![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Scientific experiments and medical improvements in recent years have augmented our bodies, made them manipulable; our personal data have been downloaded, stored, sold, analyzed; and the pandemic has given new meaning to the idea of 'virtual presence'. Such phenomena are often thought to belong to the era of the 'posthuman', an era that both promises and threatens to redefine the notion of the human: what does it mean to be human? Can technological advances impact the way we define ourselves as a species? What will the future of humankind look like? These questions have gained urgency in recent years, and continue to preoccupy cultural and legal practitioners alike. How can the law respond and adapt to a world shaped by technology and AI? How can it ensure that technological developments remain inclusive, while simultaneously enforcing ethical limits to its reach? The volume explores how fictional texts, whether on the page or on screen, negotiate the legal dilemmas posed by the increasing infiltration of technology into modern life.
This book assesses data protection rules that are applicable to the processing of personal data in a law enforcement context. It offers the first extensive analysis of the LED and Regulation (EU) 2018/1725. It illustrates the challenges arising from the unclear delineation between the different data protection instruments at both national and EU level. Taking a practical approach, it exemplifies situations where the application of data protection instruments could give rise to a lowering of data protection standards where the data protection rules applicable in the law enforcement context are interpreted broadly. The scope of data protection instruments applied by law enforcement authorities impacts processing for purposes of border control, migration management and asylum because there is an unclear delineation between the different data protection instruments.
This collection critically explores the use of financial technology (FinTech) and artificial intelligence (AI) in the financial sector and discusses effective regulation and the prevention of crime. Focusing on crypto-assets, InsureTech and the digitisation of financial dispute resolution, the book examines the strategic and ethical aspects of incorporating AI into the financial sector. The volume adopts a comparative legal approach to: critically evaluate the strategic and ethical benefits and challenges of AI in the financial sector; critically analyse the role, values and challenges of FinTech in society; make recommendations on protecting vulnerable customers without restricting financial innovation; and to make recommendations on effective regulation and prevention of crime in these areas. The book will be of interest to teachers and students of banking and financial regulation related modules, researchers in computer science, corporate governance, and business and economics. It will also be a valuable resource for policy makers including government departments, law enforcement agencies, financial regulatory agencies, people employed within the financial services sector, and professional services such as law, and technology.
How does the 'on-line' world relate to the 'off-line' world? Is it different, separate, or even unique compared to the off-line world, or just a part thereof? And when do we need to regulate it, and how? These have become important, but complex questions for legislators, policy-makers, regulators, and politicians who design regulatory frameworks to address fast-moving technologies that change society in intricate ways. Over the course of time, governments and international organizations have developed regulatory 'starting points', in order to consistently and effectively deal with ICT and Internet regulation. These offer policy one-liners such as 'what holds off-line, must hold on-line' and 'regulation should be technology-neutral'. This book questions these regulatory starting points in detail and systematically explores their application, meaning and value for international e-regulation. It digs deeper than existing literature in trying to find out in which cases the starting points merit attention, and how we should really use them. This volume is the product of close collaboration and debate between scholars working at the Tilburg Institute for Law, Technology, and Society (TILT), to which international colleagues have added valuable reactions and reflections. The contributions in this volume have been written by TILT researchers Simone van der Hof, Bert-Jaap Koops, Miriam Lips, Sjaak Nouwt, Corien Prins, Maurice Schellekens. and Kees Stuurman, and by guest authors Dan Burk (University of Minnesota), Herbert Burkert (University of St. Gallen), and Yves Poullet (Facultes universitaires Notre-Dame de la Paix, Namur). This is Volume 9 in the Information Technology and Law (IT&Law) Series
Is it possible to achieve cybersecurity while safeguarding the fundamental rights to privacy and data protection? Addressing this question is crucial for contemporary societies, where network and information technologies have taken centre stage in all areas of communal life. This timely book answers the question with a comprehensive approach that combines legal, policy and technological perspectives to capture the essence of the relationship between cybersecurity, privacy and data protection in EU law. The book explores the values, interconnections and tensions inherent to cybersecurity, privacy and data protection within the EU constitutional architecture and its digital agendas. The work's novel analysis looks at the interplay between digital policies, instruments including the GDPR, NIS Directive, cybercrime legislation, e-evidence and cyber-diplomacy measures, and technology as a regulatory object and implementing tool. This original approach, which factors in the connections between engineering principles and the layered configuration of fundamental rights, outlines all possible combinations of the relationship between cybersecurity, privacy and data protection in EU law, from clash to complete reconciliation. An essential read for scholars, legal practitioners and policymakers alike, the book demonstrates that reconciliation between cybersecurity, privacy and data protection relies on explicit and brave political choices that require an active engagement with technology, so as to preserve human flourishing, autonomy and democracy.
Understand your GDPR obligations and prioritise the steps you need to take to comply The GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection. The Regulation applies to all data controllers and processors that handle EU residents' personal information. It supersedes the 1995 EU Data Protection Directive and all EU member states' national laws that are based on it - including the UK's DPA (Data Protection Act) 1998. Failure to comply with the Regulation could result in fines of up to 20 million or 4% of annual global turnover - whichever is greater. This guide is a perfect companion for anyone managing a GDPR compliance project. It provides a detailed commentary on the Regulation, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. Clear and comprehensive guidance to simplify your GDPR compliance project Now in its fourth edition, EU General Data Protection Regulation (GDPR) - An implementation and compliance guide provides clear and comprehensive guidance on the GDPR. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand. Topics covered include: The DPO (data protection officer) role, including whether you need one and what they should do; Risk management and DPIAs (data protection impact assessments), including how, when and why to conduct one; Data subjects' rights, including consent and the withdrawal of consent, DSARs (data subject access requests) and how to handle them, and data controllers and processors' obligations; Managing personal data internationally, including updated guidance following the Schrems II ruling; How to adjust your data protection processes to comply with the GDPR, and the best way of demonstrating that compliance; and A full index of the Regulation to help you find the articles and stipulations relevant to your organisation. Supplemental material While most of the EU GDPR's requirements are broadly unchanged in the UK GDPR, the context is quite different and will have knock-on effects. You may need to update contracts regarding EU-UK data transfers, incorporate standard contractual clauses into existing agreements, and update your policies, processes and procedural documentation as a result of these changes. We have published a supplement that sets out specific extra or amended information for this pocket guide. Click here to download the supplement. About the authors The IT Governance Privacy Team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, their understanding of the background and drivers for the GDPR, and the input of expert consultants and trainers are combined in this must-have guide to GDPR compliance. Start your compliance journey now and buy this book today.
This book identifies the principles that should be applied when processing Big Data in the context of food safety risk assessments. Food safety is a critical goal in the protection of individuals' right to health and the flourishing of the food and feed market. Big Data is fostering new applications capable of enhancing the accuracy of food safety risk assessments. An extraordinary amount of information is analysed to detect the existence or predict the likelihood of future risks, also by means of machine learning algorithms. Big Data and novel analysis techniques are topics of growing interest for food safety agencies, including the European Food Safety Authority (EFSA). This wealth of information brings with it both opportunities and risks concerning the extraction of meaningful inferences from data. However, conflicting interests and tensions among the parties involved are hindering efforts to find shared methods for steering the processing of Big Data in a sound, transparent and trustworthy way. While consumers call for more transparency, food business operators tend to be reluctant to share informational assets. This has resulted in a considerable lack of trust in the EU food safety system. A recent legislative reform, supported by new legal cases, aims to restore confidence in the risk analysis system by reshaping the meaning of data ownership in this domain. While this regulatory approach is being established, breakthrough analytics techniques are encouraging thinking about the next steps in managing food safety data in the age of machine learning. The book focuses on two core topics - data ownership and data governance - by evaluating how the regulatory framework addresses the challenges raised by Big Data and its analysis in an applied, significant, and overlooked domain. To do so, it adopts an interdisciplinary approach that considers both the technological advances and the policy tools adopted in the European Union, while also assuming an ethical perspective when exploring potential solutions. The conclusion puts forward a proposal: an ethical blueprint for identifying the principles - Security, Accountability, Fairness, Explainability, Transparency and Privacy - to be observed when processing Big Data for food safety purposes, including by means of machine learning. Possible implementations are then discussed, also in connection with two recent legislative proposals, namely the Data Governance Act and the Artificial Intelligence Act.
This book provides an overview of the topics of data, sovereignty, and governance with respect to data and online activities through a legal lens and from a cybersecurity perspective. This first chapter explores the concepts of data, ownerships, and privacy with respect to digital media and content, before defining the intersection of sovereignty in law with application to data and digital media content. The authors delve into the issue of digital governance, as well as theories and systems of governance on a state level, national level, and corporate/organizational level. Chapter three jumps into the complex area of jurisdictional conflict of laws and the related issues regarding digital activities in international law, both public and private. Additionally, the book discusses the many technical complexities which underlay the evolution and creation of new law and governance strategies and structures. This includes socio-political, legal, and industrial technical complexities which can apply in these areas. The fifth chapter is a comparative examination of the legal strategies currently being explored by a variety of nations. The book concludes with a discussion about emerging topics which either influence, or are influenced by, data sovereignty and digital governance, such as indigenous data sovereignty, digital human rights and self-determination, artificial intelligence, and global digital social responsibility. Cumulatively, this book provides the full spectrum of information, from foundational principles underlining the described topics, through to the larger, more complex, evolving issues which we can foresee ahead of us.
Summary Explains in easy-to-understand terms what executives and senior managers need to know and do about the ever-changing cyber threat landscape. Gives strategic, business-focused guidance and advice relevant to C-suite executives. Provides an effective and efficient framework for managing cyber governance, risk and compliance. Explains what is required to implement an effective cyber security strategy. Description With high-profile cyber attacks, data breaches and fines for GDPR (General Data Protection Regulation) non-compliance hitting the headlines daily, businesses must protect themselves and their reputations, while reassuring stakeholders they take cyber security seriously. Cyber attacks are becoming more sophisticated and prevalent, and the cost of data breaches is soaring. In addition, new regulations and reporting requirements make cyber security a critical business issue. Board members and senior management must understand the threat landscape and the strategies they can employ to establish, implement and maintain effective cyber resilience throughout their organisation. How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. It explains what is meant by governance, risk and compliance, how it applies to cyber security and what is required to implement an effective cyber security strategy. The pocket guide: Gives readers a greater understanding of cyber governance, risk and compliance; Explains what executives, senior managers and their advisors need to know and do about the ever-changing cyber threat landscape; Provides context as to why stakeholders need to be aware of and in control of their organisation's cyber risk management and cyber incident response; Gives guidance on building an appropriate and efficient governance framework that enables organisations to demonstrate their cyber approach in a non-technical, strategic, business-focused way; Details an overview process to enable risk assessment, assess existing defence mitigations and provide a framework for developing suitable controls; and Includes a checklist to help readers focus on their higher-priority cyber areas. Suitable for all managers and executives, this pocket guide will be of interest to non-cyber specialists, including non-executive directors, who may be required to review cyber arrangements. For cyber specialists, it provides an approach for explaining cyber issues in non-jargonistic, business-based language. Kick-start your journey to becoming cyber secure - buy this pocket guide today!
AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.
This open access book focuses on the discrepancies in biobank research regulations that are among the most significant hurdles to effective research collaboration. The General Data Protection Regulation (GDPR) has established stringent requirements for the processing of health and genetic data, while simultaneously allowing considerable multi-level exceptions for the purposes of scientific research. In addition to directly applicable exceptions, the GDPR places the regulatory responsibility for further defining how the Member States strike a balance between the individuals' rights and the public interest in research within their national legal orders. Since Member States' approaches to the trade-off between data subjects' rights on the one hand, and appropriate safeguards on the other, differ according to their ethical and legal traditions, their data protection requirements for research also differ considerably. This study takes a comprehensive approach to determine how the GDPR affects regulatory regimes on the use of personal data in biobanking research, with a particular focus on the balance between individuals' rights, public interest and scientific research. In this regard, it has two main goals: first, to scrutinize the GDPR research regime, its objective and constitutive elements, the impact it has on biobanking, and its role in a changing EU landscape post-Brexit; and second, to examine how various exceptions have been operationalized nationally, and what challenges and opportunities this diversification entails. The book not only captures the complexity GDPR creates for biobanking, but also sheds light on various approaches to tackling the corresponding challenges. It offers the first comprehensive analysis of GDPR for biobanking, and the most up-to-date overview of the national biobank regulatory frameworks in Europe.
Vital to the effective functioning of voluntary organisations is the trust of people - the beneficiaries, clients, regulators, donors, volunteers and paid staff. Open, fair and well-managed data protection practice is not just desirable in helping to achieve that trust, but essential. Get it wrong and there is reputational damage and costs attached. Data Protection for voluntary organisations will enable you to set a shining example of best practice and also comply with UK data legislation and the General Data Protection Regulation (GDPR) in force since 2018. This book will help you: * Understand the key principles and elements of data protection * Recognise your main responsibilities as a data controller * Distinguish when you can and can't retain data * Appreciate what the rights of the data subject are Who is this book for? A must-read for anyone in the UK voluntary sector who wants to get beyond tick-box data management. Invaluable to data managers or those who handle personal information such as IT, personnel, marketing and fundraising departments. For professional advisers, and academics it will also offers a valuable summary drawing out key data protection points by examining and interpreting the primary legislation.
By adopting a multi-disciplinary approach, this book provides a comprehensive analysis of the legality of the use of autonomous weapons systems under international law. It examines different arguments presented by States, roboticists and scholars to demonstrate the challenges such systems will create for the laws of war. This study examines how technology of warfare seeks to increase the dissociation of risk and communication between weapons and their human operators. Furthermore, it explains how algorithms might give rise to 'errors' on the battlefield that cannot be directly attributed to human operators. Against this backdrop, Dr Seixas-Nunes examines three distinct legal frameworks: the distinction between the legality of weapons and the laws of targeting; different mechanisms of individual accountability and the importance of recovering the category of 'dolus eventualis' for programmers and technicians and, finally, State responsibility for violations of the laws of war caused by weapons' software errors.
The digital era shows an unprecedented worldwide flow of data within multinational companies and their external service providers. Binding Corporate Rules (BCRs) are designed to allow these companies to transfer personal data across borders in compliance with EU Data Protection Law. This is the first work to give an in-depth assessment of the BCR regime. It discusses the origins of the regime and the material requirements of BCR, as well as how they should be applied in practice and made binding on the companies and employees. It also covers how BCRs may provide for enforceable rights for the beneficiaries of the regime and how they should be brought in line with requirements of European rules on private international law. The work also analyses a number of significant academic debates in the areas of transnational private regulation and data protection. It reflects on the debates as to the legitimacy of transnational private regulation as a method of regulating corporate conduct and also focuses on the merits and shortcomings of BCR as a method for regulating global data transfers. This book is essential reading for those who need to understand more about the BCR regime, and require insight into how cross-border data transfers could be better protected in the future.
This book provides a comparison and practical guide of the data protection laws of Canada, China (Hong Kong, Macau, Taiwan), Laos, Philippines, South Korea, United States and Vietnam. The book builds on the first book Data Protection Law. A Comparative Analysis of Asia-Pacific and European Approaches, Robert Walters, Leon Trakman, Bruno Zeller. As the world comes to terms with Artificial Intelligence (AI), which now pervades the daily lives of everyone. For instance, our smart or Iphone, and smart home technology (robots, televisions, fridges and toys) access our personal data at an unprecedented level. Therefore, the security of that data is increasingly more vulnerable and can be compromised. This book examines the interface of cyber security, AI and data protection. It highlights and recommends that regulators and governments need to undertake wider research and law reform to ensure the most vulnerable in the community have their personal data protected adequately, while balancing the future benefits of the digital economy.
International legal scholars tend to think of their work as the interpretation of rules: the application of a law 'out there' to concrete situations. This book takes a different approach to that scholarship: it views doctrine as a socio-linguistic practice. In other words, this book views legal scholars not as law-appliers, but as constructing knowledge within a particular academic discipline. By means of three close-ups of the discourse on cyberwar and international law, this book shows how international legal knowledge is constructed in ways usually overlooked: by means of footnotes, for example, or conference presentations. In so doing, this book aims to present a new way of seeing international legal scholarship: one that pays attention to the mundane parts of international legal texts and provides a different understanding of how international law as we know it comes about.
This book examines the challenges posed to Australian copyright law by streaming, from the end-user perspective. It compares the Australian position with the European Union and United States to draw lessons from them, regarding how they have dealt with streaming and copyright. By critically examining the technological functionality of streaming and the failure of copyright enforcement against the masses, it argues for strengthening end-user rights. The rising popularity of streaming has resulted in a revolutionary change to how digital content, such as sound recordings, cinematographic films, and radio and television broadcasts, is used on the internet. Superseding the conventional method of downloading, using streaming to access digital content has challenged copyright law, because it is not clear whether end-user acts of streaming constitute copyright infringement. These prevailing grey areas between copyright and streaming often make end-users feel doubtful about accessing digital content through streaming. It is uncertain whether exercising the right of reproduction is appropriately suited for streaming, given the ambiguities of "embodiment" and scope of "substantial part". Conversely, the fair dealing defence in Australia cannot be used aptly to defend end-users' acts of streaming digital content, because end-users who use streaming to access digital content can rarely rely on the defence of fair dealing for the purposes of criticism or review, news reporting, parody or satire, or research or study. When considering a temporary copy exception, end-users are at risk of being held liable for infringement when using streaming to access a website that contains infringing digital content, even if they lack any knowledge about the content's infringing nature. Moreover, the grey areas in circumventing geo-blocking have made end-users hesitant to access websites through streaming because it is not clear whether technological protection measures apply to geo-blocking. End-users have a severe lack of knowledge about whether they can use circumvention methods, such as virtual private networks, to access streaming websites without being held liable for copyright infringement. Despite the intricacies between copyright and access to digital content, the recently implemented website-blocking laws have emboldened copyright owners while suppressing end-users' access to digital content. This is because the principles of proportionality and public interest have been given less attention when determining website-blocking injunctions.
This book centres on Webcam Child Sex Tourism and the Sweetie Project initiated by the children's rights organization Terre des Hommes in 2013 in response to the exponential increase of online child abuse. Webcam child sex tourism is a growing international problem, which not only encourages the abuse and sexual exploitation of children and provides easy access to child-abuse images, but which is also a crime involving a relatively low risk for offenders as live-streamed webcam performances leave few traces that law enforcement can use. Moreover, webcam child sex tourism often has a cross-border character, which leads to jurisdictional conflicts and makes it even harder to obtain evidence, launch investigations or prosecute suspects. Terre des Hommes set out to actively tackle webcam child sex tourism by employing a virtual 10-year old Philippine girl named Sweetie, a so-called chatbot, to identify offenders in chatrooms. Sweetie 1.0 could be deployed only if police officers participated in chats, and thus was limited in dealing with the large number of offenders. With this in mind, a more pro-active and preventive approach was adopted to tackle the issue. Sweetie 2.0 was developed with an automated chat function to track, identify and deter individuals using the internet to sexually abuse children. Using chatbots allows the monitoring of larger parts of the internet to locate and identify (potential) offenders, and to send them messages to warn of the legal consequences should they proceed further. But using artificial intelligence raises serious legal questions. For instance, is sexually interacting with a virtual child actually a criminal offence? How do rules of criminal procedure apply to Sweetie as investigative software? Does using Sweetie 2.0 constitute entrapment? This book, the outcome of a comparative law research initiative by Leiden University's Center for Law and Digital Technologies (eLaw) and the Tilburg Institute for Law, Technology, and Society (TILT), addresses the application of substantive criminal law and criminal procedure to Sweetie 2.0 within various jurisdictions around the world. This book is especially relevant for legislators and policy-makers, legal practitioners in criminal law, and all lawyers and academics interested in internet-related sexual offences and in Artificial Intelligence and law. Professor Simone van der Hof is General Director of Research at t he Center for Law and Digital Technologies (eLaw) of the Leiden Law School at Leiden University, The Netherlands. Ilina Georgieva, LL.M., is a PhD researcher at the Faculty of Governance and Global Affairs at Leiden University, Bart Schermer is an associate professor at the Center for Law and Digital Technologies (eLaw) of the Leiden Law School, and Professor Bert-Jaap Koops is Professor of Regulation and Technology at the Tilburg Institute for Law, Technology, and Society (TILT), Tilburg University, The Netherlands.
The Internet is not an unchartered territory. On the Internet, norms matter. They interact, regulate, are contested and legitimated by multiple actors. But are they diverse and unstructured, or are they part of a recognizable order? And if the latter, what does this order look like? This collected volume explores these key questions while providing new perspectives on the role of law in times of digitality. The book compares six different areas of law that have been particularly exposed to global digitality, namely laws regulating consumer contracts, data protection, the media, financial markets, criminal activity and intellectual property law. By comparing how these very different areas of law have evolved with regard to cross-border online situations, the book considers whether cyberlaw is little more than "the law of the horse", or whether the law of global digitality is indeed special and, if so, what its characteristics across various areas of law are. The book brings together legal academics with expertise in how law has both reacted to and shaped cross-border, global Internet communication and their contributions consider whether it is possible to identify a particular mediality of law in the digital age. Examining whether a global law of digitality has truly emerged, this book will appeal to academics, students and practitioners of law examining the future of the law of digitality as it intersects with traditional categories of law.
What is the future of constitutionalism, state and law in the new technological age? This edited collection explores the different aspects of the impact of information and technology revolution on state, constitutionalism and public law. Leading European scholars in the fields of constitutional, administrative, financial and EU law provide answers to fascinating conceptual questions including: - What are the challenges of information and technological revolution to sovereignty? - How will information and technology revolution impact democracy and the public sphere? - What are the disruptive effects of social media platforms on democratic will-formation processes and how can we regulate the democratic process in the digital age? - What are the main challenges to courts and administrations in the algorithmic society? - What is the impact of artificial intelligence on administrative law and social and health services? - What is the impact of information and technology revolution on data protection, privacy and human rights?
The book provides a detailed overview and analysis of important EU Internet regulatory challenges currently found in various key fields of law directly linked to the Internet such as information technology, consumer protection, personal data, e-commerce and copyright law. In addition, it aims to shed light on the content and importance of various pending legislative proposals in these fields, and of the Court of Justice of the European Union's recent case law in connection with solving the different problems encountered. The book focuses on challenging legal questions that have not been sufficiently analyzed, while also presenting original thinking in connection with the regulation of emerging legal questions. As such, it offers an excellent reference tool for researchers, policymakers, judges, practitioners and law students with a special interest in EU Internet law and regulation. |
You may like...
Advanced LaTeX in Academia…
Marco OEchsner, Andreas Oechsner
Hardcover
R3,441
Discovery Miles 34 410
New Era for Robust Speech Recognition…
Shinji Watanabe, Marc Delcroix, …
Hardcover
R5,505
Discovery Miles 55 050
Proactive Spoken Dialogue Interaction in…
Petra-Maria Strauss, Wolfgang Minker
Hardcover
R2,750
Discovery Miles 27 500
Handbook of Research on Recent…
Siddhartha Bhattacharyya, Nibaran Das, …
Hardcover
R9,028
Discovery Miles 90 280
Harmonization and Development of…
Roberto Basili, Cristina Bosco, …
Hardcover
R3,281
Discovery Miles 32 810
The People's Web Meets NLP…
Iryna Gurevych, Jungi Kim
Hardcover
Genres on the Web - Computational Models…
Alexander Mehler, Serge Sharoff, …
Hardcover
R4,212
Discovery Miles 42 120
|