Muutke küpsiste eelistusi

E-raamat: Self- and Co-regulation in Cybercrime, Cybersecurity and National Security

  • Formaat: PDF+DRM
  • Sari: SpringerBriefs in Cybersecurity
  • Ilmumisaeg: 06-May-2015
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319164472
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: SpringerBriefs in Cybersecurity
  • Ilmumisaeg: 06-May-2015
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319164472

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The ever increasing use of computers, networks and the Internet has led to the need for regulation in the fields of cybercrime, cybersecurity and national security. This SpringerBrief provides insights into the development of self- and co-regulatory approaches to cybercrime and cybersecurity in the multi-stakeholder environment. It highlights the differences concerning the ecosystem of stakeholders involved in each area and covers government supported initiatives to motivate industry to adopt self-regulation. Including a review of the drawbacks of existing forms of public-private collaboration, which can be attributed to a specific area (cybercrime, cybersecurity and national security), it provides some suggestions with regard to the way forward in self- and co-regulation in securing cyberspace.
1 Public-Private Collaboration: Cybercrime, Cybersecurity and National Security
1(42)
Tatiana Tropina
1.1 Introduction
1(3)
1.2 Cybersecurity, Cybercrime, Cyberwar? Terminology and Misconceptions
4(7)
1.2.1 Cybersecurity: Different Dimensions and Blurring Borders
5(4)
1.2.2 Areas of Public-Private Collaboration on Cybersecurity
9(2)
1.3 Regulating Cybersecurity: What Are the Options?
11(9)
1.3.1 Cybersecurity as a Multi-stakeholder Environment: Transformation
12(4)
1.3.2 Self- and Co-regulation: Theoretical Approaches and Practical Implementation
16(3)
1.3.3 Legislating Cybersecurity?
19(1)
1.4 Existing Initiatives: From Illegal Content Towards Cyber-Resilience
20(6)
1.4.1 Fighting Cybercrime: Forms of Cooperation
21(2)
1.4.2 Cybersecurity: A Call for More Structured Approaches
23(3)
1.5 Problems and a Way Forward
26(9)
1.5.1 Limitations: Mandate of the Governments in Criminal Law and Security
27(1)
1.5.2 Degree of Governmental Intervention
28(1)
1.5.3 EU NIS Directive: From Voluntary Collaboration to Statutory Regulation?
29(4)
1.5.4 Safeguards
33(1)
1.5.5 Incentives and Costs
34(1)
1.5.6 Way Forward: Is Statutory Regulation Still an Option?
35(1)
1.6 Conclusion
35(8)
References
37(6)
2 Evolution, Implementation and Practice of Internet Self-regulation, Co-regulation and Public-Private Collaboration
43(47)
Cormac Callanan
2.1 The Birth of Self-regulation
44(13)
2.1.1 Introduction
44(1)
2.1.2 Individual
44(1)
2.1.3 Company
45(1)
2.1.4 Industry Sector
45(1)
2.1.5 Guided by Regulation (Sometimes Called Co-regulation)
46(1)
2.1.6 Multi-stakeholder
46(1)
2.1.7 Background
47(1)
2.1.8 Content versus Traffic
48(1)
2.1.9 Usenet News
48(2)
2.1.10 Log Records and Charging
50(1)
2.1.11 Traditional Telecom Services
50(2)
2.1.12 Open Telecommunications Market
52(1)
2.1.13 Dropping Newsgroups
52(1)
2.1.14 Embryonic Self-regulation
53(2)
2.1.15 Anecdote
55(1)
2.1.16 Conclusion
55(2)
2.2 Self-regulation Matures
57(32)
2.2.1 Introduction
57(1)
2.2.2 Putting Structure on Self-regulation
57(1)
2.2.3 UK French Letter
57(3)
2.2.4 UK Child Pornography Laws
60(1)
2.2.5 The Protection of Minors and Human Dignity in Audio-Visual Services
61(5)
2.2.6 US Framework for Global Electronic Commerce
66(2)
2.2.7 Global Information Networks: Realising the Potential Conference, Bonn Germany
68(2)
2.2.8 Irish Working Group on Illegal and Harmful Use of the Internet
70(3)
2.2.9 Electronic Mail
73(1)
2.2.10 Newsgroups
74(1)
2.2.11 Web Browsing
74(1)
2.2.12 Web Hosting
75(1)
2.2.13 File Transfer
75(1)
2.2.14 Online Chat
75(1)
2.2.15 Child Pornography
76(1)
2.2.16 Recommendations of the Committee on Illegal and Harmful Use of the Internet
76(1)
2.2.17 Internet Service Provider Associations
77(2)
2.2.18 Bertelsmann Foundation
79(1)
2.2.19 EC Daphne Programme
80(2)
2.2.20 EC Safer Internet Action Plan
82(3)
2.2.21 The INHOPE (Internet Hotline Providers of Europe) Association
85(1)
2.2.22 Legislation and Conventions
86(1)
2.2.23 Directive 2000/31/EC on Certain Legal Aspects of Information Society Services, in Particular Electronic Commerce
87(1)
2.2.24 The Council of Europe Cybercrime Convention
87(2)
2.3 Conclusion
89(1)
Annex---Technology Options: Internet Monitoring and Blocking 90(5)
Appendix I 95(4)
References 99