A Critical Investigation into the Market Structure of the Security Field

نویسندگان

  • Carla Ilten
  • Daniel Guagnin
  • Leon Hempel
چکیده

This chapter aims to provide a critical contribution to the ongoing discourse on selfregulation with regard to privacy and data protection (cf. e.g. European Commission 2010). This discourse encompasses the amendment of the EU Data Protection Directive and the related discussion about a principle of accountability (cf. Article 29 Working Party 2010). Underlying these conceptualisations is the assumption that data protection law is generally observed, but could be simplified and even reduced in favour of more self-regulatory approaches which are deemed more efficient. We would like to raise critical questions about the institutional conditions and frameworks that greatly influence data controllers’ potential and motivation for enacting privacy awareness and self-regulation; in other words, the market structures that these organisations operate within. An investigation into organisations’practices is indispensable in order to evaluate these current claims for self-regulation and to lay out the conditions that need to be met if market forces are to be harnessed for privacy and data protection. The results and conclusions presented were gained in the course of the EU FP7 project “Privacy Awareness through Security Organisation Branding” (PATS). The project inquires into the possibilities of organisational self-regulation in the field of security technology and services by means of branding—understood as a complex, two-sided communication process between companies and stakeholders.1 Specifically, research from the first three work packages is used. We started out with an analysis of current security regimes and actors, then interviewed representatives of

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Exploitation of Translation in Talking Customers into Purchasing Products: A Critical Investigation of English-Persian Advertising Brochures for Household Appliances

The present study sets out to conduct a critical investigation into what linguistic strategies are exploited during the translation of English advertising brochures for household appliances into Persian to manipu- late customers to purchase the respective products. In the pursuit of this goal, it seeks to explore the val- ues that have been added to the Persian version of the translated b...

متن کامل

Energy Scheduling in Power Market under Stochastic Dependence Structure

Since the emergence of power market, the target of power generating utilities has mainly switched from cost minimization to revenue maximization. They dispatch their power energy generation units in the uncertain environment of power market. As a result, multi-stage stochastic programming has been applied widely by many power generating agents as a suitable tool for dealing with self-scheduling...

متن کامل

A Security Effective Structure for National Defense in the 21st Century

In accordance with human necessities and deep attention into security, research studies have today became an irrefutable necessity in this area. It is noted that traditional concepts of this important issue have changed, as a result of occurring various events in the past, particularly in the 20th century; so that security is no more limited to protecting human beings against individual and col...

متن کامل

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

STLR: a novel danger theory based structural TLR algorithm

Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012