Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-fv566 Total loading time: 0 Render date: 2024-07-22T16:28:38.750Z Has data issue: false hasContentIssue false

14 - Regulatory effectiveness IV: third-party interference and disruptive externalities

from Part IV - Regulatory effectiveness

Published online by Cambridge University Press:  05 August 2012

Roger Brownsword
Affiliation:
King's College London
Morag Goodwin
Affiliation:
Universiteit van Tilburg, The Netherlands
Get access

Summary

Introduction

Where regulators proceed in an informed and competent way, and where regulatees are disposed to comply, is there any reason to suppose that a regulatory intervention might not be effective? Certainly, other things being equal, we should expect such an intervention to be relatively effective. However, the world does not stand still; things are rarely equal; and the best-laid regulatory plans can be frustrated by third-party interference and by various kinds of crises and catastrophes.

Some kinds of third-party interference are well known – for example, regulatory arbitrage (which is a feature of company law and tax law) is nothing new. Sadly, much the same can be said about natural disasters. Although externalities of this kind continue to play their part in determining the fate of a regulatory intervention, it is the emergence of the internet that has most dramatically highlighted the possibility of interference from third parties. For this reason, in this chapter, we will focus quite extensively on the implications of cyberspace and online technologies for the challenge of regulatory effectiveness.

We will start (in section 2) by identifying the kinds of externalities that can interfere with the success of a regulatory intervention, at er which (in section 3) we will summarise David Johnson and David Post’s famous early assessment of the prospects for regulating activities in cyberspace.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2012

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Johnson, David R.Post, DavidLaw and Borders: The Rise of Law in CyberspaceStanford Law Review 48 1996 1367CrossRefGoogle Scholar
2009
Brenner, Susan W.Cyberthreats: The Emerging Fault Lines of the Nation StateNew YorkOxford University Press 2009CrossRefGoogle Scholar
Meulen, Nicole van derFertile GroundsNijmegenWolf Legal Publishers 2010Google Scholar
Rodotà, StefanoReinventing Data Protection?DordrechtSpringer 2009Google Scholar
Lyon, DavidIdentifying CitizensCambridgePolity 2009Google Scholar
2008
Bobbitt, PhilipTerror and ConsentLondonAllen Lane 2008Google Scholar
Hörnle, JuliaZammit, BrigitteCross-Border Online Gambling Law and PolicyCheltenhamEdward Elgar 2010CrossRefGoogle Scholar
Post, David G.In Search of Jefferson’s MooseOxfordOxford University Press 2009Google Scholar
Reidenberg, Joel R.Technology and Internet JurisdictionUniversity of Pennsylvania Law Review 153 2005 1951CrossRefGoogle Scholar
Wall, David S.CybercrimeCambridgePolity 2007Google Scholar
Bradshaw, Karen M.Saha, SouvikThe Offensive InternetCambridge, MAHarvard University Press 2010Google Scholar
Gercke, MarcoEurope’s Legal Approaches to CybercrimeERA Forum 10 2009 409CrossRefGoogle Scholar
Murray, AndrewInformation Technology LawOxfordOxford University Press 2010Google Scholar
Deibert, Ronald J.Villeneuve, NartHuman Rights in the Digital AgeLondonCavendish Glasshouse 2005Google Scholar
Goldsmith, JackWu, TimWho Controls the Internet?OxfordOxford University Press 2006Google Scholar
Lessig, LawrenceCode Version 2.0New YorkBasic Books 2006Google Scholar
Reidenberg, Joel R.Technology and Internet JurisdictionUniversity of Pennsylvania Law Review 153 2005 1951CrossRefGoogle Scholar
2010
2010
www.bettingmarket.com/eurolaw222428.htm 2007
Hörnle, JuliaZammit, BrigitteCross-Border Online Gambling Law and PolicyCheltenhamEdward Elgar 2010CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×