oxford University Press.

    • Search Google Scholar
    • Export Citation
  • Aragão, R. and Linsi, L. (2020) ‘Many shades of wrong: what governments do when they manipulate statistics’, Review of International Political Economy, 29(1): 126.

    • Search Google Scholar
    • Export Citation
  • Barberet, R. (2014) ‘Measuring and researching transnational crime’, in P. Reichel and J. Albanese (eds) Handbook of Transnational Crime and Justice, Thousand Oaks, CA, London, New Delhi: SAGE, pp 4762.

    • Search Google Scholar
    • Export Citation
  • Beirne, P. (1993) Inventing Criminology: Essays on the Rise of ‘Homo Criminalis’, New York, NY: State University of New York Press.

  • Becker, G.S. and Elías, J.J. (2007) ‘Introducing incentives in the market for live and cadaveric organ donations’, Journal of Economic Perspectives, 21(3): 324.

    • Search Google Scholar
    • Export Citation
  • Bewley-Taylor, D.R. (1999) The United States and International Drug Control. 1909–1997, London, New York, NY: Continuum.

  • Bewley-Taylor, D.R. (2012) International Drug Control. Consensus Fractured, Cambridge: Cambridge University Press.

  • Bidermann, A.D. and Reiss, A.J. (1967) ‘On explaining the “dark figure” of crime’, Annals of the American Academy of Politics and Social Science, 374: 115.

    • Search Google Scholar
    • Export Citation
  • Botterill, L.C. (2017) ‘Evidence-based policy’, Oxford Research Encyclopedia of Politics, https://doi.org/10.1093/acrefore/9780190228637.013.177 [Accessed September 2019].

    • Search Google Scholar
    • Export Citation
  • Bowker, G.C. and Star, S.L. (2000) Sorting Things Out. Classification and its Consequences, Cambridge, MA: MIT Press.

  • Conservation International (2023) ‘Share the facts: raise awareness to help end wildlife trafficking’, Conservation International, www.conservation.org/act/share-the-facts-about-wildlife-trafficking [Accessed on 14 December 2023].

    • Search Google Scholar
    • Export Citation
  • Cairney, P. (2019) ‘The UK government’s imaginative use of evidence to make policy’, British Politics, 14(1): 122.

  • Cussó, R. and D’Amico, S. (2005) ‘From development comparatism to globalization comparativism: towards more normative international education statistics’, Comparative Education, 41(2): 199216.

    • Search Google Scholar
    • Export Citation
  • De Bondt, W. (2013) ‘Evidence based EU criminal policy making: in search of matching data’, European Journal of Crime Policy Research, 20(1): 2349.

    • Search Google Scholar
    • Export Citation
  • Deflem, M. (2002) Policing World Society: Historical Foundations of International Police Cooperation, Oxford: Clarendon.

  • Elliot, L. (2016) ‘The securitization of transnational environmental crime and the militarization of conservation’, in L. Elliot and W.H. Schaedla (eds) Handbook of Transnational Environmental Crime, Aldershot: Edward Elgar, pp 6887.

    • Search Google Scholar
    • Export Citation
  • European Commission (2020) Study on the Economic, Social and Human Costs of Trafficking in Human Beings Within the EU, Amt für Veröffentlichungen der Europäischen Union, https://op.europa.eu/de/publication-detail/-/publication/373138c5-0ea4-11eb-bc07-01aa75ed71a1/language-en [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Eurojust (2021) Report on Eurojust’s Casework on Environmental Crime, Eurojust, European Union Agency for Criminal Justice Cooperation, www.eurojust.europa.eu/sites/default/files/2021-01/report_environmental_crime.pdf [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Europol (2021a) ‘Environmental crime’, Europol, www.europol.europa.eu/crime-areas-and-statistics/crime-areas/environmental-crime [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Europol (2021b) ‘Money laundering’, Europol, www.europol.europa.eu/crime-areas-and-statistics/crime-areas/economic-crime/money-laundering [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • FACTI (Financial Accountability Transparency & Integrity) (2020) FACTI Panel Interim Report, June, FACTI, https://uploads-ssl.webflow.com/5e0bd9edab846816e263d633/5f6b68c7bff4ad6cf6cb53a7_FACTI_Interim_Report_final.pdf [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • FATF (Financial Action Task Force) (2019) ‘How much money is laundered’, www.fatf-gafi.org/faq/moneylaundering/ [Accessed 9 September 2019].

    • Search Google Scholar
    • Export Citation
  • FATF (2020a) ‘Money laundering and terrorist financing red flag indicators associated with virtual assets’, www.fatf-gafi.org/publications/fatfrecommendations/documents/Virtual-Assets-Red-Flag-Indicators.html [Accessed on 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • FATF (2020b) Money Laundering and the Illegal Wildlife Trade, June, www.fatf-gafi.org/media/fatf/documents/Money-laundering-and-illegal-wildlife-trade.pdf [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • FATF (2022) ‘What is money laundering?’, www.fatf-gafi.org/faq/moneylaundering/ [Accessed on 14 February 2022].

  • Friman, H.R. (2010) ‘Numbers and certification: assessing foreign compliance in narcotics and human trafficking’, in P. Andreas and K.M. Greenhill (eds) Sex, Drugs, and Body Counts. The Politics of Numbers in Crime and Conflict, Ithaka, NY: Cornell University Press, pp 75109.

    • Search Google Scholar
    • Export Citation
  • Friman, H.R. (ed) (2015) The Politics of Leverage in International Relations. Name, Shame and Sanction, London: Palgrave.

  • Ghosh, I. (2019) ‘This is the crippling cost of cybercrime on corporations’, World Economic Forum, 7 November, www.weforum.org/agenda/2019/11/cost-cybercrime-cybersecurity/ [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • GI-TOC (Global Initiative Against Transnational Organized Crime) (2021) Global Organized Crime Index 2021, Vienna: GI-TOC.

  • Global Slavery Index (GSI) (2018) ‘Highlights’, Walk Free Foundation, www.globalslaveryindex.org/2018/findings/highlights/ [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Global Witness (2017) ‘An inside job. Zimbabwe: the state, the security forces and a decade of disappearing diamonds’, 11 September, www.globalwitness.org/en/campaigns/conflict-diamonds/inside-job/ [Accessed 1 August 2019].

    • Search Google Scholar
    • Export Citation
  • Hansen, H.K. (2012) ‘The power of performance indices in the global politics of anti-corruption’, Journal of International Relations and Development, 15(4): 50631.

    • Search Google Scholar
    • Export Citation
  • Hansen, H.K. and Mühlen-Schulte, A. (2012) ‘The power of numbers in global governance’, Journal of International Relations and Development, 15(4): 45565.

    • Search Google Scholar
    • Export Citation
  • Hansen, H.K. and Porter, T. (2012) ‘What do numbers do in transnational governance?’, International Political Sociology, 6(4): 40926.

    • Search Google Scholar
    • Export Citation
  • Heller, N. (2009) ‘Defining and measuring corruption: from where have we come, where are we now, and what matters for the future?’, in R.I. Rotberg (ed) Corruption, Global Security and World Order, Washington DC: Brookings Institution, pp 2746.

    • Search Google Scholar
    • Export Citation
  • Human Rights First (2017) ‘Human trafficking by the numbers’, https://humanrightsfirst.org/library/human-trafficking-by-the-numbers/ [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • ILO (International Labour Organization) (2005) A Global Alliance against Forced Labour. Global report under the follow-up to the ILO declaration on fundamental principles and rights at work 2005, www.ilo.org/wcmsp5/groups/public/---ed_norm/---declaration/documents/publication/wcms_081882.pdf [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • ILO (2009) The Cost of Coercion. Global report under the follow-up to the ILO declaration on fundamental principles and rights at work, www.ilo.org/wcmsp5/groups/public/---ed_norm/---declaration/documents/publication/wcms_106268.pdf [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • ILO and Walk Free Foundation (2017) Global Estimates of Modern Slavery. Forced Labour and Forced Marriage, www.ilo.org/wcmsp5/groups/public/@dgreports/@dcomm/documents/publication/wcms_575479.pdf [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Interpol (2018) ‘Global wildlife enforcement. Strengthening law enforcement cooperation against wildlife crime’, www.interpol.int/Crimes/Environmental-crime/Wildlife-crime [Accessed 14 December 2023].

    • Search Google Scholar
    • Export Citation
  • Interpol (2019) ‘Global forestry enforcement. Strengthening law enforcement cooperation against forestry crime’, www.interpol.int/Crimes/Environmental-crime/Forestry-crime [Accessed 14 December 2023].

    • Search Google Scholar
    • Export Citation
  • Interpol (2021) ‘Environmental security programme. Strengthening law enforcement cooperation against fisheries crime’, www.interpol.int/Crimes/Environmental-crime/Fisheries-crime [Accessed 14 December 2023].

    • Search Google Scholar
    • Export Citation
  • Interpol (2022) ‘Environmental security programme. Strengthening law enforcement cooperation against pollution crime’, www.interpol.int/Crimes/Environmental-crime/Pollution-crime [Accessed 14 December 2023].

    • Search Google Scholar
    • Export Citation
  • Jakobi, A.P. (2013) Common Goods and Evils? The Formation of Global Crime Governance, Oxford: Oxford University Press.

  • Jakobi, A.P. (2020) Crime, Security and Global Politics. An Introduction to Global Crime Governance, London: Palgrave Macmillan/Red Globe Press.

    • Search Google Scholar
    • Export Citation
  • Jongen, H. (2018) ‘The authority of peer reviews among states in the global governance of corruption’, Review of International Political Economy, 25(6): 90935.

    • Search Google Scholar
    • Export Citation
  • Kelley, J.G. and Simmons, B.A. (2019) ‘Introduction: the power of global performance indicators’, International Organization, 73(3): 491510.

    • Search Google Scholar
    • Export Citation
  • LaFree, G. and Dugan, L. (2007) ‘Introducing the global terrorism database’, Terrorism and Political Violence, 19(2): 181204.

  • Lehmacher, W. (2016) ‘Wildlife crime: a $23 billion trade that’s destroying our planet’, World Economic Forum, 28 September, www.weforum.org/agenda/2016/09/fighting-illegal-wildlife-and-forest-trade/ [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Levi, M., Reuter, P. and Halliday, T. (2018) ‘Can the AML system be evaluated without better data?’, Crime, Law and Social Change, 69: 30728.

    • Search Google Scholar
    • Export Citation
  • Lewis, C. (2012) ‘Crime and justice statistics collected by international agencies’, European Journal of Crime Policy Research, 18(1): 521.

    • Search Google Scholar
    • Export Citation
  • Lewis, J.A. (2018) ‘Economic impact of cybercrime’, McAfee; Center for Strategic and International Studies, 21 February, www.csis.org/analysis/economic-impact-cybercrime [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Lewis, J.A., Malekos Smith, Z. and Lostri, E. (2020) ‘The hidden costs of cybercrime’, Center for Strategic and International Studies, 9 December, www.csis.org/analysis/hidden-costs-cybercrime [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • López-Rey, M. (1985) A Guide to United Nations Criminal Policy, Cambridge: Gower.

  • Maguire, M. and McVie, S. (2017) ‘Crime data and criminal statistics: a critical reflection’, in A. Liebling, S. Maruna and L. McAra (eds) The Oxford Handbook of Criminology, Oxford: Oxford University Press, pp 16389.

    • Search Google Scholar
    • Export Citation
  • Makisaka, M. (2009) Human Trafficking: A Brief Overview, Social Development Notes, No. 122, World Bank, https://openknowledge.worldbank.org/handle/10986/11103 [Accessed on 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • McGinty, J.C. (2019) ‘GDP doesn’t include proceeds of crime. Should it?’, Wall Street Journal, 6 December, www.wsj.com/articles/gdp-doesnt-include-proceeds-of-crime-should-it-11575628201 [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Morgan, S. (2020) ‘Cybercrime to cost the world $10.5 trillion annually by 2025’, Cybercrime Magazine, 13 November, https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Mosher, C.J., Miethe, T.D. and Hart, T.C. (2011) The Mismeasure of Crime (2nd edn), Los Angeles, London, New Delhi, Singapore, Washington DC: SAGE Publications.

    • Search Google Scholar
    • Export Citation
  • Muller, J.Z. (2018) The Tyranny of Metrics, Princeton, NJ, Oxford: Princeton University Press.

  • Nellemann, C., Henriksen, R., Kreilhuber, A., Stewart, D., Kotsovou, M., Raxter, P., Mrema, E. and Barret, S. (eds) (2016) The Rise of Environmental Crime: A Growing Threat to Natural Resources, Peace, Development and Security, United Nations Environment Programme; RHIPTO Rapid Response–Norwegian Center for Global Analyses, www.unep.org/resources/report/rise-environmental-crime-growing-threat-natural-resources-peace-development-and [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Polaris Project (2022) ‘Myths, facts, and statistics’, https://polarisproject.org/myths-facts-and-statistics/ [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Paoli, L. (2003) Mafia Brotherhoods. Organized Crime, Italian Style, Oxford: Oxford University Press.

  • Reuter, P. (2013) ‘Are estimates of the volume of money laundering either feasible or useful?’, in B. Unger and D. van der Linde (eds) Research Handbook on Money Laundering, New York, NY: Edward Elgar Publishing, pp 22431.

    • Search Google Scholar
    • Export Citation
  • Shalal, A. and Lawder, D. (2021) ‘IMF chief called out over pressure to favor China while at World Bank’, Reuters, 17 September, www.reuters.com/business/sustainable-business/world-bank-kills-business-climate-report-after-ethics-probe-cites-undue-pressure-2021-09-16/ [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Safe Horizon (2022) ‘Human trafficking statistics and facts’, www.safehorizon.org/get-informed/human-trafficking-statistics-facts/#definition/ [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Sellin, T. and Wolfgang, M.E. (1964) The Measurement of Crime and Delinquency, New York, NY: John Wiley.

  • Stamatel, J.P. (2009) ‘Contributions of cross-national research to criminology at the beginning of the 21st century’, in M.D. Krohn, N. Hendrix, G. Penly Hall and A.J. Lizotte (eds) Handbook on Crime and Deviance, New York, NY: Springer, pp 322.

    • Search Google Scholar
    • Export Citation
  • Stone, D.A. (1989) ‘Causal stories and formation of policy agendas’, Political Science Quarterly, 104(2): 281300.

  • Transparency International (2020) Corruption Perception Index, www.transparency.org/en/cpi/2020 [Accessed 14 February 2022].

  • United Nations (2000) Resolution adopted by the General Assembly (A/RES/55/25). United Nations Convention against Transnational Organized Crime, www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Convention/TOCebook-e.pdf [Accessed 10 January 2023].

    • Search Google Scholar
    • Export Citation
  • UNODC (United Nations Office on Drugs and Crime) (2011) ‘Illicit money: how much is out there?’, www.unodc.org/unodc/en/frontpage/2011/October/illicit-money_-how-much-is-out-there.html [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • UNODC (2020) Global Report on Trafficking in Person, www.unodc.org/unodc/en/data-and-analysis/glotip.html [Accessed 14 February 2022].

  • UNODC (2021a) World Drug Report, www.unodc.org/unodc/en/data-and-analysis/wdr2021.html [Accessed 14 February 2022].

  • UNODC (2021b) World Drug Report. Booklet 2: Global Overview of Drug Demand and Drug Supply, www.unodc.org/unodc/en/data-and-analysis/wdr-2021_booklet-2.html [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • UNODC (2023) ‘Money laundering’, https://www.unodc.org/unodc/en/money-laundering/overview.html [Accessed 24 January 2023].

  • Van Dijk, J. (2007) ‘The international crime victims survey and complementary measures of corruption and organized crime’, Crime Prevention Studies, 22: 12544.

    • Search Google Scholar
    • Export Citation
  • Van Dijk, J. (2011) ‘Quantitative criminology: crime and justice statistics across nations’, in C.J. Smith, S.X. Zhang and R. Barberet (eds) Handbook of Criminology: An International Perspective, London: Routledge, pp 352.

    • Search Google Scholar
    • Export Citation
  • Varese, F. (2013) Mafias on the Move – How Organized Crime Conquers New Territories, Princeton, NJ: Princeton University Press.

  • Von Lampe, K. (2016) Organized Crime: Analyzing Illegal Activities, Criminal Structures, and Extra-legal Governance, Thousand Oaks, CA: Sage.

    • Search Google Scholar
    • Export Citation
  • White, R.D. and Heckenberg, D. (2014) Green Criminology: An Introduction to the Study of Environmental Harm, New York, NY: Routledge.

  • World Bank (2021) ‘Statement on release of investigation into data irregularities in doing business 2018 and 2020’, 16 September, www.worldbank.org/en/news/statement/2021/09/16/statement-on-release-of-investigation-into-data-irregularities-in-doing-business-2018-and-2020 [Accessed 14 February 2022].

    • Search Google Scholar
    • Export Citation
  • Abbott, K.W., Green, J.F. and Keohane, R.O. (2016) ‘Organizational ecology and institutional change in global governance’, International Organization, 70(2): 24777.

    • Search Google Scholar
    • Export Citation
  • Allan, B.B. (2017) ‘Producing the climate: states, scientists, and the constitution of global governance objects’, International Organization, 71(1): 13162.

    • Search Google Scholar
    • Export Citation
  • Aradau, C. and Blanke, T. (2018) ‘Governing others: anomaly and the algorithmic subject of security’, European Journal of International Security, 3(1): 121.

    • Search Google Scholar
    • Export Citation
  • Betz, D.J. and Stevens, T. (2013) ‘Analogical reasoning and cyber security’, Security Dialogue, 44(2): 14764.

  • Branch, J. (2020) ‘What’s in a name? Metaphors and cybersecurity’, International Organization, 75(1): 3970.

  • Broome, A. and Quirk, J. (2015) ‘Governing the world at a distance: the practice of global benchmarking’, Review of International Studies, 41(5): 81941.

    • Search Google Scholar
    • Export Citation
  • Bueger, C. (2015) ‘Making things known: epistemic practices, the United Nations, and the translation of piracy’, International Political Sociology, 9(1): 118.

    • Search Google Scholar
    • Export Citation
  • Calderaro, A. and Craig, A. (2020) ‘Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building’, Third World Quarterly, 41(6): 91738.

    • Search Google Scholar
    • Export Citation
  • Carr, M. (2021) ‘A political history of cyberspace’, in P. Cornish (ed) The Oxford Handbook of Cyber Security, Oxford: Oxford University Press, pp 4966.

    • Search Google Scholar
    • Export Citation
  • CFR (Council on Foreign Relations) (2023) Cyber Operations Tracker, www.cfr.org/cyber-operations/ [Accessed 4 December 2023].

  • CSIS (Center for Strategic and International Studies) (2023) Significant Cyber Incidents, www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents [Accessed 4 December 2023].

  • Davis, K.E., Kingsbury, B. and Merry, S.E. (2012) ‘Indicators as a technology of global governance’, Law & Society Review, 46(1): 71104.

    • Search Google Scholar
    • Export Citation
  • Denardis, L. (2009) Protocol Politics: The Globalization of Internet Governance, Cambridge, MA: The MIT Press.

  • Dunn Cavelty, M. (2013) ‘From cyber-bombs to political fallout: threat representations with an impact in the cyber-security discourse’, International Studies Review, 15(1): 10522.

    • Search Google Scholar
    • Export Citation
  • Egloff, F.J. and Dunn Cavelty, M. (2021) ‘Attribution and knowledge creation assemblages in cybersecurity politics’, Journal of Cybersecurity, 7(1): 112.

    • Search Google Scholar
    • Export Citation
  • e-Governance Academy (no date) National Cyber Security Index, https://ncsi.ega.ee/ [Accessed 11 February 2022].

  • European Data Protection Supervisor (2022) Opinion 9/2022 on the Recommendation for a Council Decision Authorising the Negotiations for a Comprehensive International Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes, 18 May, https://edps.europa.eu/system/files/2022-05/2022-05-18-opinion_on_international_convention_en.pdf [Accessed 10 May 2023].

    • Search Google Scholar
    • Export Citation
  • Flonk, D., Jachtenfuchs, M. and Obendiek, A. (2020) ‘Authority conflicts in internet governance: liberals vs. sovereigntists?’, Global Constitutionalism, 9(2): 36486.

    • Search Google Scholar
    • Export Citation
  • GCSCC (Global Cyber Security Capacity Centre) (2021) Cybersecurity Capacity Maturity Model for Nations, https://gcscc.ox.ac.uk/files/cmm2021editiondocpdf [Accessed 11 February 2022].

    • Search Google Scholar
    • Export Citation
  • Hannan, M.T. and Freeman, J. (1989) Organizational Ecology, Cambridge: Cambridge University Press.

  • Holder, M. (2022) ‘Cyberspace in a state of flux: regulating cyberspace through international law’, Groningen Journal of International Law, 9(2): 26680.

    • Search Google Scholar
    • Export Citation
  • IISS (International Institute for Strategic Studies) (2021) Cyber Capabilities and National Power: A Net Assessment, 28 June, www.iiss.org/blogs/research-paper/2021/06/cyber-capabilities-national-power [Accessed 11 February 2022].

    • Search Google Scholar
    • Export Citation
  • International Telecommunication Union (ITU) (2015) Global Cybersecurity Index and Cyberwellness Profiles, Geneva: International Telecommunication Union.

    • Search Google Scholar
    • Export Citation
  • ITU (2017) Global Cybersecurity Index 2017, Geneva: International Telecommunication Union.

  • ITU (2019) Global Cybersecurity Index 2018, Geneva: International Telecommunication Union.

  • ITU (2021) Global Cybersecurity Index 2020: Measuring Commitment to Cybersecurity, Geneva: International Telecommunication Union.

  • Kaspersky (2021) Kaspersky Security Bulletin 2021. Statistics, 15 December. https://securelist.com/kaspersky-security-bulletin-2021-statistics/105205 [Accessed 11 February 2022].

    • Search Google Scholar
    • Export Citation
  • Kelley, J.G. and Simmons, B.A. (2019) ‘Introduction: the power of global performance indicators’, International Organization, 73(3): 491510.

    • Search Google Scholar
    • Export Citation
  • Lake, D.A. (2021) ‘The organizational ecology of global governance’, European Journal of International Relations, 27(2): 34568.

  • Maschmeyer, L., Deibert, R. and Lindsay, J.R. (2021) ‘A tale of two cybers – how threat reporting by cybersecurity firms systematically underrepresents threats to civil society’, Journal of Information Technology & Politics, 18(1): 120.

    • Search Google Scholar
    • Export Citation
  • Microsoft (2021) Digital Defense Report, October, https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi?id=101738 [Accessed 11 February 2022].

    • Search Google Scholar
    • Export Citation
  • Mueller, M. (2017) Will the Internet Fragment? Sovereignty, Globalization and Cyberspace, Cambridge, MA: Polity.

  • Murgia, M. and Gross, A. (2020) ‘Inside China’s controversial mission to reinvent the internet’, Financial Times, 27 March, www.ft.com/content/ba94c2bc-6e27-11ea-9bca-bf503995cd6f [Accessed 10 May 2023].

    • Search Google Scholar
    • Export Citation
  • NATO (North Atlantic Treaty Organization) (2016) ‘Cyber Defence Pledge’, Press Release 124, 8 July, www.nato.int/cps/en/natohq/official_texts_133177.htm [Accessed 11 February 2022].

    • Search Google Scholar
    • Export Citation
  • Price, M. (2018) ‘The global politics of internet governance. A case study in closure and technological design’, in D.R. McCarthy (ed) Technology and World Politics. An Introduction, London: Routledge, pp 12645.

    • Search Google Scholar
    • Export Citation
  • Privacy International (2016) The Global Surveillance Industry, July, www.privacyinternational.org/sites/default/files/2017-12/global_surveillance_0.pdf [Accessed 31 March 2023].

    • Search Google Scholar
    • Export Citation
  • Rumelili, B. and Towns, A.E. (2022) ‘Driving liberal change? Global performance indices as a system of normative stratification in liberal international order’, Cooperation and Conflict, 57(2): 15270.

    • Search Google Scholar
    • Export Citation
  • Shaurya and Singh, M. (2021) ‘Cyber threats of modern era’, in V.E. Balas, A.E. Hassanien, S. Chakrabarti and L. Mandal (eds) Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing. IEM-ICDC 2020, Singapore: Springer, pp 65970.

    • Search Google Scholar
    • Export Citation
  • Slayton, R. (2015) ‘Measuring risk: computer security metrics, automation, and learning’, IEEE Annals of the History of Computing, 37(2): 3245.

    • Search Google Scholar
    • Export Citation
  • Slayton, R. (2021) ‘Governing uncertainty or uncertain governance? Information security and the challenge of cutting ties’, Science, Technology & Human Values, 46(1): 81111.

    • Search Google Scholar
    • Export Citation
  • Stevens, T. (2020) ‘Knowledge in the grey zone: AI and cybersecurity’, Journal of Digital War, 1(1): 16470.

  • US Department of Homeland Security (2011) Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action, 23 March, www.dhs.gov/xlibrary/assets/nppd-cyber-ecosystem-white-paper-03-23-2011.pdf [Accessed 12 May 2023].

    • Search Google Scholar
    • Export Citation
  • Voo, J., Hemani, I., Jones, S., DeSombre, W., Cassidy, D. and Schwarzenbach, A. (2020a) Reconceptualizing Cyber Power: Cyber Power Index Primer, Cambridge, MA: Belfer Center for Science and International Affairs.

    • Search Google Scholar
    • Export Citation
  • Voo, J., Hemani, I., Jones, S., DeSombre, W., Cassidy, D. and Schwarzenbach, A. (2020b) National Cyber Power Index 2020: Methodology and Analytical Considerations, Cambridge, MA: Belfer Center for Science and International Affairs.

    • Search Google Scholar
    • Export Citation
  • Yarovenko, H., Kuzmenko, O. and Stumpo, M. (2020) ‘Strategy for determining country ranking by level of cybersecurity’, Financial Markets, Institutions and Risks, 4(3): 12437.

    • Search Google Scholar
    • Export Citation

Content Metrics

May 2022 onwards Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 123 123 29
PDF Downloads 33 33 5

Altmetrics