Skip to main content

Abstract

The widespread use of information technology in daily transactions has exacerbated the role of information security to protect information assets. Regulating network and information security has taken place through instruments and instantiations used for most of the time for different purposes than those strictly needed by information security itself. If information security is the answer to such requirements as confidentiality, integrity and availability of resources, setting up appropriate regulation is the means to set up binding frameworks. Regulation in this respect takes into account the requirements for a soft law approach that encompasses self regulatory frameworks and standards. A set of regulatory principles addressing the content and form of regulation in network and information security is an additional means to further enhance the impact of legislation and serve stakeholders.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Austin, John: The province of jurisprudence determined, London, 1832.

    Google Scholar 

  2. Boas, George: Rationalism in Greek philosophy, The John Hopkins Press, Baltimore, 1961, p. 162–163.

    Google Scholar 

  3. Boss, Amelia: Searching for Security in the Law of Electronic Commerce, Nova Law Review, Vol. 23, 2000.

    Google Scholar 

  4. Alfred Buellesbach: Chapter IV, Transfer of personal data to third countries. In Alfred Buellesbach, Yves Poullet, Corien Prins, Concise European IT Law, Kluwer Law International, 2006, p.102–108.

    Google Scholar 

  5. Castells, Manuel: The Rise of the Network Society, Blackwell, UK, 2004, p. 28ss.

    Google Scholar 

  6. Recommendations to the European Council Europe and the global information society, European Commission, Brussels 1994.

    Google Scholar 

  7. Communication from the Commission to the Council, the European Parliament, the Economic and Social Committee and the Committee of the Regions — eEurope 2005: An information society for all An Action Plan to be presented in view of the Sevilla European Council, 21/22 June 2002, COM(2002) 263 final, Brussels, 2002.

    Google Scholar 

  8. Dworkin, Ronald: Taking rights seriously, Duckworth, London, 1977, p. 17, 22, 72.

    Google Scholar 

  9. ETSI (European Telecommunications Standards Institute): White Paper on “Achieving Technical Interoperability”, Sophia-Antipolis, October 2006, p. 6.

    Google Scholar 

  10. Ford, W., Baum, M.: Secure Electronic Commerce, (2nd edition) Prentice-Hall, 2001.

    Google Scholar 

  11. Hart, H.L.A.: The concept of Law, Clarendon Press, Oxford, 1961.

    Google Scholar 

  12. Hix, Simon: The political system of the European Union, Palgrave, London, 1999.

    Google Scholar 

  13. Koops, B-J., Lips, M., Prins, C, Schellekens, M. et al.: Starting Points for ICT Regulation, Information Technology and Law Series, The Hague 2006, p. 7, 44, 48, 49ss.

    Google Scholar 

  14. Lessig, Lawrence: Free Culture, Penguin, NY, 2004.

    Google Scholar 

  15. Lawrence Lessig: Code, Basic Books, NY, 2006, p. 61.

    Google Scholar 

  16. Levitt, Steven D.: An economist sells bagels: A case study on profit maximisation, National bureau of economic research working paper, Cambridge, MA, 2006.

    Google Scholar 

  17. Luhman, Niklas: Social systems, Stanford University Press, Stanford, CA, 1995.

    Google Scholar 

  18. Matsuura, J.H.: Security, rights, and liabilities in e-commerce, Artech House, US, (2002), p. 3ss.

    Google Scholar 

  19. Mitrakas, Andreas, Hengenveld, Pim, Polemi, Despina, Gamper, Johann: Towards secure eGovernment, in Mitrakas, Andreas Pim Hengenveld, Despina Polemi, Johann Gamper, Secure eGovernment web services, IGI Publishing, Hershey, 2007.

    Google Scholar 

  20. Mitrakas, Andreas: Article 9 [Committee]. In Alfred Buellesbach, Yves Poullet, Corien Prins, Concise European IT Law, Kluwer Law International, 2006, p. 387–389.

    Google Scholar 

  21. Mitrakas, Andreas: Annex II, Overview of Current Legal and Policy issues, in Christos Douligeris, Dimitris Seripanos (eds.), Network Security: Current status and future directions, John Wiley & Sons (IEEE Publication), Hoboken, NJ, 2007, p 481–506.

    Google Scholar 

  22. Mitnick, B.M.: The political economy of regulation: creating, designing and removing regulatory forms, Columbia University Press, NY, 1980.

    Google Scholar 

  23. Pfleeger, C: Security in Computing, Prentice Hall, 2000.

    Google Scholar 

  24. Mitchell Polinsky, A.: An introduction to law and economics, (2nd edition), Little, Brown & Co., Boston, 1989, pp. 11–14.

    Google Scholar 

  25. WG-RANIS: Inventory and assessment of EU regulatory activity on network and information security, (NIS), ENISA Working Group Report, 2006.

    Google Scholar 

  26. Senden, Linda: Soft law in the European Community Law, Hart Publishing, Oxford, 2004.

    Google Scholar 

  27. Senden, Linda: Soft law, self regulation and co-regulation in European Law: Where do they meet? In Electronic Journal of Comparative Law, Vol., 9.1, January 2005, www.ejcl.org

    Google Scholar 

  28. Terstegge, Jeroen: Article 17 [Security of processing]. In Alfred Buellesbach, Yves Poullet, Corien Prins, Concise European IT Law, Kluwer Law International, 2006, p. 76–79.

    Google Scholar 

  29. Weiler, J.H.H.: The Transformation of Europe, 100 Yale lawjournal 2403 1991, p. 2461.

    Google Scholar 

  30. Williamson, Oliver E.: Transaction Cost Economics and Business Administration, Scandinavian Journal of Management, 21(1), March 2005, p. 19–40.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Friedr. Vieweg & Sohn Verlag | GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Mitrakas, A., Portesi, S. (2007). Regulating Information Security: A Matter of Principle?. In: ISSE/SECURE 2007 Securing Electronic Business Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9418-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9418-2_1

  • Publisher Name: Vieweg

  • Print ISBN: 978-3-8348-0346-7

  • Online ISBN: 978-3-8348-9418-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics