000 | 02920nam a22004575i 4500 | ||
---|---|---|---|
999 |
_c200434133 _d52345 |
||
003 | DE-He213 | ||
005 | 20231104114314.0 | ||
007 | cr nn 008mamaa | ||
008 | 150506s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319164472 _z978-3-319-16447-2 |
||
024 | 7 |
_a10.1007/978-3-319-16447-2 _2doi |
|
040 |
_aTR-AnTOB _beng _cTR-AnTOB _erda |
||
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUBL _2bicssc |
|
072 | 7 |
_aLAW099000 _2bisacsh |
|
072 | 7 |
_aUBL _2thema343.0999 _223 |
|
100 | 1 |
_aTropina, Tatiana. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aSelf- and Co-regulation in Cybercrime, Cybersecurity and National Security / _cby Tatiana Tropina, Cormac Callanan. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 0 |
_aSpringerBriefs in Cybersecurity, _x2193-973X |
|
505 | 0 | _aForeword -- Public-private collaboration: cybercrime, cybersecurity, national security -- Evolution, implementation and practice of Internet self-regulation, co-regulation and public-private collaboration. | |
520 | _aThe ever increasing use of computers, networks and the Internet has led to the need for regulation in the fields of cybercrime, cybersecurity and national security. This SpringerBrief provides insights into the development of self- and co-regulatory approaches to cybercrime and cybersecurity in the multi-stakeholder environment. It highlights the differences concerning the ecosystem of stakeholders involved in each area and covers government supported initiatives to motivate industry to adopt self-regulation. Including a review of the drawbacks of existing forms of public-private collaboration, which can be attributed to a specific area (cybercrime, cybersecurity and national security), it provides some suggestions with regard to the way forward in self- and co-regulation in securing cyberspace. | ||
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 0 |
_aMass media _xLaw and legislation. |
|
650 | 0 | _aComputer security. | |
650 | 1 | 4 |
_aLegal Aspects of Computing. _0http://scigraph.springernature.com/things/product-market-codes/I24059 |
650 | 2 | 4 |
_aIT Law, Media Law, Intellectual Property. _0http://scigraph.springernature.com/things/product-market-codes/R15009 |
650 | 2 | 4 |
_aSystems and Data Security. _0http://scigraph.springernature.com/things/product-market-codes/I28060 |
700 | 1 |
_aCallanan, Cormac. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-3-319-16447-2 _3Springer eBooks _zOnline access link to the resource |
942 |
_2lcc _cEBK |
||
041 | _aeng |