303
Views
7
CrossRef citations to date
0
Altmetric
RECENT DEVELOPMENTS

Tough on data misuse, tough on the causes of data misuse: A review of New Labour's approach to information security and regulating the misuse of digital information (1997–2010)

Pages 299-308 | Published online: 29 Oct 2010
 

Abstract

New Labour was a description of a particular approach to government of the British Labour Party, which was in power in the United Kingdom between 1997 and 2010. While this government initially envisaged an end to the social causes of misdemeanours, its actions led to a greater number of laws on the statute books creating thousands of statutory offences. A small number of these had direct effects on the number of computer related offences that were able to be prosecuted. This paper reviews these laws, and the role of legal systems in responding to the increasing number of misdemeanours that are occurring in computer environments for which New Labour's approach of creating more statutory offences has not addressed.

Notes

S. Charman and S.P. Savage, ‘The New Politics of Law and Order: Labour, Crime and Justice’, in New Labour, New Welfare State? The ‘Third Way’ in British Social Policy, ed. M. Powell (London: Polity Press, 1999), 191.

D. Morris, Power Plays (London: Harper Collins, 2002).

A. Calcutt, White Noise: An A–Z of the Contradictions in Cyberculture (Basingstoke, UK: Palgrave MacMillan, 1999).

S. Waiton, ‘Policing After the Crisis: Crime, Safety and the Vulnerable Public’, Punishment & Society 11, no. 3 (2009): 359.

Ibid.

N. Lacey, C. Wells and O. Quick, Reconstructing Criminal Law: Text and Materials (Cambridge: Cambridge University Press, 2003), 219.

G. Wilkinson, ‘Commercial Breaks: An Overview of Corporate Opportunities for Commercializing Education in US and English Schools’, London Review of Education 4, no. 3 (2006): 253–69.

K. Gillan and J. Pickerill, ‘Transnational Anti-War Activism: Solidarity, Diversity and the Internet in Australia, Britain and the United States after 9/11’, Australian Journal of Political Science 43, no. 1 (2008): 59–78.

K. Robins, ‘Foreclosing on the City? The Bad Idea of Virtual Urbanism’, Technocities, (1999): 34–59.

N. Selwyn and J. Fitz, ‘The National Grid for Learning: A Case Study of New Labour Education Policy-Making’, Journal of Education Policy 16, no. 2 (2001): 127–47.

H. Margetts, ‘Computerising the Tools of Government’, in Public Administration in an Information Age: A Handbook, ed. I.T.M. Snellen and W.B.H.J. van de Donk (New York: IOS Press, 1998).

J.A. Cannataci and J.P.M. Bonnici, ‘The UK 2007–2008 Data Protection Fiasco: Moving on from Bad Policy and Bad Law?’, International Review of Law, Computers & Technology 23, no. 1 (2009): 47–76.

E.R. Munro, L. Holmes and H. Ward, ‘Researching Vulnerable Groups: Ethical Issues and the Effective Conduct of Research in Local Authorities’, British Journal of Social Work 35, no. 7 (2005): 1023.

C.E. Gilkes, M. Casimiro, A.W. McEvoy, R. MacFarlane and N.D. Kitchen, ‘Clinical Databases and Data Protection: Are they Compatible?’, British Journal of Neurosurgery 17, no. 5 (2003): 426–31.

H. Tranberg and J. Rashbass, Medical Records Use and Abuse (Oxford: Radcliffe Publishing, 2004).

A. Clarka, J. Prosserb and R. Wilesc, ‘Ethical Issues in Image-Based Research’, Arts & Health 2, no. 1 (2010), 81–93.

S.A. Mathieson, ‘UK Crypto Regulation Option Dies’, Network Security, no. 6 (2005): 2.

L. Reid and M.C. Bromby, ‘Beyond Chip and PIN’, Journal of the Law Society of Scotland 53, no. 7 (2008): 50–1.

B. Jayeju-Akinsiku, ‘Technology and Electronic Communications Act 2000’, Computers & Security 21, no. 7 (2002): 624–8.

J. Moran, ‘Generating More Heat than Light? Debates on Civil Liberties in the UK’, Policing 1, no. 1 (2007): 80.

T. Fitzpatrick, ‘Critical Theory, Information Society and Surveillance Technologies’, Information, Communication & Society 5, no. 3 (2002): 357–78.

W.M. Grossman, ‘The Charmed Life of Cybercrime’, Infosecurity 7, no. 1 (2010): 19–21.

S. Heron, ‘Online Privacy and Browser Security’, Network Security, no. 6 (2009): 4–7.

S. Loo and N. Lucas, ‘An Evaluation of the “New Deal” in Further Education Colleges in England’, Journal of Education and Work 17, no. 3 (2004): 301–13.

R. Masterman and I. Leigh, Making Rights Real: The Human Rights Act in its First Decade (Oxford: Hart Publishing, 2008).

M. Taylor, J. Haggerty and D. Gresty, ‘The Legal Aspects of Corporate Computer Usage Policies’, Computer Law & Security Review 26, no. 1 (2010): 72–6.

W.L. Chinese, ‘Pressure to Publish Leads to Bias’, Scholarly Communications Report 14, no. 4 (2010): 7–8.

L.A. Suchman, Plans and Situated Actions: The Problem of Human–Machine Communication (Cambridge: Cambridge University Press, 1987).

G. Mantovani, New Communication Environments: From Everyday to Virtual (London: Taylor & Francis, 1996).

Ibid.

Suchman, Plans and Situated Actions.

J. Bishop, ‘Increasing Participation in Online Communities: A Framework for Human–Computer Interaction’, Computers in Human Behavior 23, no. 4 (2007): 1881–93.

R. Robertson, ‘The Increasing Monopolization of Identity by the State: The Case of the UK and the US’, Nationalism and Ethnic Politics 12, no. 3 (2006): 373–87.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 878.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.