![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This book identifies the principles that should be applied when processing Big Data in the context of food safety risk assessments. Food safety is a critical goal in the protection of individuals' right to health and the flourishing of the food and feed market. Big Data is fostering new applications capable of enhancing the accuracy of food safety risk assessments. An extraordinary amount of information is analysed to detect the existence or predict the likelihood of future risks, also by means of machine learning algorithms. Big Data and novel analysis techniques are topics of growing interest for food safety agencies, including the European Food Safety Authority (EFSA). This wealth of information brings with it both opportunities and risks concerning the extraction of meaningful inferences from data. However, conflicting interests and tensions among the parties involved are hindering efforts to find shared methods for steering the processing of Big Data in a sound, transparent and trustworthy way. While consumers call for more transparency, food business operators tend to be reluctant to share informational assets. This has resulted in a considerable lack of trust in the EU food safety system. A recent legislative reform, supported by new legal cases, aims to restore confidence in the risk analysis system by reshaping the meaning of data ownership in this domain. While this regulatory approach is being established, breakthrough analytics techniques are encouraging thinking about the next steps in managing food safety data in the age of machine learning. The book focuses on two core topics - data ownership and data governance - by evaluating how the regulatory framework addresses the challenges raised by Big Data and its analysis in an applied, significant, and overlooked domain. To do so, it adopts an interdisciplinary approach that considers both the technological advances and the policy tools adopted in the European Union, while also assuming an ethical perspective when exploring potential solutions. The conclusion puts forward a proposal: an ethical blueprint for identifying the principles - Security, Accountability, Fairness, Explainability, Transparency and Privacy - to be observed when processing Big Data for food safety purposes, including by means of machine learning. Possible implementations are then discussed, also in connection with two recent legislative proposals, namely the Data Governance Act and the Artificial Intelligence Act.
The Internet has been integral to the globalization of a range of goods and production, from intellectual property and scientific research to political discourse and cultural symbols. Yet the ease with which it allows information to flow at a global level presents enormous regulatory challenges. Understanding if, when, and how the law should regulate online, international flows of information requires a firm grasp of past, present, and future patterns of information flow, and their political, economic, social, and cultural consequences. In "The Global Flow of Information," specialists from law, economics, public policy, international studies, and other disciplines probe the issues that lie at the intersection of globalization, law, and technology, and pay particular attention to the wider contextual question of Internet regulation in a globalized world. While individual essays examine everything from the pharmaceutical industry to television to "information warfare" against suspected enemies of the state, all contributors address the fundamental question of whether or not the flow of information across national borders can be controlled, and what role the law should play in regulating global information flows. Ex Machina series Contributors: Frederick M. Abbott, C. Edwin Baker, Jack M. Balkin, Dan L. Burk, Miguel Angel Centeno, Dorothy E. Denning, James Der Derian, Daniel W. Drezner, Jeremy M. Kaplan, Eddan Katz, Stanley N. Katz, Lawrence Liang, Eli Noam, John G. Palfrey, Jr., Victoria Reyes, and Ramesh Subramanian
Summary Explains in easy-to-understand terms what executives and senior managers need to know and do about the ever-changing cyber threat landscape. Gives strategic, business-focused guidance and advice relevant to C-suite executives. Provides an effective and efficient framework for managing cyber governance, risk and compliance. Explains what is required to implement an effective cyber security strategy. Description With high-profile cyber attacks, data breaches and fines for GDPR (General Data Protection Regulation) non-compliance hitting the headlines daily, businesses must protect themselves and their reputations, while reassuring stakeholders they take cyber security seriously. Cyber attacks are becoming more sophisticated and prevalent, and the cost of data breaches is soaring. In addition, new regulations and reporting requirements make cyber security a critical business issue. Board members and senior management must understand the threat landscape and the strategies they can employ to establish, implement and maintain effective cyber resilience throughout their organisation. How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. It explains what is meant by governance, risk and compliance, how it applies to cyber security and what is required to implement an effective cyber security strategy. The pocket guide: Gives readers a greater understanding of cyber governance, risk and compliance; Explains what executives, senior managers and their advisors need to know and do about the ever-changing cyber threat landscape; Provides context as to why stakeholders need to be aware of and in control of their organisation's cyber risk management and cyber incident response; Gives guidance on building an appropriate and efficient governance framework that enables organisations to demonstrate their cyber approach in a non-technical, strategic, business-focused way; Details an overview process to enable risk assessment, assess existing defence mitigations and provide a framework for developing suitable controls; and Includes a checklist to help readers focus on their higher-priority cyber areas. Suitable for all managers and executives, this pocket guide will be of interest to non-cyber specialists, including non-executive directors, who may be required to review cyber arrangements. For cyber specialists, it provides an approach for explaining cyber issues in non-jargonistic, business-based language. Kick-start your journey to becoming cyber secure - buy this pocket guide today!
Do conceptions of the Rule of Law reflect timeless truths, or are they in fact contingent on a particular information and communications infrastructure - one that we are fast leaving behind? Hildebrandt has engineered a provocative encounter between law and networked digital technologies that cuts to the heart of the dilemma confronting legal institutions in a networked world.' - Julie E. Cohen, Georgetown University, US'Many contemporary authors are wrestling with two technological developments which will change our society beyond recognition: big data analytics and smart technologies. Few though understand, or can explain, these developments in the way Mireille Hildebrandt does. In ambitiously bringing together legal theory, psychology, social ethnology and of course smart agency and ambient intelligence, Hildebrandt gives the most complete study of these vitally important developments. Books are often described as 'must read' though few actually are; this one genuinely is.' - Andrew Murray, London School of Economics, UK This timely book tells the story of the smart technologies that reconstruct our world, by provoking their most salient functionality: the prediction and preemption of our day-to-day activities, preferences, health and credit risks, criminal intent and spending capacity. Mireille Hildebrandt claims that we are in transit between an information society and a data-driven society, which has far reaching consequences for the world we depend on. She highlights how the pervasive employment of machine-learning technologies that inform so-called 'data-driven agency' threaten privacy, identity, autonomy, non-discrimination, due process and the presumption of innocence. The author argues how smart technologies undermine, reconfigure and overrule the ends of the law in a constitutional democracy, jeopardizing law as an instrument of justice, legal certainty and the public good. Nevertheless, the book calls on lawyers, computer scientists and civil society not to reject smart technologies, explaining how further engaging these technologies may help to reinvent the effective protection of the Rule of Law. Academics and researchers interested in the philosophy of law and technology will find this book both discerning and relevant. Practitioners and policy makers in the areas of law, computer science and engineering will benefit from the insight into smart technologies and their impact today.
Few will deny that public service broadcasting--broadcasting that is controlled neither by the state nor by private media corporations--is an essential ingredient in modern democracy. But, as a number of initiatives in transition economies have shown, the inception and development of a strong public broadcasting system is a Herculean task that is easily sidetracked by politics or ideology, or stalled by lack of funding. Especially when state budgets are stretched, the expense is hard to justify. This collection of documents, comments, and cases brings all the major issues in public service broadcasting policy into focus and sets the problems to be addressed in sharp relief. It draws on white papers from NGOs and broadcasters, legislation from a wide range of countries (and a model law), accounts of public broadcasting efforts in transition states, analyses of evolving policy in established systems, government regulatory guidelines, and a great deal more. Among the matters touched upon are the following: the principles of public service broadcasting and their cultural and economic justification; limiting state interference; the place of public broadcasting in a multi-channel, "market-driven" world; the appropriate mix of public and private revenues; objectivity and impartiality in broadcasting; how institutional structures can shape programming strategies; the use of competition law to adjust relations between public and private broadcasting; EU accession standards for public service broadcasting; and the impact of digital broadcasting.
Vital to the effective functioning of voluntary organisations is the trust of people - the beneficiaries, clients, regulators, donors, volunteers and paid staff. Open, fair and well-managed data protection practice is not just desirable in helping to achieve that trust, but essential. Get it wrong and there is reputational damage and costs attached. Data Protection for voluntary organisations will enable you to set a shining example of best practice and also comply with UK data legislation and the General Data Protection Regulation (GDPR) in force since 2018. This book will help you: * Understand the key principles and elements of data protection * Recognise your main responsibilities as a data controller * Distinguish when you can and can't retain data * Appreciate what the rights of the data subject are Who is this book for? A must-read for anyone in the UK voluntary sector who wants to get beyond tick-box data management. Invaluable to data managers or those who handle personal information such as IT, personnel, marketing and fundraising departments. For professional advisers, and academics it will also offers a valuable summary drawing out key data protection points by examining and interpreting the primary legislation.
This Handbook examines the regulatory, social, financial, and technological issues pertaining to energy communities in smart cities. Evidencing the emergence of new imperatives at the intersection of sustainability, resilience, innovation, and legal issues, energy communities embody the thrust of the user-centred digital transformation our societies are subjected to today. By bridging the energy communities’ debate with smart cities research, this Handbook positions itself at the heart of the conversation on energy sustainability, climate action, and ‘just transition’. Drawing on contributions from across the globe, this book offers both a birds-eye and a detailed inter- and multidisciplinary insight into the emergence of energy communities and their evolution in the smart city context. Technological and regulatory aspects of this transition are explored from a variety of conceptual and empirical perspectives. Case studies evidencing developments in the Global South and the Global North embellish the conversation. Questions of climate change, energy efficiency, renewable energy sources, emissions’ reduction, and corresponding policy frameworks are discussed. Dedicated to all those interested in climate action, energy transition, sustainable development, and smart cities, this Handbook will be of interest to policymakers, lawyers, energy and urban experts, researchers, and students.
This timely Research Handbook contains an analysis by leading scholars and practitioners of various legal questions concerning cyberspace and cyber activities. Comprehensive and thorough, it succeeds in mapping out the range of international rules that apply to cyberspace and to specific cyber activities, assesses their regulatory efficacy and offers insightful suggestions, where necessary, for revised standards. Contributors examine the application of fundamental international law principles to cyberspace such as the principle of sovereignty, jurisdiction, state responsibility, individual criminal responsibility, human rights and intellectual property rights. They explore the application of international rules to cyber terrorism, cyber espionage, cyber crime, cyber attacks and to cyber war. They deal with the meaning of cyber operations, the ethics of cyber operations as well as with cyber deterrence. Finally, they comment on the cyber security policies of international and regional institutions such as those of the United Nations, the European Union, NATO and of Asian-Pacific institutions. This Research Handbook will benefit scholars in the fields of international law, international relations, public and private law. Researchers will find the suggested future research avenues in this field invaluable whilst policy-makers and practitioners will gain fresh insights into topical issues concerning the regulation of cyberspace and of cyber activities. Contributors: K. Ambos, C. Antonopoulos, L. Arimatsu, K. Bannelier-Christakis, R. Buchan, P. Ducheine, D.P. Fidler, C. Focarelli, T.D. Gill, K. Heath, C. Henderson, P. Kastner, U. Kohl, F. Megret, E. Myjer, H. Nasu, A. Rahmatian, M. Roscini, N.C. Rowe, B. Saul, M. Schmitt, H. Trezise, N. Tsagourias, D. Turns, R.A. Wessel, K. Ziolkowski
Cyberspace is a difficult area for lawyers and lawmakers. With no physical constraining borders, the question of who is the legitimate lawmaker for cyberspace is complex. Rethinking the Jurisprudence of Cyberspace examines how laws can gain legitimacy in cyberspace and identifies the limits of the law?s authority in this space. Two key questions are central to the book: Who has authority to make laws within cyberspace and how do laws in cyberspace achieve legitimacy? Chris Reed and Andrew Murray answer these questions by examining the jurisprudential principles that explain law in the physical world and rethinking them for the cyberworld. In doing so they establish that cyberlaw is more similar to traditional law than previously thought, but that establishing legitimate authority is quite different. This book provides the first thorough examination of the jurisprudence of cyberspace law, asking why any law should be obeyed and how the rule of law is to be maintained there. Academics and researchers who are interested in the regulation of cyberspace will find this to be a compelling study. More broadly, it will appeal to those researching in the fields of transnational legal studies, jurisprudence and legal thought.
This book assesses data protection rules that are applicable to the processing of personal data in a law enforcement context. It offers the first extensive analysis of the LED and Regulation (EU) 2018/1725. It illustrates the challenges arising from the unclear delineation between the different data protection instruments at both national and EU level. Taking a practical approach, it exemplifies situations where the application of data protection instruments could give rise to a lowering of data protection standards where the data protection rules applicable in the law enforcement context are interpreted broadly. The scope of data protection instruments applied by law enforcement authorities impacts processing for purposes of border control, migration management and asylum because there is an unclear delineation between the different data protection instruments.
What is the future of constitutionalism, state and law in the new technological age? This edited collection explores the different aspects of the impact of information and technology revolution on state, constitutionalism and public law. Leading European scholars in the fields of constitutional, administrative, financial and EU law provide answers to fascinating conceptual questions including: - What are the challenges of information and technological revolution to sovereignty? - How will information and technology revolution impact democracy and the public sphere? - What are the disruptive effects of social media platforms on democratic will-formation processes and how can we regulate the democratic process in the digital age? - What are the main challenges to courts and administrations in the algorithmic society? - What is the impact of artificial intelligence on administrative law and social and health services? - What is the impact of information and technology revolution on data protection, privacy and human rights?
This book provides original, diverse, and timely insights into the nature, scope, and implications of Artificial Intelligence (AI), especially machine learning and natural language processing, in relation to contracting practices and contract law. The chapters feature unique, critical, and in-depth analysis of a range of topical issues, including how the use of AI in contracting affects key principles of contract law (from formation to remedies), the implications for autonomy, consent, and information asymmetries in contracting, and how AI is shaping contracting practices and the laws relating to specific types of contracts and sectors. The contributors represent an interdisciplinary team of lawyers, computer scientists, economists, political scientists, and linguists from academia, legal practice, policy, and the technology sector. The chapters not only engage with salient theories from different disciplines, but also examine current and potential real-world applications and implications of AI in contracting and explore feasible legal, policy, and technological responses to address the challenges presented by AI in this field. The book covers major common and civil law jurisdictions, including the EU, Italy, Germany, UK, US, and China. It should be read by anyone interested in the complex and fast-evolving relationship between AI, contract law, and related areas of law such as business, commercial, consumer, competition, and data protection laws.
This open access book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by the NCSA (National Cybersecurity System Act - this act was the first attempt to create a legal regulation of cybersecurity and, in addition, has implemented the provisions of the NIS Directive) but may discuss a number of other issues. The book presents international and EU regulations in the field of cybersecurity and issues pertinent to combating cybercrime and cyberterrorism. Moreover, regulations concerning cybercrime in a few select European countries are presented in addition to the problem of collision of state actions in ensuring cybersecurity and human rights. The advantages of the book include a comprehensive and synthetic approach to the issues related to the cybersecurity system of the Republic of Poland, a research perspective that takes as the basic level of analysis issues related to the security of the state and citizens, and the analysis of additional issues related to cybersecurity, such as cybercrime, cyberterrorism, and the problem of collision between states ensuring security cybernetics and human rights. The book targets a wide range of readers, especially scientists and researchers, members of legislative bodies, practitioners (especially judges, prosecutors, lawyers, law enforcement officials), experts in the field of IT security, and officials of public authorities. Most authors are scholars and researchers at the War Studies University in Warsaw. Some of them work at the Academic Centre for Cybersecurity Policy - a thinktank created by the Ministry of National Defence of the Republic of Poland.
This book centres on Webcam Child Sex Tourism and the Sweetie Project initiated by the children's rights organization Terre des Hommes in 2013 in response to the exponential increase of online child abuse. Webcam child sex tourism is a growing international problem, which not only encourages the abuse and sexual exploitation of children and provides easy access to child-abuse images, but which is also a crime involving a relatively low risk for offenders as live-streamed webcam performances leave few traces that law enforcement can use. Moreover, webcam child sex tourism often has a cross-border character, which leads to jurisdictional conflicts and makes it even harder to obtain evidence, launch investigations or prosecute suspects. Terre des Hommes set out to actively tackle webcam child sex tourism by employing a virtual 10-year old Philippine girl named Sweetie, a so-called chatbot, to identify offenders in chatrooms. Sweetie 1.0 could be deployed only if police officers participated in chats, and thus was limited in dealing with the large number of offenders. With this in mind, a more pro-active and preventive approach was adopted to tackle the issue. Sweetie 2.0 was developed with an automated chat function to track, identify and deter individuals using the internet to sexually abuse children. Using chatbots allows the monitoring of larger parts of the internet to locate and identify (potential) offenders, and to send them messages to warn of the legal consequences should they proceed further. But using artificial intelligence raises serious legal questions. For instance, is sexually interacting with a virtual child actually a criminal offence? How do rules of criminal procedure apply to Sweetie as investigative software? Does using Sweetie 2.0 constitute entrapment? This book, the outcome of a comparative law research initiative by Leiden University's Center for Law and Digital Technologies (eLaw) and the Tilburg Institute for Law, Technology, and Society (TILT), addresses the application of substantive criminal law and criminal procedure to Sweetie 2.0 within various jurisdictions around the world. This book is especially relevant for legislators and policy-makers, legal practitioners in criminal law, and all lawyers and academics interested in internet-related sexual offences and in Artificial Intelligence and law. Professor Simone van der Hof is General Director of Research at t he Center for Law and Digital Technologies (eLaw) of the Leiden Law School at Leiden University, The Netherlands. Ilina Georgieva, LL.M., is a PhD researcher at the Faculty of Governance and Global Affairs at Leiden University, Bart Schermer is an associate professor at the Center for Law and Digital Technologies (eLaw) of the Leiden Law School, and Professor Bert-Jaap Koops is Professor of Regulation and Technology at the Tilburg Institute for Law, Technology, and Society (TILT), Tilburg University, The Netherlands.
This book explores the current impasse that global regulators face in the digital sphere. Computer technology has advanced human civilization tenfold, but the freedom to interact with others in cyberspace has made individuals, discrete communities, organizations and governments more vulnerable to abuse. In consequence, political decision-makers are seriously considering granting limited legal immunity to victims who decide to 'hack- back.' Many victims frustrated by the slow pace of law enforcement in cyberspace have chosen to 'take the law into their own hands,' retaliating against those who have stolen valuable data and damaged network operations. Political deliberations about limited immunity for hackbacks usually ignore global justice and moral justifications for 'active defense' policies. Typically, cyber security policies balance deterrence against two different understandings of morality and the 'good life' : fairness or welfare. This book proposes a third moral rationale for cyber security policies : capability theory, developed principally by Amartya Sen and Martha Nussbaum. Properly formulated, a capability-based defense of retaliatory hackbacks can minimize attribution and cyber-escalation risks, deter bad behavior by casual computer users, disingenuous security experts, big tech companies, criminals and rogue governments, and satisfy calls for more retributive and distributive justice in the 'open world'. This book will appeal to legal theorists, political philosophers, social activists, investors, international relations scholars and businesspeople in the tech community.
Ensuring online safety has become a topic on the regulatory agenda in many Western societies. However, regulating for online safety is far from easy, due to the wide variety of national and international, private and public actors and stakeholders that are involved. When regulating online risks for children it is important to strike the right balance between protection against harms on the one hand and safeguarding their fundamental freedoms and rights on the other. The authors in this book attempt to grapple with precisely this theme: striking the right balance between ensuring safety for children on the internet while at the same time enabling them to experiment, to learn, to enrich their lives, to acquire skills and to have fun using this global network. The authors come from various scientific disciplines, ranging from law to social science and from media studies to philosophy. This means that the book provides the reader with both empirical and theoretical/conceptual chapters and sheds a multi-disciplinary light on the complex topic of regulating online safety for children.
This book addresses current issues regarding the ethical use of information technology in a holistic vision, by combining the perspectives of education specialists and those in the field of computer science at the level of higher education. It provides a current ethical perspective on the problems and solutions involved in the use of information technology in higher education. It appeals to readers interested in exploring the problems and appropriate solutions related to the ethical use of new technologies in higher education.
This book builds an empirical basis towards creating broader prevention and intervention programs in curbing digital piracy. It addresses the psychosocial, cultural and criminological factors associated with digital piracy to construct more efficient problem-solving mechanisms. Digital piracy including online piracy involves illegal copying of copyrighted materials. This practice costs the software industry, entertainment industry, and governments billions of dollars every year. Reports of the World Intellectual Property Organization (WIPO) and Business Software Alliance (BSA) view piracy largely in the light of economic factors; the assumption being that only those who cannot afford legitimate copies of software, music, and movies indulge in it. Drawing on research and theories from various disciplines like psychology, sociology, criminology, and law, the authors have designed an empirical study to understand the contribution of psychological, cultural and criminological factors to digital piracy. The chapters include data from India and China, which continue to be on the Special 301 report priority watch list of the WIPO, and Serbia, which has been on the watch list 4 times. They examine the role of self-control, self-efficacy, perceived punishment severity, awareness about digital piracy, peer influence, neutralization techniques, novelty seeking, pro-industry factors and other socio-demographic factors in predicting digital piracy. This book addresses a large readership, comprising academics and researchers in psychology, criminology and criminal justice, law and intellectual property rights, social sciences, and IT, as well as policymakers, to better understand and deal with the phenomenon of digital piracy.
Virtual currencies, particularly crypt-currencies, have been identified as potential money laundering and terrorism financing instruments due to their ability to transfer money anonymously and instantaneously over the globe. Governments and regulators have also recognized the need to more closely monitor and track virtual currency purchases and accounts to avoid the industry being exploited for money laundering or terrorism financing purposes, as explained in this book. The broad overview of various international legal approaches attempting to address this issue would be a great resource for legal and anti-money laundering or counter terrorism financing graduate students, scholars and practitioners interested in virtual currencies research.' - Raymond Choo, University of South Australia'This book is a comprehensive, highly detailed review of cybercrime and the issues raised by gambling in virtual environments. It makes an excellent contribution to the evolving discussion about the risks and controls relating to these activities. I would highly recommend it to anyone interested in financial crime and virtual environments from an international perspective.' - Liz Falconer, University of the West of England, UK In this unique book, the authors examine the relationship between real world legislation and new advancements in technology, showing how this can lead to loopholes in legislative protection. They draw on empirical research to highlight the jurisprudential issues relating to economic internet crime and digital currencies. Advancements in technology have seen gambling behavior transverse a new path. The law has not kept pace with such advances, leaving grey areas of concern undiscussed and unregulated.The authors provide a critical discussion on laws relating to gambling in virtual worlds, commenting that terms such as 'virtual' or fantasy are unhelpful in promoting effective legislation. The discussion reveals how virtual world gambling can lead on to other criminal acts within virtual worlds, and specifically examines the notion of cybercrime, economic internet crime and the problems associated with digital currencies. The book concludes by presenting the case for joined up national and international legislation to tackle virtual world crimes effectively. This distinctive study will appeal to researchers and advanced students with an interest in cybercrime, economic internet crime and virtual economies. Practitioners, policy-makers and law enforcement officers will find this book informative in promoting suitable legislation to encompass new technologies in economic crime. Contents: 1. Introduction to Virtual Worlds and Gambling 2. Cybercrime Critical Literature Review 3. Global and Virtual Gambling Legislation 4. International Measures Regulating Online Gambling 5. Global Regulation on Financial Crime 6. Digital Currencies and Financial Crime Conclusion and Recommendations Index
Cyberspace is a difficult area for lawyers and lawmakers. With no physical constraining borders, the question of who is the legitimate lawmaker for cyberspace is complex. Rethinking the Jurisprudence of Cyberspace examines how laws can gain legitimacy in cyberspace and identifies the limits of the law?s authority in this space. Two key questions are central to the book: Who has authority to make laws within cyberspace and how do laws in cyberspace achieve legitimacy? Chris Reed and Andrew Murray answer these questions by examining the jurisprudential principles that explain law in the physical world and rethinking them for the cyberworld. In doing so they establish that cyberlaw is more similar to traditional law than previously thought, but that establishing legitimate authority is quite different. This book provides the first thorough examination of the jurisprudence of cyberspace law, asking why any law should be obeyed and how the rule of law is to be maintained there. Academics and researchers who are interested in the regulation of cyberspace will find this to be a compelling study. More broadly, it will appeal to those researching in the fields of transnational legal studies, jurisprudence and legal thought.
This book brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy, data protection and Artificial Intelligence. It is one of the results of the thirteenth annual International Conference on Computers, Privacy and Data Protection (CPDP) held in Brussels in January 2020. The development and deployment of Artificial Intelligence promises significant break-throughs in how humans use data and information to understand and interact with the world. The technology, however, also raises significant concerns. In particular, concerns are raised as to how Artificial Intelligence will impact fundamental rights. This interdisciplinary book has been written at a time when the scale and impact of data processing on society - on individuals as well as on social systems - is becoming ever starker. It discusses open issues as well as daring and prospective approaches and is an insightful resource for readers with an interest in computers, privacy and data protection. |
![]() ![]() You may like...
Maps of Meaning - The Architecture Of…
Jordan B. Peterson
Paperback
![]()
Human Genome Epidemiology, - Building…
Muin Khoury, Sara Bedrosian, …
Hardcover
R2,792
Discovery Miles 27 920
Cell-free DNA as Diagnostic Markers…
Valentina Casadio, Samanta Salvi
Hardcover
R4,594
Discovery Miles 45 940
|