This article focuses on the role of government in relation to cybersecurity. Traditionally, cybersecurity was primarily seen as a technical issue. In recent years, governments have realised that they, too, have a stake in securing the Internet. In their attempts to grapple with cybersecurity, governments often turn to technical solutions to ‘code away’ illegal or undesired behaviours. ‘Techno-regulation’ has become popular because it may seem to be an effective and cheap way of increasing control over end users’ behaviours and increasing cybersecurity. In this article, we will explain why using techno-regulation has significant downsides and, therefore, why it may be unwise to use it as a dominant regulatory strategy for securing ...
Controlling the Internet has for a long time been the privilege of academics in the USA. However, wi...
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are part...
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, co...
Cybersecurity regulation presents an interesting quandary where, because private entities possess th...
The conventional wisdom is that this country’s privately owned critical infrastructure—banks, teleco...
The Internet, which is a global and complex infrastructure, is a mechanism for information sharing a...
Purpose: The issue of cybersecurity has been cast as the focal point of a fight between two conflict...
Internet Governance is concerned with the organisation, control, and strategic development of the In...
Purpose: The issue of cybersecurity has been cast as the focal point of a fight between two conflict...
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could preven...
Internet Governance is concerned with the organisation, control, and strategic development of the In...
The article proposes a deeper insight into the variety of concepts used to describe the term cyber s...
Over the last thirty years, the Internet generally and the World Wide Web in particular have gone fr...
The protection of cyberspace has become one of the highest security priorities of governments worldw...
The protection of cyberspace has become one of the highest security priorities of governments worldw...
Controlling the Internet has for a long time been the privilege of academics in the USA. However, wi...
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are part...
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, co...
Cybersecurity regulation presents an interesting quandary where, because private entities possess th...
The conventional wisdom is that this country’s privately owned critical infrastructure—banks, teleco...
The Internet, which is a global and complex infrastructure, is a mechanism for information sharing a...
Purpose: The issue of cybersecurity has been cast as the focal point of a fight between two conflict...
Internet Governance is concerned with the organisation, control, and strategic development of the In...
Purpose: The issue of cybersecurity has been cast as the focal point of a fight between two conflict...
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could preven...
Internet Governance is concerned with the organisation, control, and strategic development of the In...
The article proposes a deeper insight into the variety of concepts used to describe the term cyber s...
Over the last thirty years, the Internet generally and the World Wide Web in particular have gone fr...
The protection of cyberspace has become one of the highest security priorities of governments worldw...
The protection of cyberspace has become one of the highest security priorities of governments worldw...
Controlling the Internet has for a long time been the privilege of academics in the USA. However, wi...
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are part...
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, co...