![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Legal Data and Information in Practice provides readers with an understanding of how to facilitate the acquisition, management, and use of legal data in organizations such as libraries, courts, governments, universities, and start-ups. Presenting a synthesis of information about legal data that will furnish readers with a thorough understanding of the topic, the book also explains why it is becoming crucial that data analysis be integrated into decision-making in the legal space. Legal organizations are looking at how to develop data-driven insights for a variety of purposes and it is, as Sutherland shows, vital that they have the necessary skills to facilitate this work. This book will assist in this endeavour by providing an international perspective on the issues affecting access to legal data and clearly describing methods of obtaining and evaluating it. Sutherland also incorporates advice about how to critically approach data analysis. Legal Data and Information in Practice will be essential reading for those in the law library community who are based in English-speaking countries with a common law tradition. The book will also be useful to those with a general interest in legal data, including students, academics engaged in the study of information science and law.
This book deals comprehensively with the question of the scope of copyright protection for computer programs. Offering a unique blend of scholarship, technical rigor, and readability, it dispels the confusion and controversy that surround the application of copyright law to computer programs. Through an orderly development of facts and analysis it shows why the copyright law is the appropriate regime for software protection and explains the nature of copyright protection for software. Alternating between essay format and case study, the book provides expert counsel to those interested in this interface between technology and law. "Software, Copyright, and Competition: The Look and Feel' of the LaW," is undoubtedly one of the best pieces of legal scholarship in any subject this editor has ever had the pleasure to read. As to its subject matter, it is the best analysis of look and feel' written to date. . . . The book is very readable. Not only does the author explain' the law for the non-lawyer, but he explains the zen' of computer programming to the non-programmer. With wit and insight he puts to rest the many old wives tales the legal community believes about programmers. . . . In the best of all possible worlds, this book would be mandatory reading for any judge or arbitrator faced with a look and feel' case. "The Software Law Bulletin," January 1990 Two forces, innovation and imitation, fuel the intense competition that underlies the dramatic technological progress taking place in the computer industry. As the competitive battleground shifts increasingly to the software sector, a vigorous debate has arisen over whether the principal legal regime for protecting the asset value of computer programs--the copyright law--encourages or inhibits that competition. Industry executives, computer lawyers, law professors and lawmakers alike are participating in the debate, the outcome of which will quite literally shape the future of the computer industry. This book deals comprehensively with the question of the scope of copyright protection for computer programs. Offering a unique blend of scholarship, technical rigor, and readability, it dispels the confusion and controversy that surround the application of copyright law to computer programs. Through an orderly development of facts and analysis it shows why the copyright law is the appropriate regime for software protection and explains the nature of copyright protection for software. Alternating between essay format and case study, the book provides expert counsel to those interested in this interface between technology and law.
This book focuses on the right to privacy in the digital age with a view to see how it is implemented across the globe in different jurisdictions. The right to privacy is one of the rights enshrined in international human rights law. It has been a topic of interest for both academic and non-academic audiences around the world. However, with the increasing digitalisation of modern life, protecting one's privacy has become more complicated. Both state and non-state organisations make frequent interventions in citizens' private lives. This edited volume aims to provide an overview of recent development pertaining to the protection of the right to privacy in the different judicial systems such as the European, South Asian, African and Inter-American legal systems. The chapters in this book were originally published as a special issue of The International Journal of Human Rights.
As the threats posed by organised crime and terrorism persist, law enforcement authorities remain under pressure to suppress the movement, or flows, of people and objects that are deemed dangerous. This collection provides a broad overview of the challenges and trends of the policing of flows. How these threats are constructed and addressed by governments and law enforcement agencies is the unifying thread of the book. The concept of flows is interpreted broadly so as to include the trafficking of illicit substances, trade in antiquities, and legal and illegal migration, including cross-border travel by members of organised crime groups or 'foreign fighters'. The book focuses especially on the responses of governments and law enforcement agencies to the changing nature and intensity of flows. The contributors comprise a mix of lawyers, sociologists, historians and criminologists who address both formal legal and practical, on-the-ground approaches to the policing of flows. The volume invites reflection on whether the existing tool kit of governments and law enforcement agencies is adequate in this changing environment and how it could be modernised, for example, by increased reliance on technology or by reappraising the role of the private sector. As such, the book will be useful not only for academics and practitioners who work on security-related matters, but also more generally to those who are interested in what the near-term future of policing is likely to look like and how the balance between law enforcement on the one hand and human rights and civil liberties on the other can be achieved.
Artificial Intelligence (AI) has augmented human activities and unlocked opportunities for many sectors of the economy. It is used for data management and analysis, decision making, and many other aspects. As with most rapidly advancing technologies, law is often playing a catch up role so the study of how law interacts with AI is more critical now than ever before. This book provides a detailed qualitative exploration into regulatory aspects of AI in industry. Offering a unique focus on current practice and existing trends in a wide range of industries where AI plays an increasingly important role, the work contains legal and technical analysis performed by 15 researchers and practitioners from different institutions around the world to provide an overview of how AI is being used and regulated across a wide range of sectors, including aviation, energy, government, healthcare, legal, maritime, military, music, and others. It addresses the broad range of aspects, including privacy, liability, transparency, justice, and others, from the perspective of different jurisdictions. Including a discussion of the role of AI in industry during the Covid-19 pandemic, the chapters also offer a set of recommendations for optimal regulatory interventions. Therefore, this book will be of interest to academics, students and practitioners interested in technological and regulatory aspects of AI.
Exploring the evolution of the right to be forgotten, its challenges, and impacts on privacy, reputation, and online expression, this book lays out the current state of the law on the right to be forgotten in Canada and in the international context while addressing the broader theoretical tensions at the core of the right to be forgotten.
This book considers a new approach to online copyright infringement. Rather than looking at the subject within a purely technological context, it provides legal analysis from a human perspective. This book highlights that there are three key instances in which the capacity of a human mind intersects with the development of copyright regulation: (1) the development of copyright statutory law; (2) the interpretation of the copyright statutory law the judiciary; and (3) human interaction with new technology. Using a novel framework for constructing digital perspectives, the author, Dr Hayleigh Bosher, analyses the laws relating to online copyright infringement. She provides insights into why the law appears as it does, shedding light on the circumstances of how it came to pass and demonstrates a clear malfunction in the interpretation and application of copyright law to online activities that derives from the disconnect between the technological and the human perspectives. The book proposes putting the human element back into copyright analysis to enable the return of reason where it has been lost, and provide a clearer, more consistent and fair legal regulation of online copyright infringement. Law, Technology and Cognition: The Human Element in Online Copyright Infringement will be of interest to students, academics, researchers, as well as practitioners.
Using the UK as a case study the book aims to provide a detailed rationale for the tension between a policy perspective that tries to provide protection for victims of such practices through legislation and the need to better understand a phenomenon that constantly evolves as a result of new technology, disruptive adoption and social norms.
Beyond identifying and characterising the particular types of risk and liability that may arise in decentralised digital economies, this book suggests safeguards for different types of distributed networks. It explores relationships between people and will be of interest to academics, practitioners, and students.
This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.
Legal problems abound in the information society. Electronic commerce, copyright, privacy, illegal and harmful content, taxes, wiretapping governments face an enormous challenge to meet the advent of the Internet and ICT with a flexible, up-to-date, and adequate legal framework. Yet one aspect makes this challenge even more daunting: internationalization. Law is still to a great extent based on nation states, but the information society is above all a borderless and global society. Territoriality and national sovereignty clash with the need for a global approach to address ICT-law issues. Should states leave everything to the global market, or should they intervene to protect vital national interests? If they create regulations, should these reflect the rules of the physical world? How can one enforce national rules in a world where acts take place somewhere in Cyberspace? This text presents the positions on these issues of the governments of the Netherlands, Germany, France, the UK, and the US, as well as of international organisations. How do they think about co-regulation, law enforcement, harmonization, international co-operation, and alternative dispute resolution? How do they deal with applicable law and online contracts, privacy, international liability of Internet providers, and electronic signatures? What are the implications of the European Electronic Commerce Directive and the draft Crime in Cyberspace convention? Any legal framework that is to fit the global information society must take into account internationalization. This volume shows to what extent governments are meeting this challenge.
The ideal of an inclusive and participatory Internet has been undermined by the rise of misogynistic abuse on social media platforms. However, limited progress has been made at national - and to an extent European - levels in addressing this issue. In England and Wales, the tackling of underlying causes of online abuse has been overlooked because the law focuses on punishment rather than measures to prevent such abuses. Furthermore, online abuse has a significant impact on its victims that is underestimated by policymakers. This volume critically analyses the legal provisions that are currently deployed to tackle forms of online misogyny, and focuses on three aspects; firstly, the phenomenon of social media abuse; secondly, the poor and disparate legal responses to social media abuses; and thirdly, the similar failings of hate crime to tackle problems of online gender-based abuses. This book advances a compelling argument for legal changes to the existing hate crime, and communications legislation.
Combines academic rigour with case studies and activities designed to aid learning Suitable for courses both in the UK and internationally, and it uses international examples
A must have book on how GDPR is actively working in the privacy, compliance and technology space. Gain a clear understanding of GDPR requirements and recognise opportunities to reshape your data privacy compliance programs. Learn unique techniques to avoid GDPR non-compliance in the third and fourth industrial revolution era. A practical guide to providing great insights on data privacy challenges and compliance with invaluable practical approaches. Demonstrates data privacy legislation differences and similarities in multi-jurisdictions and how to man oeuvre the minefield of privacy successfully.
As a social process that places great stock in its stability and predictability, law does not deal easily or well with change. In a modern world that is in a constant and rapid state of flux, law is being placed under considerable stress in its efforts to fulfill its task as a primary regulator of social and economic behaviour. This challenge is particularly acute in the realm of technology and its profound ramifications for social and economic behaviour. The innovative Techno-Age not only offers fresh ways of handling old problems, but also throws up entirely new problems; traditional ways of thinking about and responding to these old and new problems and their optimal resolution are no longer as tenable as many once thought. One such example is the burgeoning world of cryptocurrencies - this peer-to-peer digital network presents a profound challenge to the status quo of the financial services sector, to the established modes of state-backed fiat currency, and to the regulatory authority and reach of law. Taken together, these related challenges demand the urgent attention of jurists, lawyers and law reformers. It is the future and relevance of legal regulation as much as cryptocurrency that is at stake. This book proposes an approach to regulating cryptocurrency that recognises and retains its innovative and transformative potential, but also identifies and deals with some of its less appealing qualities and implications.
In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated. The rise of big data analytics in the political process has triggered official investigations in many countries around the world, and become the subject of broad and intense debate. Political parties increasingly rely on data analytics to profile the electorate and to target specific voter groups with individualised messages based on their demographic attributes. Political micro-targeting has become a major factor in modern campaigning, because of its potential to influence opinions, to mobilise supporters and to get out votes. The book explores the legal, philosophical and political dimensions of big data analytics in the electoral process. It demonstrates that the unregulated use of big personal data for political purposes not only infringes voters' privacy rights, but also has the potential to jeopardise the future of the democratic process, and proposes reforms to address the key regulatory and ethical questions arising from the mining, use and storage of massive amounts of voter data. Providing an interdisciplinary assessment of the use and regulation of big data in the political process, this book will appeal to scholars from law, political science, political philosophy and media studies, policy makers and anyone who cares about democracy in the age of data-driven political campaigning.
Islamic State's Online Activity and Responses provides a unique examination of Islamic State's online activity at the peak of its "golden age" between 2014 and 2017 and evaluates some of the principal responses to this phenomenon. Featuring contributions from experts across a range of disciplines, the volume examines a variety of aspects of IS's online activity, including their strategic objectives, the content and nature of their magazines and videos, and their online targeting of females and depiction of children. It also details and analyses responses to IS's online activity - from content moderation and account suspensions to informal counter-messaging and disrupting terrorist financing - and explores the possible impact of technological developments, such as decentralised and peer-to-peer networks, going forward. Platforms discussed include dedicated jihadi forums, major social media sites such as Facebook, Twitter, and YouTube, and newer services, including Twister. Islamic State's Online Activity and Responses is essential reading for researchers, students, policymakers, and all those interested in the contemporary challenges posed by online terrorist propaganda and radicalisation. The chapters were originally published as a special issue of Studies in Conflict & Terrorism.
In this new textbook, social media professor Jeremy Lipschultz introduces students to the study of social media law and ethics, integrating legal concepts and ethical theories. The book explores free expression, as it applies to students, media industry professionals, content creators and audience members. Key issues and practices covered include copyright law, data privacy, revenge porn, defamation, government censorship, social media platform rules, and employer policies. Research techniques are also used to suggest future trends in social media law and ethics. Touching on themes and topics of significant contemporary relevance, this accessible textbook can be used in standalone law and ethics courses, as well as emerging social media courses that are disrupting traditional public relations, advertising and journalism curricula. Case studies, discussion questions, and online resources help students engage with the complexities and ambiguities of this future-oriented area of media law, making it an ideal textbook for students of media law, policy and ethics, mass media, and communication studies.
Offers the most accessible overview of the topic currently available. Suitable for students coming to the topic without a law background. The authors have diverse backgrounds in academia, journalism and practice, and present the subject clearly and dynamically.
This book demands that we question what we are told about security, using tools we have had for thousands of years. The work considers the history of security rhetoric in a number of distinct but related contexts, including the United States' security strategy, the "war" on Big Tech, and current concerns such as cybersecurity. Focusing on the language of security discourse, it draws common threads from the ancient world to the present day and the near future. The book grounds recent comparisons of Donald Trump to the Emperor Nero in a linguistic evidence base. It examines the potential impact on society of policy-makers' emphasis on the novelty of cybercrime, their likening of the internet to the Wild West, and their claims that criminals have "gone dark". It questions governments' descriptions of technology companies in words normally reserved for terrorists, and asks who might benefit. Interdisciplinary in approach, the book builds on existing literature in the Humanities and Social Sciences, most notably studies on rhetoric in Greco-Roman texts, and on the articulation of security concerns in law, international relations, and public policy contexts. It adds value to this body of research by offering new points of comparison, and a fresh but tried and tested way of looking at problems that are often presented as unprecedented. It will be essential to legal and policy practitioners, students of Law, Politics, Media, and Classics, and all those interested in employing critical thinking.
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.
The Data Protection Toolkit, 2nd edition offers updated advice on how to keep your practice compliant with the EU General Data Protection Regulation (GDPR) and the Data Protection Act (DPA), which came into force in May 2018. This essential toolkit features a range of forms, precedents and templates to support all data protection compliance measures within a legal practice. In addition to this, the toolkit offers practical guidance on: * setting up systems, * managing risk, * client inception, * ongoing monitoring, * data security, * data sharing, * subject access requests, * complaints handling, * data retention and destruction, * training and monitoring compliance.
Internet Governance: Origins, Current Issues, and Future Possibilities deals with Internet governance and includes computer history, Internet beginnings, institutions and stakeholders, proposed models of governance, and human rights. The concept of Internet governance covers an exceptionally complex and rapidly changing field of norms and rules. Its origins and conflicts engage many disciplines and give rise to technical standards with contributions from a wide range of stakeholders. At the same time, the Internet has increasingly become the dominant reality for all the information processing industries. The ultimate goal of the book is to establish a foundation for identifying a new model of governance for the Internet. In doing so, the book honors the efforts of previous scholars who have considered and proposed other models for the governance of the Internet. Among its aims, the book is intended as an introduction for the novice to the subject of internet governance. The first two chapters offer a historical foundation of the institutions and the debate. The next two chapters discuss the evolution of that debate over the last twenty years. The final two discuss the present and future ramifications of the debate and include the author's attempts to sketch a practical plan for a new concept of Internet governance. This book provides an introductory, multidisciplinary account of the forces at work in the evolving concept of internet governance for scholars in the information studies fields, including computer, information and library science. It should also be useful for scholars in the fields of international law, international relations, diplomacy studies and political science.
Contributing to a rethink of Public Service Media, this book combines theoretical insights and legal frameworks with practice, examining theory and policy development in a bottom-up manner. It explores the practices of Public Service Media across Europe, assessing the rules that govern Public Service Media at both the EU and the National Member State level, identifying common trends, initiated by both the European Commission and individual countries, illustrating the context-dependent development of Public Service Media and challenging the theories of Public Service Broadcasting which have developed an ideal-type public broadcaster based on the well-funded BBC in an atypical media market. Seeking to further explore the actual practices of Public Service Media and make recommendations for the development of more sustainable policies, this book offers case studies of rules and practices from across a variety of EU Member States to consider the extent to which public broadcasters are making the transition to public media organisations, and how public broadcasters and governments are shaping Public Service Media together. This book is a must-read for all scholars who take an interest in Public Service Media, media policy and media systems literature at large. It will also be of interest to practitioners working in government, Public Service Media and commercial media. |
![]() ![]() You may like...
Research Handbook on Information Law and…
Sharon K. Sandeen, Christoph Rademacher, …
Hardcover
R6,020
Discovery Miles 60 200
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, …
Hardcover
R6,864
Discovery Miles 68 640
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,952
Discovery Miles 39 520
Cyberlaw @ SA - The Law of the Internet…
S. Papadopoulos, S. Snail ka Mtuze
Paperback
|