Abstract
The widespread use of information technology in daily transactions has exacerbated the role of information security to protect information assets. Regulating network and information security has taken place through instruments and instantiations used for most of the time for different purposes than those strictly needed by information security itself. If information security is the answer to such requirements as confidentiality, integrity and availability of resources, setting up appropriate regulation is the means to set up binding frameworks. Regulation in this respect takes into account the requirements for a soft law approach that encompasses self regulatory frameworks and standards. A set of regulatory principles addressing the content and form of regulation in network and information security is an additional means to further enhance the impact of legislation and serve stakeholders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Austin, John: The province of jurisprudence determined, London, 1832.
Boas, George: Rationalism in Greek philosophy, The John Hopkins Press, Baltimore, 1961, p. 162–163.
Boss, Amelia: Searching for Security in the Law of Electronic Commerce, Nova Law Review, Vol. 23, 2000.
Alfred Buellesbach: Chapter IV, Transfer of personal data to third countries. In Alfred Buellesbach, Yves Poullet, Corien Prins, Concise European IT Law, Kluwer Law International, 2006, p.102–108.
Castells, Manuel: The Rise of the Network Society, Blackwell, UK, 2004, p. 28ss.
Recommendations to the European Council Europe and the global information society, European Commission, Brussels 1994.
Communication from the Commission to the Council, the European Parliament, the Economic and Social Committee and the Committee of the Regions — eEurope 2005: An information society for all An Action Plan to be presented in view of the Sevilla European Council, 21/22 June 2002, COM(2002) 263 final, Brussels, 2002.
Dworkin, Ronald: Taking rights seriously, Duckworth, London, 1977, p. 17, 22, 72.
ETSI (European Telecommunications Standards Institute): White Paper on “Achieving Technical Interoperability”, Sophia-Antipolis, October 2006, p. 6.
Ford, W., Baum, M.: Secure Electronic Commerce, (2nd edition) Prentice-Hall, 2001.
Hart, H.L.A.: The concept of Law, Clarendon Press, Oxford, 1961.
Hix, Simon: The political system of the European Union, Palgrave, London, 1999.
Koops, B-J., Lips, M., Prins, C, Schellekens, M. et al.: Starting Points for ICT Regulation, Information Technology and Law Series, The Hague 2006, p. 7, 44, 48, 49ss.
Lessig, Lawrence: Free Culture, Penguin, NY, 2004.
Lawrence Lessig: Code, Basic Books, NY, 2006, p. 61.
Levitt, Steven D.: An economist sells bagels: A case study on profit maximisation, National bureau of economic research working paper, Cambridge, MA, 2006.
Luhman, Niklas: Social systems, Stanford University Press, Stanford, CA, 1995.
Matsuura, J.H.: Security, rights, and liabilities in e-commerce, Artech House, US, (2002), p. 3ss.
Mitrakas, Andreas, Hengenveld, Pim, Polemi, Despina, Gamper, Johann: Towards secure eGovernment, in Mitrakas, Andreas Pim Hengenveld, Despina Polemi, Johann Gamper, Secure eGovernment web services, IGI Publishing, Hershey, 2007.
Mitrakas, Andreas: Article 9 [Committee]. In Alfred Buellesbach, Yves Poullet, Corien Prins, Concise European IT Law, Kluwer Law International, 2006, p. 387–389.
Mitrakas, Andreas: Annex II, Overview of Current Legal and Policy issues, in Christos Douligeris, Dimitris Seripanos (eds.), Network Security: Current status and future directions, John Wiley & Sons (IEEE Publication), Hoboken, NJ, 2007, p 481–506.
Mitnick, B.M.: The political economy of regulation: creating, designing and removing regulatory forms, Columbia University Press, NY, 1980.
Pfleeger, C: Security in Computing, Prentice Hall, 2000.
Mitchell Polinsky, A.: An introduction to law and economics, (2nd edition), Little, Brown & Co., Boston, 1989, pp. 11–14.
WG-RANIS: Inventory and assessment of EU regulatory activity on network and information security, (NIS), ENISA Working Group Report, 2006.
Senden, Linda: Soft law in the European Community Law, Hart Publishing, Oxford, 2004.
Senden, Linda: Soft law, self regulation and co-regulation in European Law: Where do they meet? In Electronic Journal of Comparative Law, Vol., 9.1, January 2005, www.ejcl.org
Terstegge, Jeroen: Article 17 [Security of processing]. In Alfred Buellesbach, Yves Poullet, Corien Prins, Concise European IT Law, Kluwer Law International, 2006, p. 76–79.
Weiler, J.H.H.: The Transformation of Europe, 100 Yale lawjournal 2403 1991, p. 2461.
Williamson, Oliver E.: Transaction Cost Economics and Business Administration, Scandinavian Journal of Management, 21(1), March 2005, p. 19–40.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2007 Friedr. Vieweg & Sohn Verlag | GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Mitrakas, A., Portesi, S. (2007). Regulating Information Security: A Matter of Principle?. In: ISSE/SECURE 2007 Securing Electronic Business Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9418-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9418-2_1
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0346-7
Online ISBN: 978-3-8348-9418-2
eBook Packages: Computer ScienceComputer Science (R0)