**Author details**

Valentina Petrovna Talimonchik Saint Petersburg State University, Russia

\*Address all correspondence to: talim2008@yandex.ru

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**17**

*Legal Aspects of International Information Security DOI: http://dx.doi.org/10.5772/intechopen.86119*

> [13] Volonino L, Robinson SR. Principles and Practice of Information Security. Upper Suddle River: Pearson Education

[14] Lloyd IJ. Information Technology Law. Oxford: Oxford University Press;

[15] Murray A. Information Technology Law: Law and Society. Oxford: Oxford

Schellekens M. Starting Points for ICT Regulation. The Hague: T.M.C. Asser

university press; 2010

Press; 2006

[16] Koops BJ, Lips M, Prins C,

[17] Hopkins S. The Cybercrime Convention Does Not Provide Substantive Lawmaking Guidance. 2018. Available from: http://www. netdialogue.org/discussion/?p=23

[Accessed: 12 March 2018]

2009. V. 17. N 3. P. 234-235

N 3. P. 183

[18] Berčič B, George C. Identifying personal data using relational database design principles. International Journal of Law and Information Technology

[19] Polcak R. Aims, methods and achievements in European data

protection. International Review of Law, Computers & Technology. 2009. V. 23.

[20] McCullagh K. Protecting "privacy" through control of "personal" data processing: A flawed approach.

International Review of Law, Computers

& Technology. 2009. V. 23. N 1-2

Inc; 2004

2008

[1] Bainbridge DI. Introduction to Information Technology Law. Edinburg: Pearson Education Limited; 2008

[2] Campbell D, Ban C, editors. Legal Issues in the Global Information Society. New York: Oceana Publications Inc;

Information Technology Law. Abingdon:

[3] Rowland D, Macdonald E.

Cavendish Publishing Ltd; 2005

[6] Bell R, Ray NEU. Electronic Communications Law. Richmond: Richmond Law and Tax Ltd; 2004

[7] Reed C. Internet Law: Text and Materials. Cambridge: Cambridge

[8] Reed C, Angel J, editors. Computer Law: Law and Regulation of Information Technology. Oxford: Oxford University

[9] Solove DJ. The Digital Person: Technology and Privacy in the

Information Age. New York: New York

[10] Nouwt S, Berend R. In: Prins V, editor. Reasonable Expectations of Privacy? The Hague: ITeR; 2005

[11] Egan M, Mather T. The Executive Guide to Information Security: Threats, Challenges and Solutions. Indianapolis:

[12] Hunter J. An Information Security Handbook. London: Springer Verlag

University Press; 2005

University Press; 2004

Addison-Wesley; 2005

London Limited; 2001

Press; 2007

Corporation; 2000

[4] Smedinghoff TJ, editor. Online Law. New York: Pearson Education

[5] Black SK. Telecommunications Law in the Internet Age. San Francisco: Morgan Kaufmann Publishers; 2002

**References**

2005

*Legal Aspects of International Information Security DOI: http://dx.doi.org/10.5772/intechopen.86119*
