![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
An exploration of EU policy towards copyright enforcement on the Internet, examining the EU Telecoms Package from 2007-9. This book explains the puzzling case of copyright in telecoms law, and includes discussion of 3-strikes (graduated response), ISP liability and the French Hadopi law.
This volume is a presentation of all methods of legal knowledge representation from the point of view of jurisprudence as well as computer science. A new method of automatic analysis of legal texts is presented in four case studies. Law is seen as an information system with legally formalized information processes. The achieved coverage of legal knowledge in information retrieval systems has to be followed by the next step, conceptual indexing and automatic analysis of texts. Existing approaches of automatic knowledge representations do not have a proper link to the legal language in information systems. The concept-based model for semi-automatic analysis of legal texts provides this necessary connection. The knowledge base of descriptors, context-sensitive rules and meta-rules formalises properly all important passages in the text corpora for automatic analysis. Statistics and self-organizing maps give assistance in knowledge acquisition. The result of the analysis is organized with automatically generated hypertext links. Four case studies show the huge potential but also some drawbacks of this approach.
This innovative and original book explores the relationship between blockchain and antitrust, highlighting the mutual benefits that stem from cooperation between the two and providing a unique perspective on how law and technology could cooperate. Delivering a legal, economic, and technical analysis of antitrust and blockchain, Thibault Schrepel provides a well-rounded examination of their mutual flaws and the limitations that occur when they ignore each other. He explores the anticompetitive practices that may arise in the field as well as covering enforcement issues before showcasing the potential of blockchain and antitrust to complement one another. He offers different ways of creating effective regulations and enforcement mechanisms for the purpose of benefiting their common interests. Covering key topics such as decentralization, blockchain evolution, and the objectives of competition law, this book will be of particular interest to academics and students researching at the intersection of law and technology. It will also be useful for legal practitioners interested in blockchain, as well as antitrust agencies and policy-makers.
Using numerous practical examples,this book examines the evolution of EC telecommunications law following the achievement of liberalisation, the main policy goal of the 1990s. After reviewing the development of regulation in the run-up to liberalisation, the author identifies the methods used to direct the liberalisation process and tests their validity in the post-liberalisation context. A critical analysis is made of the claim that competition law will offer sufficient means to regulate the sector in the future. Particular emphasis is given to the way in which EC Competition Law changed in the 1990s using the essential facilities doctrine, an expansive non-discrimination principle and the policing of cross-subsidisation to tackle what were then thought of as regulatory matters. Also examined within the work is the procedural and institutional interplay between competition law and telecommunications regulation. In conclusion, Larouche explores the limits of competition law and puts forward a long-term case for sector-specific regulation, with a precise mandate to ensure that the telecommunications sector as a whole fulfils its role as a foundation for economic and social activity.
Journalists have often lost constitutional rights for coverage and commentary during America's wars. Based on analysis of two hundred years of law and history, this study argues that press freedom cannot and should not be suspended during armed conflict. The military and the media must work together because neither has authority over the other.
'Is private regulation of the Internet over? Have states taken over?' This book examines the function of self-regulation in cyberspace. It argues that contrary to what is often supposed in the literature, self-regulation is still an indispensable part of regulation of the Internet and will arguably remain so. It is intricately woven into the mesh of rules that governs the Internet today. Private regulation fills substantive or procedural gaps where no state regulation exists or where it is incomplete or ineffective, thus complementing the reach of state regulation. Simultaneously, states supply legal (and financial) frameworks that enable or complement self-regulation. In practice, often unknown to users, their behaviour is regulated by intertwined rules coming from both states and private groups. While each source of rules retains its identity and regulatory strengths, it is dependent on and complementary to the rules and processes of the other to effectively regulate Internet activities. Dr. Jeanne P. Mifsud Bonnici is a Senior Lecturer at the Centre for Law, Information and Converging Technologies, University of Central Lancashire, Preston, UK. This is Volume 16 in the Information Technology and Law (IT&Law) Series
Cryptography is essential for information security and electronic commerce, yet it can also be abused by criminals to thwart police wiretaps and computer searches. How should governments address this conflict of interests? Will they require people to deposit crypto keys with a `trusted' agent? Will governments outlaw cryptography that does not provide for law-enforcement access? Can the police require suspects to hand over keys, thus infringing the privilege against self-incrimination? Or should law enforcement forget about wiretapping and computer searches altogether? This is not yet another study of the crypto controversy to conclude that this or that interest is paramount. This is not a study commissioned by a government, nor is it a report that campaigns on the electronic frontier. "The Crypto Controversy" is neither a cryptography handbook nor a book drenched in legal jargon. "The Crypto Controversy" pays attention to the reasoning of both privacy activists and law-enforcement agencies, to the particulars of technology as well as of law, to "solutions" offered both by cryptographers and by governments. The author proposes a method to balance the conflicting interests and applies this to the Dutch situation, explaining both technical and legal issues for those interested in the subject.
Complexity theory as a subject has gained increasing prominence across numerous disciplines including physics, biology, sociology and economics. Large interconnected systems such as the Internet display a number of inherent architectural characteristics deeming them well-suited to the study of complex dynamic networks. This important book uses various network science-based tools to explore the contentious issue of Internet regulation. The author demonstrates that the Internet as a global communications space is a self-organizing entity that has proven problematic for regulators, and that in order to regulate cyberspace, one must first understand how the network operates. In order to illustrate how the world wide web operates, Andres Guadamuz presents case studies in copyright policy, peer-production and cyber crime, providing in-depth analyses of the challenges posed by the Internet's complex dynamic networks. The book concludes that regulatory efforts that ignore empirical evidence will ultimately encounter serious problems. Networks, Complexity and Internet Regulation introduces network theory to legal audiences and applies some of the characteristics of large distributed self-organizing networks to the topic of Internet regulation. As such, this fascinating book will prove invaluable to researchers, academics and students in the fields of Internet regulation and policy, intellectual property law and information technology law. Contents: Introduction 1. The Science of Complex Networks 2. Complexity and the Law 3. Internet Architecture and Regulation 4. Copyright Networks 5. Peer-production Networks 6. Cybercrime and Networks Conclusion Bibliography Index
The volume is devoted to the relevant problems in the legal sphere, created and generated by recent advances in science and technology. In particular, it investigates a series of cutting-edge contemporary and controversial case-studies where scientific and technological issues intersect with individual legal rights. The book addresses challenging topics at the intersection of communication technologies and biotech innovations such as freedom of expression, right to health, knowledge production, Internet content regulation, accessibility and freedom of scientific research.
This book offers guidance for US-based IT businesses on both sides of the Atlantic when dealing with big data and government data, since transatlantic data flows are key to the success of these enterprises. It offers practical insights into many of the data-protection challenges US companies in various industries face when seeking to comply with US and EU data-protection laws, and analyses the potential conflicts in the light of their risks and the way in which US-based cloud providers react to the uncertainties of the applicable data-protection rules. The book particularly focuses on the insights derived from a qualitative study conducted in 2016 with various cloud-based IT businesses in the Silicon Valley area, which shows the diversity of views on data protection and the many approaches companies take to this topic. Further, it discusses key data-protection issues in the field of big data and government data.
Managing scarcity to serve the public interest is a classic government task. An important way to execute this task is by allocating individual rights that are only available in limited quantities, such as CO2 emission allowances, gambling licences, subsidies, radio frequencies, public contracts and parking permits. Whereas economic and political theory has paid much attention to the allocation of scarce goods and rights, until now a consistent and general legal theory of 'the allocating government' has been missing. This is striking given the fact that limited rights have to be allocated within many sectors and are often of great social significance and financial importance. Decisions on allocation often lead to disputes. This book provides a unique exploration of building blocks for a consistent and general legal theory on the allocation of limited rights by administrative authorities. This book is useful to legislators, administrative authorities, applicants, interested third parties and the courts. The EU-law perspective is an important element in this book, but comparative law and doctrinal approaches are also taken into account. The contributions in this book have been enriched by information from national reports on the allocation of gambling licences, radio frequencies and CO2 emission permits in seven EU Member States: France, Germany, Greece, Italy, the Netherlands, Romania and Spain. (See P. Adriaanse, F. van Ommeren, W. den Ouden and J. Wolswinkel (eds.), Scarcity and the State II. Member State Reports on Gambling Licences, Radio Frequencies and CO2 Emission Permits, Intersentia, Antwerp 2016).
Emerging technologies present a challenging but fascinating set of ethical, legal and regulatory issues. The articles selected for this volume provide a broad overview of the most influential historical and current thinking in this area and show that existing frameworks are often inadequate to address new technologies - such as biotechnology, nanotechnology, synthetic biology and robotics - and innovative new models are needed. This collection brings together invaluable, innovative and often complementary approaches for overcoming the unique challenges of emerging technology ethics and governance.
This book crosses the conventional border between the analysis of on-screen and off-screen intersections of law and cinema. It not only addresses the representation of law on screen (for example, through discussions of how lawyers, police, and prisons are depicted, or how courtroom sequences function as narratives), but also focuses on how the state shapes and regulates cinema. The volume addresses the distinct contexts of China, India, Japan, Korea, the Philippines, and Vietnam, along with an integrative introduction that puts the essays and themes into context for scholars and students alike.
Cyberspace, the electronic super-highway or the Internet, as it is most commonly known, is a globally-networked, computer-sustained, computer-accessed and computer-generated multidimensional virtual reality, the use of which is increasing at a tremendous rate. Although much has been written on the legal issues relating to this virtual reality, this book provides coverage of the private international aspects. The work aims to address two basic questions, namely, which court has jurisdiction and which law is to be applied when litigation arises from activity on the Internet? The book comprises seven key papers, presented at an international symposium organised by Utrecht University's Molengraaff Institute of Private Law and the Hague Conference on Private International Law, which was held in Utrecht in June 1997. The main topics covered include: the role of law in cyberspace; experiences in the field of intellectual property; can private international law provide order to the chaos?; problems concerning jurisdiction and applicable law; and conclusions and recommendations.
For the first time in history, everyone - Third World freedom fighters to urban drug dealers - can communicate in secrecy via unbreakable codes made available by advances in cryptography and computer technology. As the welcome and unwelcome consequences of this new technology begin to dawn on governments worldwide, responses have varied from stringent regulation to laissez faire liberalism. Written by a former General Counsel of the National Security Agency and an expert in cryptography law, this text explores the policy and legal issues raised by the democratization of cryptography and offers a guide to the ways in which the law of cryptography translates issues of trust into standards for lawful conduct. The book addresses the international regulation of cryptography and digital signatures both in terms of confidentiality (cryptography used to keep secrets) and authentication (cryptography used to verify information). Coverage includes: a description of over 45 countries' policies and laws on cryptography import, export, and domestic controls and digital signature initiatives worldwide; a concise history of the cryptography debate in the United States from its beginnings after World War II to the recent debates over the Clipper Chip and key recovery encryption; and a presentation of the efforts of the United States government (and others) to build a new national consensus on regulation of encryption.
This exceptional new text offers an up-to-date and integrated approach to communication law. Written by two practicing attorneys with extensive experience teaching the communication law course, Law for Advertising, Broadcasting, Journalism, and Public Relations covers the areas of communication law essential and most relevant for readers throughout the communication curriculum. Its integrated approach will serve students and practitioners in advertising and public relations as well as those in journalism and electronic media. Providing background to help readers understand legal concepts, this comprehensive communication law text includes an introduction to the legal system; covers legal procedures, structures, and jurisdictions; discusses the First Amendment and electronic media regulations; and considers issues of access. Additional material includes: *intellectual property law; *employment and agency law, with explanations of how these laws create obligations for mass communication professionals and their employees; *commercial communication laws; and *special laws and regulations that impact reporters, public relations practitioners, and advertisers who deal with stock sales. Special features of this text include: *Magic Words and Phrases--defining legal terms; *Cases--illustrating key points in each chapter; *Practice Notes--highlighting points of particular interest to professional media practices; *Instructions on finding and briefing cases, with a sample brief; and *Examples of legal documents and jury instructions. This text is intended as an introduction to communication law for students and practitioners in mass communication, journalism, advertising, broadcasting, telecommunications, and public relations.
Providing comparative analysis that examines both Western and non-Western legal systems, this wide-ranging Handbook expands and enriches the existing privacy and defamation law literature and addresses the fundamental issues facing today's scholars and practitioners. Comparative Privacy and Defamation provides insightful commentary on issues of theory and doctrine, including the challenges of General Data Protection Regulations (GDPR) and the impact of new technologies on the law. Chapters explore the origins and development of the right to privacy, privacy rights of photographic subjects and defamation by photo-manipulation, and the right to be forgotten. Containing contributions from expert international scholars, this comprehensive Handbook investigates the liability of internet intermediaries in cases of defamation and the emerging problem of global injunctions before concluding with eight country focussed studies. Engaging and accessible, this Handbook will be a key resource for students and scholars researching in the fields of privacy and defamation law, internet and technological law and information and media law. Contributors include: T.D.C. Bennett, S. Bretthauer, J. Campbell, P. Coe, M. Cornils, S.C. Ekaratne, A. Gajda, G. Gil, A. Koltay, R. Krotoszynski, J. Kulesza, D. Mangan, D. Milo, R. Moosavian, J. Oster, K.S. Park, M. Pearson, J. Reichel, D. Rolph, J. Shimizu, D.N. Staiger, R.L. Weaver, R.H. Weber, P. Wragg, M.N. Yan, V. Zeno-Zencovich
This book provides a wide and deep perspective on the ethical issues raised by pervasive information and communication technology (PICT) - small, powerful, and often inexpensive Internet-connected computing devices and systems. It describes complex and unfamiliar technologies and their implications, including the transformative potential of augmented reality, the power of location-linked information, and the uses of "big data," and explains potential threats, including privacy invaded, security violated, and independence compromised, often through widespread and lucrative manipulation. PICT is changing how we live, providing entertainment, useful tools, and life-saving systems. But the very smartphones that connect us to each other and to unlimited knowledge also provide a stream of data to systems that can be used for targeted advertising or police surveillance. Paradoxically, PICT expands our personal horizons while weaving a web that may ensnare whole communities. Chapters describe particular cases of PICT gone wrong, but also highlight its general utility. Every chapter includes ethical analysis and guidance, both specific and general. Topics are as focused as the Stuxnet worm and as broad as the innumerable ways new technologies are transforming medical care. Written for a broad audience and suitable for classes in emerging technologies, the book is an example of anticipatory ethics - "ethical analysis aimed at influencing the development of new technologies" (Deborah Johnson 2010). The growth of PICT is outpacing the development of regulations and laws to protect individuals, organizations, and nations from unintended harm and malicious havoc. This book alerts users to some of the hazards of PICT; encourages designers, developers, and merchants of PICT to take seriously their ethical responsibilities - if only to "do no harm" - before their products go public; and introduces citizens and policy makers to challenges and opportunities that must not be ignored.
The Telecommunications Act of 1996 envisioned a competitive free-for-all in the U.S. telecommunications industry with removal of barriers to entry in local telecommunications markets and the lifting of the artificial restrictions that kept the Regional Bell Operating Companies (RBOCs) out of the interLATA long-distance market. After close to 5 years, only one RBOC has been granted permission (controversially) to enter the interLATA market, and local competition has yet to provide most consumers with meaningful choices. In addition, the wave of mergers across the industry has raised the specter of putting the former Bell System back together again. Policymakers now openly question whether the Act can deliver what it promised. Three principal themes are developed in this book. First, there has been a coordination failure between Congress and the FCC in translating the principles embodied in the Act into practice. The authors provide evidence for this by analyzing stock market reactions to legislative and regulatory actions. This coordination failure was largely predictable, given the ambiguity in the Act, as well as conflicting jurisdictions between the FCC and the states. Second, the Act calls for wholesale prices to be based on cost.' Regulators adopted a costing standard (TELRIC) that provides a means to subsidize competitive entry in local telephone service markets. The ready adoption of the TELRIC standard by regulators is shown to be tied to the third theme: price cap regulation provides regulators with insurance' against the adverse effects of competition in local telephone markets. Statistical analysis reveals that regulators in price cap states set uniformly lower unbundled network element prices (lower barriers to entry) in comparison with regulators in rate-of-return and earnings sharing states. The result is a triumph of regulatory processes over market processes - the antithesis of the purpose of the Act.
The classification of services in the digital economy proves
critical for doing business, but it appears to be a particularly
complex regulatory matter that is based upon a manifold set of
issues. In the context of the General Agreement on Trade in
Services (GATS), when the services classification scheme was
drafted in the early 1990s, convergence processes had not unfolded
yet and the internet was still in its infancy and not a reality in
daily life. Therefore, policy makers are now struggling with the
problem of regulating trade in electronic services and are in
search of a future-oriented solution for classifying them in
multilateral and preferential trade agreements. In late fall 2011,
the authors of this study were mandated by the European Union,
Delegation to Vietnam, in the context of the Multilateral Trade
Assistance Project 3 (MUTRAP 3), to work out a report clarifying
the classification of services in the information/digital economy
and to assess the impact of any decision regarding the
classifications on the domestic and external relations policy of
Vietnam, as well as to discuss the relevant issues with local
experts during three on-site visits.
This book offers a comparative analysis of the domain name registration systems utililsed in Australia and the United Kingdom. Taking an international perspective, the author analyses the global trends and dynamics of the domain name registration systems and explores the advantages and disadvantages of restrictive and less restrictive systems by addressing issues of consumer protection. The book examines the regulatory frameworks in the restrictive and unrestrictive registration systems and considers recent developments in this area. Jenny Ng also examines the legal and economic implications of these regulatory frameworks, drawing upon economic theory, regulatory and systems theory as well as applying rigorous legal analysis. In doing so, this work proposes ways in which such systems could be better designed to reflect the needs of the specific circumstances in individual jurisdictions. The Domain Name Registration System will be of particular interest to academics and students of IT law and e-commerce.
Spam, unsolicited, unwanted commercial communication, especially in bulk form is increasingly included in the areas of concern and regulation of governments worldwide. Unfortunately, this recognized and exponentially growing menace has not yet met its regulatory match. Piecemeal controls, lack of international cooperation, and the absence of an overall policy on combating patently intrusive and unwanted messages in all channels of communication hamper the struggle. The present volume contains eleven national reports, together with a general report, on this major problem that is presently burdening and distorting communications through the Internet.Most of the reports were presented at the XVIIth Congress of the International Academy of Comparative Law held at Utrecht, the Netherlands on July 19, 2006. The authors have had the opportunity to revise and update their texts before they were submitted here for publication. The national reports are from Denmark, France, Germany, Greece, Italy, Poland, Spain, South Africa, Switzerland, the United Kingdom, and the United States. Starting from some common assumptions; including respect for freedom of expression; emphasis on unsolicited, bulk, automated; messages to strangers; and non-interference with the normal use of the Internet; the contributors set out to tackle spammer elusiveness and the difficulties of cross-border coordination that plague this field.Among the broadly conceived legal responses they consider are the following: making spam illegal; empowering the user to avoid and repel spam; laws governing confidentiality of personal data; application of unfair competition; laws; and conscripting the service providers to block spam in its tracks through a variety of controls. The reports provide documentation and analysis of the various ways in which these approaches have been used, or can be used, in legislation and case law in a variety of national and international fora. Workers in all fields of communications, from technologists to legal practitioners and academics to administrative policymakers, will benefit enormously from these syntheses and insights.
|
You may like...
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,648
Discovery Miles 36 480
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay
Hardcover
R3,428
Discovery Miles 34 280
Digital Justice - Technology and the…
Ethan Katsh, Orna Rabinovich-Einy
Hardcover
R2,990
Discovery Miles 29 900
|