Coverart for item
The Resource Self- and Co-regulation in Cybercrime, Cybersecurity and National Security

Self- and Co-regulation in Cybercrime, Cybersecurity and National Security

Label
Self- and Co-regulation in Cybercrime, Cybersecurity and National Security
Title
Self- and Co-regulation in Cybercrime, Cybersecurity and National Security
Creator
Contributor
Subject
Language
eng
Summary
The ever increasing use of computers, networks and the Internet has led to the need for regulation in the fields of cybercrime, cybersecurity and national security. This SpringerBrief provides insights into the development of self- and co-regulatory approaches to cybercrime and cybersecurity in the multi-stakeholder environment. It highlights the differences concerning the ecosystem of stakeholders involved in each area and covers government supported initiatives to motivate industry to adopt self-regulation. Including a review of the drawbacks of existing forms of public-private collaboration, which can be attributed to a specific area (cybercrime, cybersecurity and national security), it provides some suggestions with regard to the way forward in self- and co-regulation in securing cyberspace
Member of
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Series statement
SpringerBriefs in Cybersecurity
Self- and Co-regulation in Cybercrime, Cybersecurity and National Security
Label
Self- and Co-regulation in Cybercrime, Cybersecurity and National Security
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=2095796
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Foreword -- Contents -- 1 Public--Private Collaboration: Cybercrime, Cybersecurity and National Security -- Abstract -- 1.1 Introduction -- 1.2 Cybersecurity, Cybercrime, Cyberwar? Terminology and Misconceptions -- 1.2.1 Cybersecurity: Different Dimensions and Blurring Borders -- 1.2.2 Areas of Public--Private Collaboration on Cybersecurity -- 1.3 Regulating Cybersecurity: What Are the Options? -- 1.3.1 Cybersecurity as a Multi-stakeholder Environment: Transformation -- 1.3.2 Self- and Co-regulation: Theoretical Approaches and Practical Implementation -- 1.3.3 Legislating Cybersecurity? -- 1.4 Existing Initiatives: From Illegal Content Towards Cyber-Resilience -- 1.4.1 Fighting Cybercrime: Forms of Cooperation -- 1.4.1.1 Hotlines and Reporting Platforms---The First Forms of Collaboration -- 1.4.1.2 Industry Codes of Conducts -- 1.4.1.3 Public Awareness Campaigns -- 1.4.1.4 Education and Capacity Building -- 1.4.1.5 Ad hoc Collaboration and Call for Structured Approaches -- 1.4.2 Cybersecurity: A Call for More Structured Approaches -- 1.4.2.1 Urgent Response: Ah hoc Collaboration -- 1.4.2.2 Towards Long-term Collaboration and Structured Approaches -- 1.4.2.3 Cybersecurity: National Initiatives and Projects -- 1.5 Problems and a Way Forward -- 1.5.1 Limitations: Mandate of the Governments in Criminal Law and Security -- 1.5.2 Degree of Governmental Intervention -- 1.5.3 EU NIS Directive: From Voluntary Collaboration to Statutory Regulation? -- 1.5.4 Safeguards -- 1.5.5 Incentives and Costs -- 1.5.6 Way Forward: Is Statutory Regulation Still an Option? -- 1.6 Conclusion -- References -- 2 Evolution, Implementation and Practice of Internet Self-regulation, Co-regulation and Public--Private Collaboration -- Abstract -- 2.1 The Birth of Self-regulation -- 2.1.1 Introduction -- 2.1.2 Individual -- 2.1.3 Company -- 2.1.4 Industry Sector
  • 2.1.5 Guided by Regulation (Sometimes Called Co-regulation) -- 2.1.6 Multi-stakeholder -- 2.1.7 Background -- 2.1.8 Content versus Traffic -- 2.1.9 Usenet News -- 2.1.10 Log Records and Charging -- 2.1.11 Traditional Telecom Services -- 2.1.12 Open Telecommunications Market -- 2.1.13 Dropping Newsgroups -- 2.1.14 Embryonic Self-regulation -- 2.1.15 Anecdote -- 2.1.16 Conclusion -- 2.2 Self-regulation Matures -- 2.2.1 Introduction -- 2.2.2 Putting Structure on Self-regulation -- 2.2.3 UK French Letter -- 2.2.4 UK Child Pornography Laws [1] -- 2.2.5 The Protection of Minors and Human Dignity in Audio-Visual Services -- 2.2.6 US Framework for Global Electronic Commerce -- 2.2.7 Global Information Networks: Realising the Potential Conference, Bonn Germany -- 2.2.8 Irish Working Group on Illegal and Harmful Use of the Internet -- 2.2.9 Electronic Mail -- 2.2.10 Newsgroups -- 2.2.11 Web Browsing -- 2.2.12 Web Hosting -- 2.2.13 File Transfer -- 2.2.14 Online Chat -- 2.2.15 Child Pornography -- 2.2.16 Recommendations of the Committee on Illegal and Harmful Use of the Internet -- 2.2.17 Internet Service Provider Associations -- 2.2.18 Bertelsmann Foundation -- 2.2.19 EC Daphne Programme -- 2.2.20 EC Safer Internet Action Plan -- 2.2.21 The INHOPE (Internet Hotline Providers of Europe) Association -- 2.2.22 Legislation and Conventions -- 2.2.23 Directive 2000/31/EC on Certain Legal Aspects of Information Society Services, in Particular Electronic Commerce -- 2.2.24 The Council of Europe Cybercrime Convention -- 2.3 Conclusion -- Annex---Technology Options: Internet Monitoring and Blocking -- Child Abuse Material -- Specifying Content -- Different Services -- Appendix I
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9783319164472&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4383241'}
Extent
1 online resource (109 pages)
Form of item
online
Isbn
9783319164472
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...