Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Regulation in Cyberspace

View through CrossRef
Regulation in cyberspace is an emerging challenge. It is a complex and dynamic domain that is largely driven by the business-civilian sector and has the potential to cause significant damage to national security. This essay surveys the unique characteristics of cyberspace and the various strategies adopted in other countries in order to manage cyber risk. It proposes a multilayered regulatory model together with concrete recommendations for the regulation of the business-civilian sector in cyberspace. The resilience of the private sector in cyberspace is directly related to national security. The private sector usually constitutes the weak point where a cyber-attack develops. Nonetheless, the survey of regulation in cyberspace in Western countries, including Israel, points to the lack of an appropriate response to this weakness. This essay attempts to fill that gap and, in order to do so, it makes use of the regulatory principles used by other countries— the United States, Britain, France, Germany, and the European Union—and also learns from other regulated domains, namely environmental protection and nuclear energy. National approaches, the variety of regulatory tools, and the systems of incentives used in the attempts to regulate cyberspace worldwide, together with models for collaboration between the public and private sectors and state compensation mechanisms that were observed in environmental protection and nuclear energy domains, have contributed to the development of an innovative regulatory model for cyberspace in the business-civilian sector in Israel.
Center for Open Science
Title: Regulation in Cyberspace
Description:
Regulation in cyberspace is an emerging challenge.
It is a complex and dynamic domain that is largely driven by the business-civilian sector and has the potential to cause significant damage to national security.
This essay surveys the unique characteristics of cyberspace and the various strategies adopted in other countries in order to manage cyber risk.
It proposes a multilayered regulatory model together with concrete recommendations for the regulation of the business-civilian sector in cyberspace.
The resilience of the private sector in cyberspace is directly related to national security.
The private sector usually constitutes the weak point where a cyber-attack develops.
Nonetheless, the survey of regulation in cyberspace in Western countries, including Israel, points to the lack of an appropriate response to this weakness.
This essay attempts to fill that gap and, in order to do so, it makes use of the regulatory principles used by other countries— the United States, Britain, France, Germany, and the European Union—and also learns from other regulated domains, namely environmental protection and nuclear energy.
National approaches, the variety of regulatory tools, and the systems of incentives used in the attempts to regulate cyberspace worldwide, together with models for collaboration between the public and private sectors and state compensation mechanisms that were observed in environmental protection and nuclear energy domains, have contributed to the development of an innovative regulatory model for cyberspace in the business-civilian sector in Israel.

Related Results

EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS
EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS
The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cybe...
Exploring Chinese cyber discourse: integrating political and legal perspectives
Exploring Chinese cyber discourse: integrating political and legal perspectives
Abstract Cyberspace, with the rapidly growing network of users and communication technologies, provides venues for myriad social and political interactions. The very...
The Utopian Code: Cyberspace as a Democratization of Technology
The Utopian Code: Cyberspace as a Democratization of Technology
[Introduction] William Gibson’s 1984 novel, Neuromancer, declared cyberpunk as a fully realized science fiction subgenre that reverberates into the current time. The text follows a...
The Utopian Code: Cyberspace as a Democratization of Technology
The Utopian Code: Cyberspace as a Democratization of Technology
[Introduction] William Gibson’s 1984 novel, Neuromancer, declared cyberpunk as a fully realized science fiction subgenre that reverberates into the current time. The text follows a...
Responsibilities to Protect Children in Cyberspace: Analysis of Legal Regulations in Vietnam
Responsibilities to Protect Children in Cyberspace: Analysis of Legal Regulations in Vietnam
In the digital era, all activities related to learning, playing, entertaining, and connecting with friends... can take place in cyberspace. It is impossible to deny the positive va...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
A wailing wall in cyberspace: Loneliness, censorship, and collective memory – in memory of Dr. Li Wenliang, the whistle blower
A wailing wall in cyberspace: Loneliness, censorship, and collective memory – in memory of Dr. Li Wenliang, the whistle blower
As the whistle blower of the outbreak of Covid-19 in Wuhan, Dr. Li Wenliang was dismissed as the spreader of rumors and punished by the authorities. His later death from the corona...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...

Back to Top