A Research Agenda for Cybersecurity Law and Policy


Book Description

Elgar Research Agendas outline the future of research in a given area. Leading scholars are given the space to explore their subject in provocative ways, and map out the potential directions of travel. They are relevant but also visionary. This Research Agenda provides a roadmap for research in cybersecurity law and policy, covering critical topics such as autonomous systems, geopolitics, internet governance, national security, terrorism, space cybersecurity, data privacy, and cloud computing. The book explores the competencies needed to understand and apply cybersecurity concepts, examines the normative frameworks in Internet governance, analyses geopolitical shifts driven by digital technology, and discusses the legal challenges of autonomous systems. Additionally, it addresses the intersection of cybersecurity with national security, terrorism, and the protection of critical satellite infrastructure. It also covers privacy and data protection laws, including the impact of GDPR, and highlights the importance of indigenous data sovereignty. This volume is an essential starting point for researchers, practitioners, and policymakers navigating the multifaceted cyberspace domain. A Research Agenda for Cybersecurity Law and Policy is an essential resource for students and researchers in information and media law, military law, public international law, technology law, and terrorism and security law. It is also a useful guide for those looking to understand the evolution of research in cybersecurity, data protection, and privacy.




At the Nexus of Cybersecurity and Public Policy


Book Description

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.




A Research Agenda for Financial Crime


Book Description

In this timely Research Agenda, Barry Rider has assembled a cast of internationally renowned experts to identify the most pressing questions and issues around financial crime, helping to inform our understanding of how best to protect our economies and financial institutions.




Cybersecurity Law, Standards and Regulations, 2nd Edition


Book Description

In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s Cybersecurity Law, Standards and Regulations (2nd Edition), lets you integrate legal issues into your security program. Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.” In a friendly style, offering real-world business examples from his own experience supported by a wealth of court cases, Schreider covers the range of practical information you will need as you explore – and prepare to apply – cybersecurity law. His practical, easy-to-understand explanations help you to: Understand your legal duty to act reasonably and responsibly to protect assets and information. Identify which cybersecurity laws have the potential to impact your cybersecurity program. Upgrade cybersecurity policies to comply with state, federal, and regulatory statutes. Communicate effectively about cybersecurity law with corporate legal department and counsel. Understand the implications of emerging legislation for your cybersecurity program. Know how to avoid losing a cybersecurity court case on procedure – and develop strategies to handle a dispute out of court. Develop an international view of cybersecurity and data privacy – and international legal frameworks. Schreider takes you beyond security standards and regulatory controls to ensure that your current or future cybersecurity program complies with all laws and legal jurisdictions. Hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies. This book needs to be required reading before your next discussion with your corporate legal department. This new edition responds to the rapid changes in the cybersecurity industry, threat landscape and providers. It addresses the increasing risk of zero-day attacks, growth of state-sponsored adversaries and consolidation of cybersecurity products and services in addition to the substantial updates of standards, source links and cybersecurity products.




A Research Agenda for Space Policy


Book Description

Space policy is now a top priority in international relations. This timely Research Agenda takes the definition of space policy itself as an object of analysis rather than as an unquestioned premise. It presents the multi-faceted spectrum of elements combined within space policy which are crucially relevant to security, welfare and modern society. Expert international contributors set out a forward-looking research agenda for the 2020s, identifying key problems and conflicts related to the topic and exploring policy, regulatory approaches and diplomatic mechanisms to reach possible solutions.




Legal Guide to Cybersecurity Research


Book Description

The Legal Guide to Cybersecurity Research contains tools to assist cybersecurity researchers, institutional review boards (IRBs), legal counsel, and others in understanding the legal and policy considerations associated with researchers obtaining and using network communications data in cybersecurity research and development (R&D). The book provides researchers tools that can help analyze legal and policy considerations, and understand possible legal protective measures. These measures may be utilized to better manage risks associated with the use of networks communications datasets in cybersecurity R&D.




A Research Agenda for Corporate Law


Book Description

Outlining significant dynamics that may pave the way for future evolution in the field of corporate law, this timely Research Agenda explores provocative and cutting-edge developments to identify new directions for scholarly inquiry. Bringing together a diverse group of scholars, the book evaluates doctrinal and normative issues in corporate law from a range of contextual and interdisciplinary viewpoints.




The Human Factor in Cybercrime and Cybersecurity


Book Description

With the digitization of society, crime has also digitized. Digitization has consequences for the entire spectrum of crime and raises all sorts of questions. For example, are we dealing with a new type of offender, or with the same old offenders who simply moved their activities online? How can potential victims be made resilient against attacks? And who should protect potential victims: the police, commercial cybersecurity companies, or internet service providers? To date, many of these questions remain unanswered. This is partly because current studies have a strong focus on technology or are exploratory in nature, suffer from methodological limitations and focus on just a few of the many types of cybercrime. The aim of this research agenda is to stimulate research on the human factor in cybercrime and cybersecurity. The agenda provides the state-of-the-art of research on the role of the human factor in this field. In addition, examples are given of important research questions and innovative methods and datasets that are needed for future studies.




Cybersecurity Law Fundamentals


Book Description




Cybersecurity and EU Law


Book Description

Cybersecurity is set to be one of the dominant themes in EU governance in the coming years, and EU law has begun to adapt to the challenges presented by security with the adoption of the Network and Information Security (NIS) Directive. This book explores the binding effects of the legal instruments and analyzes the impact of the constraining factors originating from NIS-related domestic policies across Finland, France, Greece, Ireland, Luxembourg, and Poland upon the transposition of the NIS Directive. Combining insights from law and political science, the book offers a comparative empirical analysis of national policies and regulations regarding network and information security, as well as the national legal framework deriving from the NIS Directive’s transposition. The book argues that the more the Directives offer a regulatory leeway to EU Member States for the transposition of their content, the more the preservation of national interests by EU Member States affects the uniform application of directives across the EU. Highlighting the need to go beyond the study of the legal compliance of European directives, the volume offers a new perspective on the interests of Member States and European law, bridging the gap between the politics and law of European integration. It will be of interest to students, academics, and practitioners with an interest in EU Law and cybersecurity.