![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Blockchain Technology and the Law: Opportunities and Risks is one of the first texts to offer a critical analysis of Blockchain and the legal and economic challenges faced by this new technology. This book will offer those who are unfamiliar with Blockchain an introduction as to how the technology works and will demonstrate how a legal framework that governs it can be used to ensure that it can be successfully deployed. Discussions included in this book: - an introduction to smart contracts, and their potential, from a commercial and consumer law perspective, to change the nature of transactions between parties; - the impact that Blockchain has already had on financial services, and the possible consumer risks and macro-economic issues that may arise in the future; - the challenges that are facing global securities regulators with the development of Initial Coin Offerings and the ongoing risks that they pose to the investing public; - the risk of significant privacy breaches due to the online public nature of Blockchain; and - the future of Blockchain technology. Of interest to academics, policy-makers, technology developers and legal practitioners, this book will provide a thorough examination of Blockchain technology in relation to the law from a comparative perspective with a focus on the United Kingdom, Canada and the United States.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, to electoral fraud prevention, to a wholesale decentralisation of power and the banishing of the exploitative practices of 'middlemen', blockchain stakeholders are nothing short of evangelical in their belief that it is a force for good. For these reasons and more the technology has captured the attention of entrepreneurs, venture capitalists, global corporations and governments the world over. Blockchain may indeed offer a unique technical opportunity to change cultures of transparency and trust within cyberspace, and as 'revolutionary' and 'disruptive' has the potential to shift global socioeconomic and political conventions. But as a yet largely unregulated, solutionist-driven phenomenon, blockchain exists squarely within the boundaries of capitalist logic and reason, fast becoming central to the business models of many sources of financial and political power the technology was specifically designed to undo, and increasingly allied to neoliberal strategies with scant regard for collective, political or democratic accountability in the public interest. Regulating Blockchain casts a critical eye over the technology, its 'ecosystem' of stakeholders, and offers a challenge to the prevailing discourse proclaiming it to be the great techno-social enabler of our times.
The regulation of pornography has always been a contentious issue, which has sparked wide-ranging debates surrounding the acceptability and place of pornography in society. The use of the internet to distribute and access pornography has magnified this debate and has presented a number of challenges for the law in terms of effective and proportionate regulation. Following unsuccessful attempts by states to transpose traditional laws to cyberspace, a new and radical regulatory framework eventually evolved for regulating internet pornography. In this process, the focus of the law has changed from merely controlling the publication and distribution of obscene material to a model that aims to deter private consumption of illegal content. In addition, various self- and co-regulatory initiatives have been introduced with the involvement of non-state actors, imposing a certain degree of de facto liability on intermediaries, all of which raise interesting issues. This book examines the relevant regulatory responses to internet pornography, with particular reference to the UK, but also drawing comparisons with other countries where relevant. It argues that the internet has fundamentally, and in many ways irreversibly, changed the regulation of pornography. Classifying internet pornography into three broad categories - child pornography, extreme pornography, and adult pornography - the book provides an in-depth analysis of the legal issues involved in regulating internet pornography, and argues that the notions of obscenity and indecency on their own will not provide an adequate basis for regulating online pornography. The book identifies the legitimising factors that will lend credibility and normative force to the law in order to successfully regulate pornography in cyberspace. It is the only comprehensive text that rigorously addresses the regulation of internet pornography as a whole, and offers valuable insights that will appeal to academics, students, policy makers, and those working in the areas of broader internet governance and online child protection.
This book analyses emerging constitutional principles addressing the regulation of the internet at both the national and the supranational level. These principles have arisen from cases involving the protection of fundamental rights. This is the reason why the book explores the topic thorough the lens of constitutional adjudication, developing an analysis of Courts' argumentation. The volume examines the gradual consolidation of a "constitutional core" of internet law at the supranational level. It addresses the European Court of Human Rights and the Court of Justice of the European Union case law, before going on to explore Constitutional or Supreme Courts' decisions in individual jurisdictions in Europe and the US. The contributions to the volume discuss the possibility of the "constitutionalization" of internet law, calling into question the thesis of the so-called anarchic nature of the internet.
"The data economy" is a term used by many, but properly understood by few. Even more so the concept of "big data". Both terms embody the notion of a digital world in which many transactions and data flows animate a virtual space. This is the unseen world in which technology has become the master, with the hand of the human less visible. In fact, however, it is human interaction in and around technology that makes data so pervasive and important - the ability of the human mind to extract, manipulate and shape data that gives meaning to it. This book outlines the findings and conclusions of a multidisciplinary team of data scientists, lawyers, and economists tasked with studying both the possibilities of exploiting the rich data sets made available from many human-technology interactions and the practical and legal limitations of trying to do so. It revolves around a core case study of Singapore's public transport system, using data from both the private company operating the contactless payment system (EZ-Link) and the government agency responsible for public transport infrastructure (Land Transport Authority). In analysing both the possibilities and the limitations of these data sets, the authors propose policy recommendations in terms of both the uses of large data sets and the legislation necessary to enable these uses while protecting the privacy of users.
This supplemental text on PR law is intended to be used with other mass communication textbooks. It is intended for the mass communication law course, which is a mainstay in all accredited programs in mass communication, journalism, broadcasting, telecommunications, public relations, mass media, and related curricula.
Billions of minutes a month are spent globally on social media. This raises not only serious legal issues, but also has a clear impact on everyday commercial activity. This book considers the significant legal developments that have arisen due to social media. It provides an expert explanation of the issues that practitioners and businesses need to consider, as well as the special measures that are required in order to minimise their exposure to risk. The content is highly practical, and not only explores the law related to social media, but also includes useful aids for the reader, such as flow charts, checklists and case studies. Various categories and channels of social media are covered in this book, alongside the legal classification of different social networks. Social media is also considered in the context of human rights law by evaluating the implications this has had upon the development of civil and criminal law when pursuing a civil remedy or criminal prosecution in relation to online speech. As part of these discussions the book deals specifically with the Defamation Act 2013, the Communications Act 2003, the Computer Misuse Act 1990 and the Contempt of Court Act 1988 among other key issues such as seeking Injunctions and the resulting privacy implications. Finally, the author also pays careful consideration to the commercial aspects raised by social media. The reader will find reference to key cases and regulatory guidance notes and statutes including, the Data Protection Act 1998 (including the draft Data Protection Regulation), user privacy, human rights, trading and advertising standards, special rules for FCA regulated bodies and social media insurance. This book is an invaluable guide for private practice and in-house practitioners, business professionals, academics and post-graduate students involved in the law surrounding social media.
Examining the development and design of regulatory structures in the online environment, The Regulation of Cyberspace considers current practices and suggests a regulatory model that acknowledges its complexity and how it can be used by regulators to provide a more comprehensive regulatory structure for cyberspace. Drawing on the work of cyber-regulatory theorists, such as Yochai Benkler, Andrew Shapiro and Lawrence Lessig, Murray explores and analyzes how all forms of control, including design and market controls, as well as traditional command and control regulation, are applied within the complex and flexible environment of cyberspace. It includes chapters on: the role of the cyberlawyer environmental design and control online communities cyber laws and cyber law-making. This book is an essential read for anyone interested in law and information technology.
Examining the development and design of regulatory structures in the online environment, The Regulation of Cyberspace considers current practices and suggests a regulatory model that acknowledges its complexity and how it can be used by regulators to provide a more comprehensive regulatory structure for cyberspace. Drawing on the work of cyber-regulatory theorists, such as Yochai Benkler, Andrew Shapiro and Lawrence Lessig, Murray explores and analyzes how all forms of control, including design and market controls, as well as traditional command and control regulation, are applied within the complex and flexible environment of cyberspace. It includes chapters on:
This book is an essential read for anyone interested in law and information technology.
"Communication and Law" brings together scholars from law and
communication to talk both generally and specifically about the
theoretical and methodological approaches one can use to study the
First Amendment and general communication law issues. The volume is
intended to help graduate students and scholars at all skill levels
think about new approaches to questions about communication law by
offering a survey of the multidisciplinary work that is now
available. It is designed to challenge the conventional notion that
traditional legal research and social science methodological
approaches are mutually exclusive enterprises.
The Law and Economics of Privacy, Personal Data, Artificial Intelligence, and Incomplete Monitoring presents new findings and perspectives from leading international scholars on several emerging areas issues in legal and economic research. The collection contains new theoretical papers on privacy, the protection of personal data, the use of regulatory monitoring under legal standards versus rules, a study of the properties of market efficiency in securities fraud litigation, as well as an analysis of non-exclusionary price floors. It also contains an empirical paper on the relationship between uncertainty of patent approval of artificial intelligence applications and the Supreme Court's decision in Alice Corp. v. CLS Bank International. Finally, the volume features a law-and-economics assessment of the Chinese financial system within the context of the trade-off between centralized control and rapid growth. This 30th volume of Research in Law and Economics showcases the cutting edge theoretical and empirical findings for researchers and professionals considering these complex issues intersecting law, technology, and economics.
This book includes detailed coverage of intellectual property, contract, encryption and liability issues, including allocation of domain names, use of metatags and other forms of search engine optimization, digital signatures and the position of ISPs and other intermediaries. There are case studies on electronic conveyancing and e-taxation. Though the book is written from a UK perspective, comparative material is included from other jurisdictions, including America and Singapore in particular.
This book considers a new approach to online copyright infringement. Rather than looking at the subject within a purely technological context, it provides legal analysis from a human perspective. This book highlights that there are three key instances in which the capacity of a human mind intersects with the development of copyright regulation: (1) the development of copyright statutory law; (2) the interpretation of the copyright statutory law the judiciary; and (3) human interaction with new technology. Using a novel framework for constructing digital perspectives, the author, Dr Hayleigh Bosher, analyses the laws relating to online copyright infringement. She provides insights into why the law appears as it does, shedding light on the circumstances of how it came to pass and demonstrates a clear malfunction in the interpretation and application of copyright law to online activities that derives from the disconnect between the technological and the human perspectives. The book proposes putting the human element back into copyright analysis to enable the return of reason where it has been lost, and provide a clearer, more consistent and fair legal regulation of online copyright infringement. Law, Technology and Cognition: The Human Element in Online Copyright Infringement will be of interest to students, academics, researchers, as well as practitioners.
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.
In this new textbook, social media professor Jeremy Lipschultz introduces students to the study of social media law and ethics, integrating legal concepts and ethical theories. The book explores free expression, as it applies to students, media industry professionals, content creators and audience members. Key issues and practices covered include copyright law, data privacy, revenge porn, defamation, government censorship, social media platform rules, and employer policies. Research techniques are also used to suggest future trends in social media law and ethics. Touching on themes and topics of significant contemporary relevance, this accessible textbook can be used in standalone law and ethics courses, as well as emerging social media courses that are disrupting traditional public relations, advertising and journalism curricula. Case studies, discussion questions, and online resources help students engage with the complexities and ambiguities of this future-oriented area of media law, making it an ideal textbook for students of media law, policy and ethics, mass media, and communication studies.
This clearly written and well-focused volume combines concise decisions of the primary areas of communication law with the foundational case decisions in those domains. Thus, in one volume, students of communication law, constitutional law, political science, and related fields find both the key rulings that define each area of law and a detailed summary of the legal concepts, doctrines, and policies so vital to understanding the rulings within their legal context. The text forgoes the tendency to provide encyclopedic treatment of all the relevant cases and focuses instead on the two or three cases most vital to an accurate and informed understanding of the current state of each field of communication law. The chapters provide readers with the most salient concepts and the necessary depth to understand the law while permitting most reading time to be directed to the law itself. Full-text rulings allow readers to immerse themselves in the law itself--to develop a feel for its complexity, its flexibility, and its language. Useful as a quick reference to the landmark rulings and the jurisprudence of communication law, this book also serves well as the primary text in related undergraduate courses or as a supplemental text in graduate classes in the field.
Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public. The establishment of the European Cybercrime Centre at Europol and the recent publication of guidelines on the prosecution of social media cases by the Director of Public Prosecutions serve as illustrations of the reach and impact of cybercrime related issues. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more important than ever for practitioners working in this area to stay up to date. Building on the detailed legal analysis in the first edition, this updated text remains the only comprehensive work to cover the complete lifecycle of cybercrimes, from their commission to their investigation and prosecution. With its clear and accesible structure, Computer Crimes and Digital Investigations provides essential guidance on the substantive and procedural aspects of cybercrimes for both experienced practitioners and for those new to the field. Substantial developments have occurred since the publication of the first edition of this work, in terms of the threats faced, the legislation and case law, and the response of law enforcement. The second edition will include new material on topics such as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception as well as expanded discussions of cyber security policy and laws, intermediary liability, developments in policing activities and prosecution policies, and developments in cross-border search and seizure and mutual legal assistance and extradition. An expanded comparative discussion of law and policy within the EU and under the Budapest Convention, as well as other international organisations such as the United Nations, places cybercrime in its international context.
First published in 1997, this volume explores how we live in a society which is developing beyond human experience and comprehension - fast. Advances in technology and medicine are profoundly affecting the manner of human living from the beginning through to the end of life. These advances present exciting and demanding challenges to law-makers, policy-makers and healthcare providers, who make decisions about genetics, human reproduction, competence, medical treatment priorities and dying. They also compel us to pay attention to human rights. This international collection of essays combines the thoughts and ideas of women scholars writing about these complex developments and aims at provoking debate and dissension as well as an opportunity for reflection. The writers explore a range of common themes in different areas and provide a coherent framework for law and policy-making, to serve as a foundation for the challenges ahead.
In 1952, legal scholar and historian Frederick S. Siebert published
his monumental study of three centuries of press freedom in
England, in which he enunciated and supported two propositions that
were remarkable for their simplicity. The second of the
propositions has become a guiding principle in the study of free
expression. This special issue provides a remarkable body of work
focusing on this key proposition in the context of one of today's
great tragedies--September 11, 2001. It begins with an essay
examining cycles of stability/stress and the reactions to those
cycles, followed by the application of a concept to courtroom
access issues following September 11. The last two articles provide
an account of how times of stress--the period following the events
of September 11, in particular--inhibit academic freedom and an
overview of Siebert's life and work.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it. Despite being ubiquitous, cyber technology is still seen as an enigma by many, mainly due to its rapid development and the high level of science involved. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further leads to various misconceptions and exaggerations. Cyber technology is the future, thus forcing us to understand this complex domain to survive and evolve as technological beings. To understand the enigma, the book analyzes and disentangles the issues related to cyber technology. The author unravels the threats that terrorize the cyber world and aims to decrypt its domain. It also presents the existing reality of cyber environment in India and charts out a few recommendations for enhancing the country's cyber security architecture. Further, the book delves into detailed analysis of various issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of countries like the US and China. Please note: Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka
The Internet has created a formidable challenge for human rights law and practice worldwide. International scholarly and policy-oriented communities have so far established a consensus regarding only one main aspect - human rights in the internet are the same as offline. There are emerging and ongoing debates regarding not only the standards and methods to be used for achieving the "sameness" of rights online, but also whether "classical" human rights as we know them are contested by the online environment. The internet itself, in view of its cross-border nature and its ability to affect various areas of law, requires adopting an internationally oriented approach and a perspective strongly focused on social sciences. In particular, the rise of the internet, enhanced also by the influence of new technologies such as algorithms and intelligent artificial systems, has influenced individuals' civil, political and social rights not only in the digital world, but also in the atomic realm. As the coming of the internet calls into question well-established legal categories, a broader perspective than the domestic one is necessary to investigate this phenomenon. This book explores the main fundamental issues and practical dimensions related to the safeguarding of human rights in the internet, which are at the focus of current academic debates. It provides a comprehensive analysis with a forward-looking perspective of bringing order into the somewhat chaotic online dimension of human rights. It addresses the matter of private digital censorship, the apparent inefficiency of existing judicial systems to react to human rights violations online, the uncertainty of liability for online human rights violations, whether the concern with personal data protection overshadows multiple other human rights issues online and will be of value to those interested in human rights law and legal regulation of the internet.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
Tinker. R.A.V. Ollman. Hustler-Falwell. Reno-ACLU. Nebraska Press
Association. These names are synonymous with contemporary First
Amendment litigation. To explore these landmark cases more deeply,
author Joseph Russomanno interviewed the people at the core of
these and other influential First Amendment cases, and he presents
their stories here in a personal, in-depth oral history of First
Amendment law. Previously unavailable in other literature, these
stories go beyond the "what" of the cases and answer the "why" and
"how" of ten major cases from the latter part of the 20th century.
Through their own words and photographs, plaintiffs, defendants,
and their attorneys describe what it was like to be involved in the
development of these historic First Amendment cases.
Economic regulation in the telecommunications sector can be performed through economy-wide instruments, such as antitrust law and antitrust authorities, or through sector-specific instruments, such as telecommunications regulation and regulatory authorities. Relying on a comparative analysis of five countries, the present book seeks to shed some light on the respective roles of both types of instruments in liberalized telecommunications markets. |
![]() ![]() You may like...
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay
Hardcover
R3,500
Discovery Miles 35 000
Cyberlaw @ SA - The Law of the Internet…
S. Papadopoulos, S. Snail ka Mtuze
Paperback
R1,126
Discovery Miles 11 260
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,724
Discovery Miles 37 240
Research Handbook on Information Law and…
Sharon K. Sandeen, Christoph Rademacher, …
Hardcover
R5,670
Discovery Miles 56 700
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R776
Discovery Miles 7 760
|