Dialogue, partnership and empowerment for network and information security

Helena Carrapiço, Benjamin Farrand

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)
8 Downloads (Pure)

Abstract

The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.
Original languageEnglish
Pages (from-to)245–263
Number of pages19
JournalCrime Law and Social Change
Volume67
Early online date11 Oct 2016
DOIs
Publication statusPublished - Apr 2017
Externally publishedYes

Fingerprint

Dive into the research topics of 'Dialogue, partnership and empowerment for network and information security'. Together they form a unique fingerprint.

Cite this