Abstract
Some people contended that governmental regulation of the Internet would not be possible due to its inherent characteristics. This paper relates how governments, in addressing law enforcement and national security, have taken control of the Internet by means of legislation. Consideration is given to the influence and impact of powerful governments on the legal regulation of the Internet. It is pointed out that when addressing law enforcement and national security the borderless nature of the Internet is in reality bordered. It is concluded that in striving towards law enforcement and national security, enforcement of governmental control of the Internet is not easily achieved without the assistance of the Internet Service Provider (ISP) as well as international assistance and co-operation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Barlow, John Perry: A declaration of the Independence of Cyberspace. In: http://www.islandone.org/Politics/DeclarationOfIndependance.html (August 1, 2007).
Baumann, Michael: Cyberattacks engulf Kremlin’s critics, left and right. In: http://www.ioltechnology,co.za/article_print.php?iArticleID=5017802 January 24, 2008).
Bowrey, Kathy: Law and Internet Culture. Cambridge University Press, 2005, p. 8–9, 194–197.
Burney, Brett: The Concept of Cybercrime — Is it right to analogize a physical crime to a cybercrime? The rise of the Internet. In: http://www.cybercrimes.net/Virtual/Burney/pages3.html (February 12, 2002)
Carr, Indira: Anonymity, the Internet and Criminal Law Issues. In: C. Nicoll, J.E.J. Prins and M.J.M. van Dellen (Eds): Digital Anonymity and the Law. T M C Asser Press, The Hague, 2003, p. 161–188.
Carvajal, Doreen: Europe poised to bolster web shield. In: http://yaleglobal.yale.edu/display.article?id=10598 (June 15, 2008).
Ferguson, Tim: Nato fires up cyber defences. In: http://software.silicon,com/securty/0,39024655,39223469,00.htm (June 15, 2008).
Goldsmith, Jack and Wu, Tim: Who controls the Internet. Oxford University Press, USA, 2006, p. 73, 81, 84, 103, 145, 163–167.
Heath, Nick: Nato: Cyber terrorism “as dangerous s missile attack”. In: http://www.crime-research.org/news/10.03.2008/3241/ (March 19, 2008).
Hiller, Janine and Cohen, Ronnie: Internet Law and Policy. Pearson Education, Inc., New Jersey, 2002, p. 75–76, 95, 98–100, 169, 170–171.
Janczewski, Lech and Colarik, Andrew: Managerial Guide for Handling Cyber-terrorism and Information Warfare, Idea Group Publishing, USA, 2005, p. x, 43, 222–225.
Jones, Huw: Estonia calls for EU law to ban cyber attacks. In: http://www.crime-research.org/news/12/03.2008/3248/ (March 19, 2008).
Ryan, Johny: Outbreak of iWar imminent. In: Commercial Crime Journal, March 2008, p. 10–11.
Taylor, R.W., Caeti, T.J., Loper, T.J., Fritsch, E.J. and Liederbach, J: Digital Crime and Digital Terrorism, Pearson Education, Inc, USA, 2006, p. 9–15, 27, 43, 378–379.
Tribe, Laurence. H: The Constitution in Cyberspace: Law and Liberty Beyond the Electronic Frontier. Presented at the first Conference on Computers, Freedom and Privacy, held in 1991. In: http://www.fiu.edu/∼mizrachs/CyberConst.html (March 22, 2008).
Warren, Jim: Introduction. Presented at the first Conference on Computers, Freedom and Privacy, held in 1991. IEEE Computer Society. In: http://www.cpsr.org/conferences/cfp91/intro.html/view (March 21, 2008).
Watney, Murdoch: State Surveillance of the Internet: human rights infringement or e-security mechanism? International Journal of Electronic Security and Digital Forensics, Vol. 1, No.1, 2007, p. 42–54.
Watney, Murdoch: The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet’ In: N. Pohlmann, H. Reiner and W. Schneider ISSE/Secure 2007 Securing Electronic Business Processes, Vieweg, Wiesbaden, p. 26–37.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Watney, M. (2009). Governmental Control of the Internet in addressing Law Enforcement and National Security. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9283-6_11
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0660-4
Online ISBN: 978-3-8348-9283-6
eBook Packages: Computer ScienceComputer Science (R0)