|
1 Public-Private Collaboration: Cybercrime, Cybersecurity and National Security |
|
|
1 | (42) |
|
|
|
1 | (3) |
|
1.2 Cybersecurity, Cybercrime, Cyberwar? Terminology and Misconceptions |
|
|
4 | (7) |
|
1.2.1 Cybersecurity: Different Dimensions and Blurring Borders |
|
|
5 | (4) |
|
1.2.2 Areas of Public-Private Collaboration on Cybersecurity |
|
|
9 | (2) |
|
1.3 Regulating Cybersecurity: What Are the Options? |
|
|
11 | (9) |
|
1.3.1 Cybersecurity as a Multi-stakeholder Environment: Transformation |
|
|
12 | (4) |
|
1.3.2 Self- and Co-regulation: Theoretical Approaches and Practical Implementation |
|
|
16 | (3) |
|
1.3.3 Legislating Cybersecurity? |
|
|
19 | (1) |
|
1.4 Existing Initiatives: From Illegal Content Towards Cyber-Resilience |
|
|
20 | (6) |
|
1.4.1 Fighting Cybercrime: Forms of Cooperation |
|
|
21 | (2) |
|
1.4.2 Cybersecurity: A Call for More Structured Approaches |
|
|
23 | (3) |
|
1.5 Problems and a Way Forward |
|
|
26 | (9) |
|
1.5.1 Limitations: Mandate of the Governments in Criminal Law and Security |
|
|
27 | (1) |
|
1.5.2 Degree of Governmental Intervention |
|
|
28 | (1) |
|
1.5.3 EU NIS Directive: From Voluntary Collaboration to Statutory Regulation? |
|
|
29 | (4) |
|
|
33 | (1) |
|
1.5.5 Incentives and Costs |
|
|
34 | (1) |
|
1.5.6 Way Forward: Is Statutory Regulation Still an Option? |
|
|
35 | (1) |
|
|
35 | (8) |
|
|
37 | (6) |
|
2 Evolution, Implementation and Practice of Internet Self-regulation, Co-regulation and Public-Private Collaboration |
|
|
43 | (47) |
|
|
2.1 The Birth of Self-regulation |
|
|
44 | (13) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
2.1.5 Guided by Regulation (Sometimes Called Co-regulation) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
2.1.8 Content versus Traffic |
|
|
48 | (1) |
|
|
48 | (2) |
|
2.1.10 Log Records and Charging |
|
|
50 | (1) |
|
2.1.11 Traditional Telecom Services |
|
|
50 | (2) |
|
2.1.12 Open Telecommunications Market |
|
|
52 | (1) |
|
2.1.13 Dropping Newsgroups |
|
|
52 | (1) |
|
2.1.14 Embryonic Self-regulation |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
55 | (2) |
|
2.2 Self-regulation Matures |
|
|
57 | (32) |
|
|
57 | (1) |
|
2.2.2 Putting Structure on Self-regulation |
|
|
57 | (1) |
|
|
57 | (3) |
|
2.2.4 UK Child Pornography Laws |
|
|
60 | (1) |
|
2.2.5 The Protection of Minors and Human Dignity in Audio-Visual Services |
|
|
61 | (5) |
|
2.2.6 US Framework for Global Electronic Commerce |
|
|
66 | (2) |
|
2.2.7 Global Information Networks: Realising the Potential Conference, Bonn Germany |
|
|
68 | (2) |
|
2.2.8 Irish Working Group on Illegal and Harmful Use of the Internet |
|
|
70 | (3) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
2.2.16 Recommendations of the Committee on Illegal and Harmful Use of the Internet |
|
|
76 | (1) |
|
2.2.17 Internet Service Provider Associations |
|
|
77 | (2) |
|
2.2.18 Bertelsmann Foundation |
|
|
79 | (1) |
|
2.2.19 EC Daphne Programme |
|
|
80 | (2) |
|
2.2.20 EC Safer Internet Action Plan |
|
|
82 | (3) |
|
2.2.21 The INHOPE (Internet Hotline Providers of Europe) Association |
|
|
85 | (1) |
|
2.2.22 Legislation and Conventions |
|
|
86 | (1) |
|
2.2.23 Directive 2000/31/EC on Certain Legal Aspects of Information Society Services, in Particular Electronic Commerce |
|
|
87 | (1) |
|
2.2.24 The Council of Europe Cybercrime Convention |
|
|
87 | (2) |
|
|
89 | (1) |
Annex---Technology Options: Internet Monitoring and Blocking |
|
90 | (5) |
Appendix I |
|
95 | (4) |
References |
|
99 | |