![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This book considers the rapidly evolving, both legally and socially, nature of image-based abuse, for both minors and adults. Drawing mainly from UK data, legislation and case studies, it presents a thesis that the law is, at best, struggling to keep up with some fundamental issues around image based abuse, such as the sexual nature of the crimes and the long term impact on victims, and at worst, in the case of supporting minors, not fit for purpose. It shows, through empirical and legislative analysis, that the dearth of education around this topic, coupled with cultural norms, creates a victim blaming culture that extends into adulthood. It proposes both legislative developments and need for wider stakeholder engagement to understand and support victims, and the impact the non-consensual sharing of intimate images can have on their long-term mental health and life in general. The book is of interest to scholar of law, criminology, sociology, police and socio-technical studies, and is also to those who practice law, law enforcement or wider social care role in both child and adult safeguarding.
Increasingly digital technologies are used in healthcare. This book explores eight digital health technologies, situated the context of a life span, from high-throughput genomic sequencing technologies and do-it-yourself (DIY) insulin delivery for diabetes management in paediatrics, to the use of robotic care assistants for older adults and digital advance care decisions. A scene-setting case scenario at the start of each chapter describes the digital technology and identifies the sometimes competing interests of the key stakeholders. Broad themes of resource allocation, access to technologies, informed consent, privacy of health data and ethical concerns are considered in context, alongside analysis of legal duties owed by healthcare professionals to act in their patients' best interests. This book addresses legal and ethical issues arising from the use of emerging digital health technologies and is of interest to academics, clinicians and regulators and anyone interested in the development of health technologies and the challenges they may present. It focusses on the Australian legal framework, with some comparison to other jurisdictions.
Internet of Things and the Law: Legal Strategies for Consumer-Centric Smart Technologies is the most comprehensive and up-to-date analysis of the legal issues in the Internet of Things (IoT). For decades, the decreasing importance of tangible wealth and power - and the increasing significance of their disembodied counterparts - has been the subject of much legal research. For some time now, legal scholars have grappled with how laws drafted for tangible property and predigital 'offline' technologies can cope with dematerialisation, digitalisation, and the internet. As dematerialisation continues, this book aims to illuminate the opposite movement: rematerialisation, namely, the return of data, knowledge, and power within a physical 'smart' world. This development frames the book's central question: can the law steer rematerialisation in a human-centric and socially just direction? To answer it, the book focuses on the IoT, the sociotechnological phenomenon that is primarily responsible for this shift. After a thorough analysis of how existing laws can be interpreted to empower IoT end users, Noto La Diega leaves us with the fundamental question of what happens when the law fails us and concludes with a call for collective resistance against 'smart' capitalism.
This work argues that current cryptocurrency regulation, particularly in the areas of enforcement and compliance, is inadequate. It proposes reflexive regulation as an alternative approach. This book provides strategies for a reflexive regulation approach to cryptocurrencies, developed through the identification of the internal self-regulatory mechanisms of the cryptocurrency system. Apportioning blame for current problems to the regulators' failure to take into account the inherent technical features of cryptocurrencies, the work promotes reflexive regulation in which the law acts at a subsystem-specific level to install, correct, and redefine democratic self-regulatory mechanisms. It provides strategies for this approach, developed through the identification of the internal self-regulatory mechanisms of the cryptocurrency system. These are identified as imbedded in the technical functionality of computer code and consensus-based distributive governance mechanisms respectively. In addition to providing a technical, historical and legal overview of cryptocurrencies, the book concludes by providing recommendations aimed at redirecting code and consensus towards achieving regulatory goals. In this way, it draws from the theory of reflexive law, in order to provide both a substantive and jurisprudential perspective on the regulation of cryptocurrencies and to illustrate how Financial Technology (Fintech) regulation can only be effective once regulators consider both the 'Fin' and the 'tech' in their regulatory approaches. The book will be of interest to researchers, academics and policy-makers working in the areas of Financial Regulation and Jurisprudence, Financial Crime, Banking Regulation, Information Systems, and Information Technology.
In the context of the technological disruption of law and, in particular, the prospect of governance by machines, this book reconsiders the demand that we should respect the law, simply because it is the law. What does 'the law' need to look like to justify our respect? Responding to this question, the book takes the form of a dialectic between, on the one side, the promise of the prospectus for law and, on the other, the discontent provoked by the performance of law in practice; this is followed by a synthesis. Four pictures of law are considered: two are traditional pictures - law as order and law as just order; and two are prompted by the technological disruption of law - law as governance by machines and law as self-governance by humans. These pictures are tested in five performance areas: contract law, criminal law, biolaw, information law, and constitutional law. The synthesis, revealing the complexity of the demand for respect, highlights three particular points. First, the only prospectus for law that clearly commands respect is one that is committed to protecting the global commons (the preconditions for humans to form their own communities with their own forms of governance); second, any form of governance by humans will invite reservations and push-back against the demand for respect; and, third, governance by machines is not so much a superior form of governance as a radically different form in which questions about respect are redundant. This book will appeal to scholars and students with interests in the broad and burgeoning field of law, regulation and technology, as well as to legal theorists, practitioners, and others interested in the impact of new technology on law.
In the context of the technological disruption of law and, in particular, the prospect of governance by machines, this book reconsiders the demand that we should respect the law, simply because it is the law. What does 'the law' need to look like to justify our respect? Responding to this question, the book takes the form of a dialectic between, on the one side, the promise of the prospectus for law and, on the other, the discontent provoked by the performance of law in practice; this is followed by a synthesis. Four pictures of law are considered: two are traditional pictures - law as order and law as just order; and two are prompted by the technological disruption of law - law as governance by machines and law as self-governance by humans. These pictures are tested in five performance areas: contract law, criminal law, biolaw, information law, and constitutional law. The synthesis, revealing the complexity of the demand for respect, highlights three particular points. First, the only prospectus for law that clearly commands respect is one that is committed to protecting the global commons (the preconditions for humans to form their own communities with their own forms of governance); second, any form of governance by humans will invite reservations and push-back against the demand for respect; and, third, governance by machines is not so much a superior form of governance as a radically different form in which questions about respect are redundant. This book will appeal to scholars and students with interests in the broad and burgeoning field of law, regulation and technology, as well as to legal theorists, practitioners, and others interested in the impact of new technology on law.
Through a comparison of the telecommunications sectors in four small EU-countries, an outstanding cast of contributors explore how regulatory authorities at international, EU-, national and regional level within and between sectors coordinate their regulatory decisions in order to provide coherent regulation of markets.
This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.
Class actions in privacy law are rapidly growing as a legal vehicle for citizens around the world to hold corporations liable for privacy violations. Current and future developments in these class actions stand to shift the corporate liability landscape for companies that interact with people's personal information. Privacy class actions are at the intersection of civil litigation, privacy law, and data protection. Developments in privacy class actions raise complex issues of substantive law as well as challenges to the established procedures governing class action litigation. Their outcomes are integral to the evolution of privacy law and data protection law across jurisdictions. This book brings together established scholars in privacy law, data protection law, and collective litigation to offer a detailed perspective on the present and future of collective litigation for privacy claims. Taking a comparative approach, this book incorporates considerations from consumer protection law, procedural law, cross-border litigation, tort law, and data protection law, which are key to understanding the development of privacy class actions. In doing so, it offers an analysis of the novel challenges they pose for courts, regulatory agencies, scholars, and litigators, together with their potential solutions.
This book identifies and explains the different national approaches to data protection - the legal regulation of the collection, storage, transmission and use of information concerning identified or identifiable individuals - and determines the extent to which they could be harmonised in the foreseeable future. In recent years, data protection has become a major concern in many countries, as well as at supranational and international levels. In fact, the emergence of computing technologies that allow lower-cost processing of increasing amounts of information, associated with the advent and exponential use of the Internet and other communication networks and the widespread liberalization of the trans-border flow of information have enabled the large-scale collection and processing of personal data, not only for scientific or commercial uses, but also for political uses. A growing number of governmental and private organizations now possess and use data processing in order to determine, predict and influence individual behavior in all fields of human activity. This inevitably entails new risks, from the perspective of individual privacy, but also other fundamental rights, such as the right not to be discriminated against, fair competition between commercial enterprises and the proper functioning of democratic institutions. These phenomena have not been ignored from a legal point of view: at the national, supranational and international levels, an increasing number of regulatory instruments - including the European Union's General Data Protection Regulation applicable as of 25 May 2018 - have been adopted with the purpose of preventing personal data misuse. Nevertheless, distinct national approaches still prevail in this domain, notably those that separate the comprehensive and detailed protective rules adopted in Europe since the 1995 Directive on the processing of personal data from the more fragmented and liberal attitude of American courts and legislators in this respect. In a globalized world, in which personal data can instantly circulate and be used simultaneously in communications networks that are ubiquitous by nature, these different national and regional approaches are a major source of legal conflict.
In the information society, electronic intrusion has become a new form of trespassing often causing significant problems and posing great risks for individuals and businesses. ""Socioeconomic and Legal Implications of Electronic Intrusion"" focuses on abusive and illegal practices of penetration in the sphere of private communications. A leading international reference source within the field, this book provides legal and political practitioners, academicians, and intrusion researchers with expert knowledge into global theft and spam perspectives, identity theft and fraud, and electronic crime issues.
Scientific research is fundamental to addressing issues of great importance to the development of human knowledge. Scientific research fuels advances in medicine, technology and other areas important to society and has to be credible, trustworthy and able to command confidence in the face of inevitable uncertainties. Scientific researchers must be trusted and respected when they engage with knowledge acquisition and dissemination and as ethical guardians in their education and training roles of future generations of researchers. The core values of scientific research transcend disciplinary and national boundaries and approaches to the organisation and oversight of research systems can impact significantly upon the ethics and conduct of researchers. This book draws upon legal expertise to critically analyse issues of regulation, conduct and ethics at the important interface between scientific research and regulatory and legal environments. In so doing it aims to contribute important additional perspectives to the existing literature. Case studies are engaged with to assist with the critical analysis of the current position and the consideration of future possibilities. The book will be of interest to academics in the fields of science, law and policy; science and law students; and scientific researchers at more advanced stages of their careers. Research professionals in government and the private sector and legal practitioners with interests in the regulation of research should also find the work of interest.
This handbook provides a comprehensive treatise of the concepts and nature of technology-facilitated gendered violence and abuse, as well as legal, community and activist responses to these harms. It offers an inclusive and intersectional treatment of gendered violence including that experienced by gender, sexuality and racially diverse victim-survivors. It examines the types of gendered violence facilitated by technologies but also responses to these harms from the perspectives of victim advocates, legal analyses, organisational and community responses, as well as activism within civil society. It is unique in its recognition of the intersecting drivers of inequality and marginalisation including misogyny, racism, colonialism and homophobia. It draws together the expertise of a range of established and globally renowned scholars in the field, as well as survivor-advocate-scholars and emerging scholars, lending a combination of credibility, rigor, currency, and innovation throughout. This handbook further provides recommendations for policy and practice and will appeal to academics and students in Criminology, Criminal Justice, Law, Socio-Legal Studies, Politics, as well as Women's and/or Gender Studies.
In 1918 a young Carl Schmitt published a short satirical fiction entitled The Buribunks. He imagined a future society of beings who consistently wrote and disseminated their personal diaries. Schmitt would go on to become the infamous philosopher of the exception and for a while the 'Crown Jurist of the Third Reich'. The Buribunks - ironically for beings that lived only for self-memorialisation - has been mostly lost to history. However, the digital realm, with its emphasis on the informatic traces generated by human doing, and the continual interest in Schmitt's work to explain and criticise contemporary constellations of power, suggests that The Buribunks is a text whose epoch has come. This volume includes the first full translation into English of The Buribunks and a selection of critical essays on the text, its meanings in the digital present, its playing with and criticism of the literary form, and its place within Schmitt's life and work. The Buribunks and the essays provide a complex, critical and provocative invitation to reimagine the relations between the human and their imprint and legacy within archives and repositories. There is a fundamental exploration of what it means to be a being intensely aware of 'writing itself'. This is not just a volume for critical lawyers, literary scholars and the Schmitt literati. It is a volume that challenges a broad range of disciplines, from philosophy to critical data studies, to reflect on the digital present and its assembled and curated beings. It is a volume that provides a set of fantastically located concepts, images and histories that traverse ideas and practices, play and politics, power and possibility.
This book analyses the phenomenon of digitally mediated property and considers how it problematises the boundary between human and nonhuman actors. The book addresses the increasingly porous border between personhood and property in digitized settings and considers how the increased commodification of knowledge makes visible a rupture in the liberal concept of the property owning, free, person. Engaging with the latest work in posthumanist and new materialist theory, it shows, how property as a concept as well as a means for control, changes fundamentally under advanced capitalism. Such change is exemplified by the way in which data, as an object of commodification, is extracted from human activities yet is also directly used to affectively control - or nudge - humans. Taking up a range of human engagements with digital platforms and coded architectures, as well as the circulation of affects through practices of artificial intelligence that are employed to shape behaviour, the book argues that property now needs to be understood according to an ecology of human as well as nonhuman actors. The idea of posthuman property, then, offers both a means to critique property control through digital technologies, as well as to move beyond the notion of the self-owning, object-owning, human. Engaging the most challenging contemporary technological developments, this book will appeal to researchers in the areas of Law and Technology, Legal Theory, Intellectual Property Law, Legal Philosophy, Sociology of Law, Sociology, and Media Studies.
This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called 'EU-cookie law' and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.
Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.
This book examines the challenges posed to Australian copyright law by streaming, from the end-user perspective. It compares the Australian position with the European Union and United States to draw lessons from them, regarding how they have dealt with streaming and copyright. By critically examining the technological functionality of streaming and the failure of copyright enforcement against the masses, it argues for strengthening end-user rights. The rising popularity of streaming has resulted in a revolutionary change to how digital content, such as sound recordings, cinematographic films, and radio and television broadcasts, is used on the internet. Superseding the conventional method of downloading, using streaming to access digital content has challenged copyright law, because it is not clear whether end-user acts of streaming constitute copyright infringement. These prevailing grey areas between copyright and streaming often make end-users feel doubtful about accessing digital content through streaming. It is uncertain whether exercising the right of reproduction is appropriately suited for streaming, given the ambiguities of "embodiment" and scope of "substantial part". Conversely, the fair dealing defence in Australia cannot be used aptly to defend end-users' acts of streaming digital content, because end-users who use streaming to access digital content can rarely rely on the defence of fair dealing for the purposes of criticism or review, news reporting, parody or satire, or research or study. When considering a temporary copy exception, end-users are at risk of being held liable for infringement when using streaming to access a website that contains infringing digital content, even if they lack any knowledge about the content's infringing nature. Moreover, the grey areas in circumventing geo-blocking have made end-users hesitant to access websites through streaming because it is not clear whether technological protection measures apply to geo-blocking. End-users have a severe lack of knowledge about whether they can use circumvention methods, such as virtual private networks, to access streaming websites without being held liable for copyright infringement. Despite the intricacies between copyright and access to digital content, the recently implemented website-blocking laws have emboldened copyright owners while suppressing end-users' access to digital content. This is because the principles of proportionality and public interest have been given less attention when determining website-blocking injunctions.
The Internet is not an unchartered territory. On the Internet, norms matter. They interact, regulate, are contested and legitimated by multiple actors. But are they diverse and unstructured, or are they part of a recognizable order? And if the latter, what does this order look like? This collected volume explores these key questions while providing new perspectives on the role of law in times of digitality. The book compares six different areas of law that have been particularly exposed to global digitality, namely laws regulating consumer contracts, data protection, the media, financial markets, criminal activity and intellectual property law. By comparing how these very different areas of law have evolved with regard to cross-border online situations, the book considers whether cyberlaw is little more than "the law of the horse", or whether the law of global digitality is indeed special and, if so, what its characteristics across various areas of law are. The book brings together legal academics with expertise in how law has both reacted to and shaped cross-border, global Internet communication and their contributions consider whether it is possible to identify a particular mediality of law in the digital age. Examining whether a global law of digitality has truly emerged, this book will appeal to academics, students and practitioners of law examining the future of the law of digitality as it intersects with traditional categories of law.
This handbook provides an overview of research related to smart technologies and how they permeate the economic and social fabric. It covers a wide spectrum of topics and issues raised in the debate surrounding the increasing importance of smart technologies. It takes on a strongly multi- and interdisciplinary perspective, providing readers from different backgrounds and with varying knowledge of this topic with a comprehensive and comprehensible overview of the main upcoming technological trends from a scientifically eclectic viewpoint. This handbook draws together an international team of researchers from different scientific disciplines. The list of contributors comprises authors from Europe, North America, Australia and South Korea, and includes both internationally outstanding scientists and experts from a more policy-related and/or industry-related background.
Although Europe has a significant legal data protection framework, built up around EU Directive 95/46/EC and the Charter of Fundamental Rights, the question of whether data protection and its legal framework are 'in good health' is increasingly being posed. Advanced technologies raise fundamental issues regarding key concepts of data protection. Falling storage prices, increasing chips performance, the fact that technology is becoming increasingly embedded and ubiquitous, the convergence of technologies and other technological developments are broadening the scope and possibilities of applications rapidly. Society however, is also changing, affecting the privacy and data protection landscape. The 'demand' for free services, security, convenience, governance, etc, changes the mindsets of all the stakeholders involved. Privacy is being proclaimed dead or at least worthy of dying by the captains of industry; governments and policy makers are having to manoeuvre between competing and incompatible aims; and citizens and customers are considered to be indifferent. In the year in which the plans for the revision of the Data Protection Directive will be revealed, the current volume brings together a number of chapters highlighting issues, describing and discussing practices, and offering conceptual analysis of core concepts within the domain of privacy and data protection. The book's first part focuses on surveillance, profiling and prediction; the second on regulation, enforcement, and security; and the third on some of the fundamental concepts in the area of privacy and data protection. Reading the various chapters it appears that the 'patient' needs to be cured of quite some weak spots, illnesses and malformations. European data protection is at a turning point and the new challenges are not only accentuating the existing flaws and the anticipated difficulties, but also, more positively, the merits and the need for strong and accurate data protection practices and rules in Europe, and elsewhere.
This book includes detailed coverage of intellectual property, contract, encryption and liability issues, including allocation of domain names, use of metatags and other forms of search engine optimization, digital signatures and the position of ISPs and other intermediaries. There are case studies on electronic conveyancing and e-taxation. Though the book is written from a UK perspective, comparative material is included from other jurisdictions, including America and Singapore in particular.
Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics. The output of computational models is directly tied not only to their inputs but to the relationships and assumptions embedded in their model design, many of which are of a social and cultural, rather than physical and mathematical, nature. How do human biases make their way into these data models, and what new strategies have been proposed to overcome bias in computed products? Scholars and students from many backgrounds, as well as policy makers, journalists, and the general reading public will find a multidisciplinary approach to inquiry into algorithmic bias encompassing research from Communication, Art, and New Media.
Legal Data and Information in Practice provides readers with an understanding of how to facilitate the acquisition, management, and use of legal data in organizations such as libraries, courts, governments, universities, and start-ups. Presenting a synthesis of information about legal data that will furnish readers with a thorough understanding of the topic, the book also explains why it is becoming crucial that data analysis be integrated into decision-making in the legal space. Legal organizations are looking at how to develop data-driven insights for a variety of purposes and it is, as Sutherland shows, vital that they have the necessary skills to facilitate this work. This book will assist in this endeavour by providing an international perspective on the issues affecting access to legal data and clearly describing methods of obtaining and evaluating it. Sutherland also incorporates advice about how to critically approach data analysis. Legal Data and Information in Practice will be essential reading for those in the law library community who are based in English-speaking countries with a common law tradition. The book will also be useful to those with a general interest in legal data, including students, academics engaged in the study of information science and law.
This book deals comprehensively with the question of the scope of copyright protection for computer programs. Offering a unique blend of scholarship, technical rigor, and readability, it dispels the confusion and controversy that surround the application of copyright law to computer programs. Through an orderly development of facts and analysis it shows why the copyright law is the appropriate regime for software protection and explains the nature of copyright protection for software. Alternating between essay format and case study, the book provides expert counsel to those interested in this interface between technology and law. "Software, Copyright, and Competition: The Look and Feel' of the LaW," is undoubtedly one of the best pieces of legal scholarship in any subject this editor has ever had the pleasure to read. As to its subject matter, it is the best analysis of look and feel' written to date. . . . The book is very readable. Not only does the author explain' the law for the non-lawyer, but he explains the zen' of computer programming to the non-programmer. With wit and insight he puts to rest the many old wives tales the legal community believes about programmers. . . . In the best of all possible worlds, this book would be mandatory reading for any judge or arbitrator faced with a look and feel' case. "The Software Law Bulletin," January 1990 Two forces, innovation and imitation, fuel the intense competition that underlies the dramatic technological progress taking place in the computer industry. As the competitive battleground shifts increasingly to the software sector, a vigorous debate has arisen over whether the principal legal regime for protecting the asset value of computer programs--the copyright law--encourages or inhibits that competition. Industry executives, computer lawyers, law professors and lawmakers alike are participating in the debate, the outcome of which will quite literally shape the future of the computer industry. This book deals comprehensively with the question of the scope of copyright protection for computer programs. Offering a unique blend of scholarship, technical rigor, and readability, it dispels the confusion and controversy that surround the application of copyright law to computer programs. Through an orderly development of facts and analysis it shows why the copyright law is the appropriate regime for software protection and explains the nature of copyright protection for software. Alternating between essay format and case study, the book provides expert counsel to those interested in this interface between technology and law. |
You may like...
Legal Challenges of Big Data
Joe Cannataci, Valeria Falce, …
Hardcover
R3,652
Discovery Miles 36 520
Digital Justice - Technology and the…
Ethan Katsh, Orna Rabinovich-Einy
Hardcover
R2,990
Discovery Miles 29 900
Tugendhat and Christie: The Law of…
Nicole Moreham, Mark Warby
Hardcover
R16,085
Discovery Miles 160 850
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R762
Discovery Miles 7 620
Blockchain and Public Law - Global…
Oreste Pollicino, Giovanni De Gregorio
Hardcover
R3,003
Discovery Miles 30 030
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay
Hardcover
R3,428
Discovery Miles 34 280
|