This chapter analyses theoretical and practical implications of different forms of self-and co-regulation in the field of cybersecurity. In the past decade, the approaches to cybersecurity and critical information infrastructure protection have been based on the notion of the necessity for public-private collaboration, multifaceted strategies and recognition of the significant role that industry plays in securing the information networks. However, with the raise of cybersecurity on the top of the policy agenda, many governments and academics are concerned with the possible failure of the private sector in delivering acceptable level of security in the information networks without governmental intervention. This shift of the concept has lead to the proposals to legislate cybersecurity in the form of mandatory reporting of security incidents and obligations to share information, security standards and compliance procedures. One of such proposals is currently being discussed as EU NIS directive. These developments raise many concerns about shifting the balance in cybersecurity from bottom-up voluntary approaches and collaboration to a heavier regulation. This chapter argues that this turn can have negative consequences and that the best way to provide cybersecurity is the evolvement of the existing channels for collaboration and building trust between industry and governments.
Each of the antitrust constants explored above would benefit from further inquiry and study in order to be able to ensure that any antitrust review of these vital areas of world commerce are at least considered with some more scientific and factual understanding rather than in a void. These and many other issues are worthy of study and greater understanding before the Obama Administration launches into what Obama's pre-election rhetoric and the most recent antitrust review of intellectual property has suggested will be yet another traditional treatment of the competitive landscape of today's world of innovation and communication.The GCA is made up of seven key goals, 6 6 www.itu.int/osg/csd/cybersecurity/gca/pillars-goals/index.html. and built upon five strategic pillars, 7 7 The five pillars are:
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.