7,838
Views
22
CrossRef citations to date
0
Altmetric
Articles

Regulating security on the Internet: control versus trust

&

References

  • Appazov, Artur. 2014. Legal Aspects of Cybersecurity. Copenhagen: Justitsministeriet. 70 p.
  • Asselt, van Marjolein. 2000. Perspectives on Uncertainty and Risk. Dordrecht: Kluwer.
  • Aupers, Stef. 2002. “The Revenge of the Machines: On Modernity, Digital Technology and Animism.” Asian Journal of Social Science 30 (2): 199–220. doi: 10.1163/156853102320405816
  • Baier, Annette. 1986. “Trust and Antitrust.” Ethics 96 (2): 231–260. doi: 10.1086/292745
  • Benoliel, Daniel. 2004. “Technological Standards, Inc.: Rethinking Cyberspace Regulatory Epistemology.” California Law Review 92: 1069–1117. doi: 10.2307/3481318
  • Botsman, Rachel. 2012. The Currency of the New Economy is Trust. Ted Talk, 09-24-2012.
  • Botsman, Rachel, and Roo Rogers. 2010. What’s Mine is Yours: The Rise of Collaborative Consumption. New York, NY: Harper Business.
  • Broeders, D.W.J. 2015. The Public Core of the Internet. An international Agenda for Internet Governance. Amsterdam: Amsterdam University Press.
  • Brownsword, Roger, and Karen Yeung. 2008a. Regulating Technologies: Legal Futures, Regulatory Frames and Technological Fixes. Portland, OR: Hart.
  • Brownsword, Roger, and Karen Yeung. 2008b. “Regulating Technologies: Tools, Targets and Thematics.” In Regulating Technologies: Legal Futures, Regulatory Frames and Technological Fixes, edited by Roger Brownsword, and Karin Yeung, 3–23. Oxford: Hart.
  • Chandler, Jennifer. 2009. “Privacy Versus National Security: Clarifying the Trade-Off.” In Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, edited by Ian R. Kerr, C. Lucock, and V. Steeves, 121–138. Oxford: Oxford University Press.
  • Chesky, B. 2011. “On Safety: A Word From Airbnb.” Techcrunch. Accessed 12 December 2015. http://techcrunch.com/2011/07/27/on-safety-a-word-from-airbnb/.
  • Coeckelbergh, Mark. 2012. “Can we Trust Robots?” Ethics and Information Technology 14: 53–60. doi: 10.1007/s10676-011-9279-1
  • Gannes, Liz. 2013. “After Home-In Trashing Incident, Airbnb Builds an In-House Enforcer Team.” AllThingsD Accessed 24 July 2015. http://allthingsd.com/20130716/after-home-trashing-incident-airbnb-builds-an-in-house-enforcer-team/.
  • Garland, David. 2001. The Culture of Control. Crime and Social Order in Contemporary Society. Chicago, IL: The University of Chicago Press.
  • Giddens, Anthony. 1990. The Consequences of Modernity. Cambridge: Polity Press in association with Basil Blackwell, Oxford, UK.
  • Giddens, Anthony. 1991. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford, CA: Stanford University Press.
  • Giddens, Anthony, and Christopher Pierson. 1998. Conversations with Anthony Giddens: Making Sense of Modernity. Stanford, CA: Stanford University Press.
  • Good, David. 1988. “Individuals, Interpersonal Relations, and Trust.” In Trust: Making and Breaking Cooperative Relations, edited by D. Gambetta, 31–48. Oxford: Basil Blackwell.
  • Hansen, Lene, and Helen Nissenbaum. 2009. “Digital Disaster, Cyber Security, and the Copenhagen School.” International Security Studies Quarterly 53 (4): 1155–1175. doi: 10.1111/j.1468-2478.2009.00572.x
  • Hardin, Russell. 2001. “Conceptions and Explanations of Trust.” In Trust in Society, edited by K.S. Cook, 3–39. New York, NY: Russel Sage Foundation.
  • Hardin, Russell. 2006. Trust. Cambridge: Polity Press.
  • Henshel, D., M.G. Cains, B. Hoffman, and T. Kelley. 2015. “Trust as a Human Factor in Holistic Cyber Security Risk Assessment.” Procedia Manufacturing 3: 1117–1124. doi: 10.1016/j.promfg.2015.07.186
  • Heuvel, Elly Van Den, and Gerben Klein Baltink. 2014. “Coordination and Cooperation in Cyber Network Defense: the Dutch Efforts to Prevent and Respond.” In Best Practices in Computer Network Defense: Incident Detection and Response. NATO Science for Peace and Security Series D: Information and Communication Security, edited by M. Hathaway, 118–130. Amsterdam: IOS Press.
  • Hildebrandt, Mireille. 2009. “Technology and the End of Law.” In Facing the Limits of the Law, edited by Erik Claes, Wouter Devroe, and Bert Keirsbilck, 443–465. Heidelberg: Springer.
  • Hildebrandt, Mireille. 2011. “Legal Protection by Design: Objections and Refutations.” Legisprudence 5 (2): 223–249. doi: 10.5235/175214611797885693
  • van den Hoven, Jeroen. 1998. “Moral Responsibilty, Public Office and Information Technology.” In Public Administration in an Information Age, edited by I. Snellen, and W. van de Donk, 97–112. Amsterdam: IOS Press.
  • Jalava, Janne. 2003. “From Norms to Trust: The Luhmannian Connections Between Trust and System.” European Journal of Social Theory 6 (2): 173–190. doi: 10.1177/1368431003006002002
  • Kerr, Ian R., ed. 2010. “Digital Locks and the Automation of Virtue.” In From ‘Radical Extremism’ to ‘Balanced Copyright’: Canadian Copyright and the Digital Agenda, edited by Michael Geist, 247–303. Toronto: Irwin Law. https://ssrn.com/abstract=2115655
  • Kesan, Jay P., and Rajiv C. Shah. 2006. “Setting Software Defaults: Perspectives from Law, Computer Science and Behavioral Economics.” Notre Dame Law Review 82 (2): 583–634.
  • Keymolen, Esther. 2016. Trust on the Line. A Philosophical Exploration of Trust in the Networked Era. Den Hague: Wolf Legal Publishers.
  • Keymolen, Esther, and Dennis Broeders. 2013. “Innocence Lost: Care and Control in Dutch Digital Youth Care.” British Journal of Social Work 43 (1): 41–63. doi: 10.1093/bjsw/bcr169
  • Keymolen, Esther, J.E.J. Prins Corien, and Charles Raab. 2012. “Trust and ICT: New Challenges for Public Administration.” In The Coming of Age of ICT in Public Administration, edited by Wim van de Donk, and Mark Thaens, 21–35. Amsterdam: IOS Press.
  • Knight, Frank H. 1921. Risk, Uncertainty and Profit. Boston, MA: Houghton Mifflin Company.
  • de Laat, Paul. 2005. “Trusting Virtual Trust.” Ethics and Information Technology 7: 167–180. doi: 10.1007/s10676-006-0002-6
  • Lahav, G., and V. Guiraudon. 2000. “Comparative Perspectives on Border Control: Away From the Border and Outside the State.” In The Wall Around the West. State Borders and Immigration Controls in North America and Europe, edited by Andreas, P., and T. Snyder, 55–77. Lanham: Rowman and Littlefield publishers.
  • Lahno, Bernd, and Uwe Matzat. 2004. “From the Editors. Trust and Community on the Internet. Opportunities and Restrictions for Online Cooperation.” Analyse & Kritik. Zeitschrift für Sozialtheorie 26 (1): 1–6.
  • Latham, Robert. 2003. Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security. New York, NY: The New Press.
  • Leenes, Ronald. 2011. “Framing Techno-Regulation: An Exploration of State and Non-State Regulation by Technology.” Legisprudence 5 (2): 143–169. doi: 10.5235/175214611797885675
  • Lessig, Lawrence. 1999. “The Law of the Horse: What Cyberlaw Might Teach.” Harvard Law Review 113 (501): 501–549. doi: 10.2307/1342331
  • Lessig, Lawrence. 2006. Code: Version 2.0. 2nd ed. New York, NY: Basic Books.
  • Luhmann, Niklas. 1979. Trust and Power. Two Works by Niklas Luhmann. Translated by Howard Davis. New York, NY: John Wiley & Sons.
  • Luhmann, Niklas. 1988. “Familiarity, Confidence, Trust: Problems and Alternatives.” In Trust: Making and Breaking Cooperative Relations, edited by D. Gambetta, 94–107. Oxford: Blackwell Publishers.
  • McKnight, D. H., and N. L. Chervany. 2002. “What Trust Means in e-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology.” International Journal of Electronic Commerce 6: 35–60.
  • McKnight, D. H., V. Choudhury, and C. Kacmar. 2002. “Developing and Validating Trust Measures for e-Commerce: An Integrative Typology.” Information Systems Research 13 (3): 334–359. doi: 10.1287/isre.13.3.334.81
  • McLeod, C. 2014. “Trust.” In Stanford Encyclopedia of Philosophy, edited by Edward N. Zalta. https://plato.stanford.edu
  • Möllering, G. 2006. Trust: Reason, Routine, Reflexivity. Amsterdam: Elsevier.
  • Nissenbaum, Helen. 2001. “Securing Trust Online: Wisdom or Oxymoron?” Boston University Law Review 81: 101–131.
  • Nissenbaum, Helen. 2004. “Will Security Enhance Trust Online, or Supplant It?” In Trust and Distrust in Organizations: Dilemmas and Approaches, edited by Roderick M. Kramer, and Karen S. Cook, 155–188. New York, NY: Russell Sage Foundation.
  • Nissenbaum, Helen. 2005. “Where Computer Security Meets National Security.” Ethics and Information Technology 7 (2): 61–73. Kluwer Academic Publishers. doi: 10.1007/s10676-005-4582-3
  • Nooteboom, Bart. 2013. “Trust and Innovation.” In Handbook of Advances in Trust Research, edited by R. Bachmann, and A. Zaheer, 106–125. Northampton, MA: Edward Elgar.
  • Pettit, Philip. 2004. “Trust, Reliance and the Internet.” Analyse & Kritik 26: 108–121. doi: 10.1515/auk-2004-0106
  • Renn, Ortwin, Andreas Klinke, and Marjolein van Asselt. 2011. “Coping with Complexity, Uncertainty and Ambiguity in Risk Governance: A Synthesis.” AMBIO: A Journal of the Human Environment 40 (2): 231–246. doi:10.1007/s13280-010-0134-0
  • Schneier, Bruce. 2004. Secrets & Lies: Digital Security in a Networked World. 2nd ed. Indianapolis, IN: Wiley Publishers.
  • Seppanen, Risto, Kirsimarja Blomqvist, and Sanna Sundqvist. 2007. “Measuring Inter-Organisational Trust: A Critical Review of the Emperical Research in 1990-2003.” Industrial Marketing Management 36 (2): 453–486. doi: 10.1016/j.indmarman.2005.09.003
  • Simon, Judith. 2013. “Trust.” In Oxford Bibliographies in Philosophy, edited by D. Pritchard. New York, NY: Oxford University Press. http://www.itas.kit.edu/pub/v/2013/simo13a.pdf
  • Simpson, Thomas W. 2011. “e-Trust and Reputation.” Ethics and Information Technology 13 (1): 29–38. doi: 10.1007/s10676-010-9259-x
  • Singer, Peter W., and Allan Friedman. 2013. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford, NY: Oxford University Press.
  • Taddeo, Mariarosaria. 2010. “Trust in Technology: A Distinctive and a Problematic Relation.” Knowledge, Technology & Policy 23 (3): 283–286. doi: 10.1007/s12130-010-9113-9
  • Taddeo, Mariarosaria. 2011. “The Role of e-Trust in Distributed Artificial Systems.” In Trust and Virtual Worlds, edited by Charles Ess, and May Thorseth, 75–88. New York, NY: Peter Lang.
  • Taddeo, Mariarosaria, and Luciano Floridi. 2011. “The Case for e-Trust.” Ethics and Information Technology 13 (1): 1–3. doi: 10.1007/s10676-010-9263-1
  • Tamanaha, Brian Z. 2007. “A Concise Guide to the Rule of Law”. Florence Workshop on the Rule of Law, edited by Neil Walker and Gianluigi Palombella, Hart Publishing Company, 2007; St. John’s Legal Studies Research Paper No. 07-0082. Available at SSRN: http://ssrn.com/abstract=1012051.
  • Tanz, Jason. 2014. “How Airbnb and Lyft finally got Americans to trust each other.” Wired Accessed 26 April. http://www.wired.com/2014/04/trust-in-the-share-economy/
  • Torpey, John. 2000. The Invention of the Passport: Surveillance, Citizenship, and the State. Cambridge: Cambridge University Press.
  • Van den Berg, Bibi. 2014. “Colouring Inside the Lines: Using Technology to Regulate Children’s Behaviour Online.” In Minding Minors Wandering the Web: Regulating Online Child Safety, edited by Simone Van der Hof, Bibi Van den Berg, and Bart Schermer, 67–90. The Hague: TCM Asser Press.
  • Van den Berg, Bibi, and Ronald Leenes. 2013. “Abort, Retry, Fail: Scoping Techno-Regulation and Other Techno-Effects.” In Human Law and Computer Law: Comparative Perspectives, edited by Mireille Hildebrandt, and Jeanne Gaakeer, 67–89. Dordrecht: Springer.
  • Van den Berg, Jan, Jacqueline Van Zoggel, Mireille Snels, Mark Van Leeuwen, Sergei Boeke, Leo Van Koppen, Jan Van der Lubbe, Bibi Van den Berg, and Tony De Bos. 2014. ‘On (the Emergence of) Cyber Security Science and Its Challenges for Cyber Security Education’. NATO STO/IST-122 Symposium in Tallin, 1–10.
  • Warkentin, Merrill, David Gefen, Paul A. Pavlou, and Gregory M. Rose. 2002. “Encouraging Citizen Adoption of e-Government by Building Trust.” Electronic Markets 12 (3): 157–162. doi: 10.1080/101967802320245929
  • Wu, Tim. 2003. “When Code Isn’t Law.” Virginia Law Review 89 (4): 679–751. doi: 10.2307/3202374
  • Yeung, Karen. 2008. “Towards an Understanding of Design-Based Instruments.” In Regulating Technologies: Legal Futures, Regulatory Frames and Technological Fixes, edited by Roger Brownsword, and Karin Yeung, 79–109. Oxford: Hart.
  • Yeung, Karen. 2011. “Can We Employ Design-Based Regulation While Avoiding Brave New World?” Law, Innovation and Technology 3 (1): 1–29. doi: 10.5235/175799611796399812
  • Zedner, Lucia. 2003. “Too Much Security?” International Journal of the Sociology of Law 31 (3): 155–184. doi:10.1016/j.ijsl.2003.09.002