![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Justice apps - mobile and web-based programmes that can assist individuals with legal tasks - are being produced, improved, and accessed at an unprecedented rate. These technologies have the potential to reshape the justice system, improve access to justice, and demystify legal institutions. Using artificial intelligence techniques, apps can even facilitate the resolution of common legal disputes. However, these opportunities must be assessed in light of the many challenges associated with app use in the justice sector. These include the digital divide and other accessibility issues; the ethical challenges raised by the dehumanisation of legal processes; and various privacy, security, and confidentiality risks. Surveying the landscape of this emergent industry, this book explores the objectives, opportunities, and challenges presented by apps across all areas of the justice sector. Detailed consideration is also given to the use of justice apps in specific legal contexts, including the family law and criminal law sectors. The first book to engage with justice apps, this book will appeal to a wide range of legal scholars, students, practitioners, and policy-makers.
The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity. This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems, while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children's health and academic research? By analysing a number of diverse questions concerning big health data under the GDPR from various perspectives, this book will appeal to those interested in privacy, data protection, big data, health sciences, information technology, the GDPR, EU and human rights law.
Class actions in privacy law are rapidly growing as a legal vehicle for citizens around the world to hold corporations liable for privacy violations. Current and future developments in these class actions stand to shift the corporate liability landscape for companies that interact with people's personal information. Privacy class actions are at the intersection of civil litigation, privacy law, and data protection. Developments in privacy class actions raise complex issues of substantive law as well as challenges to the established procedures governing class action litigation. Their outcomes are integral to the evolution of privacy law and data protection law across jurisdictions. This book brings together established scholars in privacy law, data protection law, and collective litigation to offer a detailed perspective on the present and future of collective litigation for privacy claims. Taking a comparative approach, this book incorporates considerations from consumer protection law, procedural law, cross-border litigation, tort law, and data protection law, which are key to understanding the development of privacy class actions. In doing so, it offers an analysis of the novel challenges they pose for courts, regulatory agencies, scholars, and litigators, together with their potential solutions.
This book examines the UK's response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully managed and balanced? The author begins by assessing several technologically-based problems facing British law enforcement agencies, including use of the Internet; the existence of 'darknet'; untraceable Internet telephone calls and messages; smart encrypted device direct messaging applications; and commercially available encryption software. These problems are then related to the traceability and typecasting of potential terrorists, showing that law enforcement agencies are searching for needles in the ever-expanding haystacks. To this end, the book examines the bulk powers of digital surveillance introduced by the Investigatory Powers Act 2016. The book then moves on to assess whether these new powers and the new legislative safeguards introduced are compatible with international human rights standards. The author creates a 'digital rights criterion' from which to challenge the bulk surveillance powers against human rights norms. Lord Carlile of Berriew CBE QC in recommending this book notes this particular legal advancement, commenting that rightly so the author concludes the UK has fairly balanced individual privacy with collective security. The book further analyses the potential impact on intelligence exchange between the EU and the UK, following Brexit. Using the US as a case study, the book shows that UK laws must remain within the ambit of EU law and the Court of Justice of the European Union's (CJEU's) jurisprudence, to maintain the effectiveness of the exchange. It addresses the topics with regard to terrorism and counterterrorism methods and will be of interest to researchers, academics, professionals, and students researching counterterrorism and digital electronic communications, international human rights, data protection, and international intelligence exchange.
In order for the information society to realise its full potential, personal data has to be disclosed, used and often shared. This book explores the disclosure and sharing of data within the area of healthcare. Including an overview of how health information is currently managed, the authors argue that with changes in modern society, the idea of personal relationships with a local GP who solely holds and controls your health records is becoming rapidly outdated. The authors aim to encourage and empower patients to make informed choices about sharing their health data. They do this by developing a three-stage theoretical model for change to the roles of the NHS and the individual. The study generates debate to stimulate and inspire new models and policy, and to provoke new visions for the sharing of healthcare data. Such discussion is framed through an exploration of the changing concept of 'privacy' and 'patient control' in healthcare information management. The volume draws on best practices from Europe and the USA and combines these to form a suggested vision for the UK as an early adopter of change. The volume will be essential reading for academics in the field of privacy and data protection, as well as healthcare and informatics professionals across different jurisdictions.
Surveillance of citizens is a clear manifestation of government power. The act of surveillance is generally deemed acceptable in a democratic society where it is necessary to protect the interests of the nation and where the power is exercised non-arbitrarily and in accordance with the law. Surveillance and the Law analyses the core features of surveillance that create stark challenges for transparency and accountability by examining the relationship between language, power, and surveillance. It identifies a number of features of surveillance law, surveillance language, and the distribution of power that perpetuate the existing surveillance paradigm. Using case studies from the US, the UK, and Ireland, it assesses the techniques used to maintain the status quo of continued surveillance expansion. These jurisdictions are selected for their similarities, but also for their key constitutional distinctions, which influence how power is distributed and restrained in the different systems. Though the book maintains that the classic principles of transparency and accountability remain the best means available to limit the arbitrary exercise of government power, it evaluates how these principles could be better realised in order to restore power to the people and to maintain an appropriate balance between government intrusion and the right to privacy. By identifying the common tactics used in the expansion of surveillance around the globe, this book will appeal to students and scholars interested in privacy law, human rights, information technology law, and surveillance studies.
Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations. Key features of this book include: Understanding cybercrime, computers, forensics, and cybersecurity Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory Financial investigation Identification (attribution) of cyber-conduct Apprehension Litigation in the criminal and civil arenas. This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal. Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.
The regulation of telecommunications really only began in South Africa after the historic first democratic election in 1994. Many developments in the policy, law and regulation have taken place since then. This book, "Telecommunications Law in South Africa", has been written to provide an overview of the policy, law and regulation of telecommunications in South Africa. It includes chapters on the important regulatory topics, including Licensing, Interconnection and Facilities Leasing, Pricing and Universal Service. It also includes chapters on The Regulators and Convergence, as well as an Overview and chapters on Economics and Technologies, authored by recognized experts in those areas. Separate chapters on the Electronic Communications and Transactions Act and The Regulation of the Interception of Communications and Provision of Communication Related Information Act are also included. This book will prove invaluable to legal practitioners in the field, as well as policy makers, legislators, regulators, journalists, academics, researchers, consultants, students, and telecommunications companies.
The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.
In 1787, Thomas Jefferson, then the American Minister to France,
had the "complete skeleton, skin & horns" of an American moose
shipped to him in Paris and mounted in the lobby of his residence
as a symbol of the vast possibilities contained in the strange and
largely unexplored New World. Taking a cue from Jefferson's
efforts, David Post, one of the nation's leading Internet scholars,
here presents a pithy, colorful exploration of the still mostly
undiscovered territory of cyberspace--what it is, how it works, and
how it should be governed.
Do courts adequately balance the rights of a free press? Under what conditions may the government refuse to release information to the news media? How can society protect itself from deceptive advertising? First Amendment questions like these are the focus of Communication Law. This introductory textbook addresses First Amendment issues that affect the general public, academics, business people, journalists, government officials, and broadcasters. This newly revised edition contains descriptions and analyses of recent and precedent-setting judicial decisions and is a valuable text for communication law courses in journalism, communication, and political science departments.
This volume explores from a legal perspective, how blockchain works. Perhaps more than ever before, this new technology requires us to take a multidisciplinary approach. The contributing authors, which include distinguished academics, public officials from important national authorities, and market operators, discuss and demonstrate how this technology can be a driver of innovation and yield positive effects in our societies, legal systems and economic/financial system. In particular, they present critical analyses of the potential benefits and legal risks of distributed ledger technology, while also assessing the opportunities offered by blockchain, and possible modes of regulating it. Accordingly, the discussions chiefly focus on the law and governance of blockchain, and thus on the paradigm shift that this technology can bring about.
This ground-breaking and timely book explores how big data, artificial intelligence and algorithms are creating new types of agency, and the impact that this is having on our lives and the rule of law. Addressing the issues in a thoughtful, cross-disciplinary manner, the authors examine the ways in which data-driven agency is transforming democratic practices and the meaning of individual choice. Leading scholars in law, philosophy, computer science and politics analyse the latest innovations in data science and machine learning, assessing the actual and potential implications of these technologies. They investigate how this affects our understanding of such concepts as agency, epistemology, justice, transparency and democracy, and advocate a precautionary approach that takes the effects of data-driven agency seriously without taking it for granted. Scholars and students of law, ethics and philosophy, in particular legal, political and democratic theory, will find this book a compelling and invaluable read, as will computer scientists interested in the implications of their own work. It will also prove insightful for academics and activists working on privacy, fairness and anti-discrimination. Contributors include: J.E. Cohen, G. de Vries, S. Delacroix, P. Dumouchel, C. Ess, M. Garnett, E.H. Gerding, R. Gomer, C. Graber, M. Hildebrandt, C. Maple, K. O'Hara, P. Ohm, m.c. schraefel, D. Stevens, N. van Dijk, M. Veale
Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
It has been said that the only asset that a lawyer has is time. But the reality is that a lawyer's greatest asset is information. The practice and the business of law is all about information exchange. The flow of information travels in a number of different directions during the life of a case. A client communicates certain facts to a lawyer. The lawyer assimilates those facts and seeks out specialised legal information which may be applicable to those facts. In the course of a generation there has been a technological revolution which represents a paradigm shift in the flow of information and communication. Collisions in the Digital Paradigm is about how the law deals with digital information technologies and some of the problems that arise when the law has to deal with issues arising in a new paradigm.
The new edition of this acclaimed book gives a fully updated overview of European data protection law affecting companies, incorporating the important legal developments which have taken place since the last edition was published. These include the first three cases of the European Court of Justice interpreting the EU Data Protection Directive (95/46), the Commission's first report on the implementation of the Directive, the Data Retention Directive, new developments in international data transfers, conflicts between security requirements and data protection, and the implementation of the Electronic Communications and Privacy Directive 2002/58 in the Member States. It also covers the recent European Court of Justice decision on the controversial export of airline passenger data to the US, and expands its European overview to include the new and acceding Member States. The book contains comprehensive coverage of data protection law, while at the same time providing pragmatic guidance on the typical compliance issues that companies face. As globalization of the world economy continues, an increasing number of business issues with data protection implications have come to the foreground, for example, outsourcing, whistleblower hotlines and records management, all of which are covered in the book. The appendices have been expanded to include most sources which a company will need, such as the texts of relevant directives, the safe harbor principles and FAQs, and charts of implementation in the Member States of specific provisions of interest to business. Thus, the book is a single reference source for companies faced with data protection issues. A Chinese edition of the book was published in 2008, making it the first in-depth treatise on European data protection law published in Chinese.
Technology has affected a wide range of issues in our personal and professional lives. And in doing so it has opened the door for new legal questions, especially with regards to intellectual property, and more specifically, copyright. New legal questions have risen with respect to the authorship of web pages, databases, computer programs and, in general, multimedia work. Is this techology internationally protected? Can Internet piracy be considered piracy? To whom does the copyright belong when more than one author exists? When is it necessary to resort to technical protection devices? By examining international laws, such as the WIPO treaties and EU law, this book offers a clear answer to these questions while focusing on how copyright does or does not protect new technology. It also examines alternative ways of protecting technologies that present the real possibility of appealing to patent and trademark law as well as an overview of the multimedia concept and the origins of copyright. This book's simple structure should help the reader to understand how to utilize current laws to protect one's work and offers an interesting and informative analysis of the subject.
Rights, Regulation and the Technological Revolution confronts a
central question facing modern government - how can regulators
respond to both the challenges and opportunities presented by a
technologically-driven society without sacrificing legitimacy for
effectiveness, or weakening the essential conditions of a stable,
aspirant moral community?
Maps the landscape of contemporary informational interests. Of considerable interest to those working at the intersection of law and technology, as well as others concerned with the legal, political, and social aspects of our information society.
Rikke Frank Jorgensen has given us a thoughtful and competent contribution to a debate of increasing global importance. Her theoretical analysis and practical case-study stimulate critical reflection on how we should connect the primary moral domain of our time - human rights - with the primary infrastructure for global communication, the Internet. This book is a must read for all who engage with the search for meaningful and practical normative directions for communications in the 21st century.' - Cees J. Hamelink, University of Amsterdam, The Netherlands'Understanding the Internet is key to protecting human rights in the future. In Framing the Net, Rikke Frank Jorgensen shows how this can be done. Deconstructing four key metaphors - the Internet as infrastructure, public sphere, medium and culture - she shows where the challenges to human rights protection online lie and how to confront them. Importantly, she develops clear policy proposals for national and international Internet policy-makers, all based on human rights. Her book is essential reading for anyone interested in the future of human rights on the Internet: and that should be everyone.' - Wolfgang Benedek, University of Graz, Austria 'Jorgensen's examination of whether Internet governance can be better aligned with the rights and freedoms enshrined in human rights law and standards of compliance should be read by everyone in the academic, policy and legal practitioner communities. From women s use of ICTs in Uganda to Wikipedia in Germany, information society developments make it imperative that scholars and practitioners understand why it matters how the issues are framed. This book successfully analyses a decade or more of debate in this field in an engaging and very illuminating way.' - Robin Mansell, London School of Economics and Political Science, UK This important book examines how human rights are being applied in the digital era. The focus on 'internet freedoms' and 'internet rights' has risen considerably in recent years, and in July 2012 the first resolution on the promotion, protection and enjoyment of human rights on the internet was adopted by the U.N. Human Rights Council. This timely book suggests four framings to examine human rights challenges in an internet era: the Internet as Infrastructure, the Internet as Public Sphere, the Internet as Medium and the Internet as Culture. These propositions, and the questions that arise from them, are considered in the broad context of the way human rights are translated and applied in the information society, both in academic research and the international community s policy discourse. The author points to the role of private actors vis-a-vis human rights as one of the most crucial and cross-cutting themes that needs to be addressed in order to advance human rights protection on the internet. Combining research themes that are often dealt with separately, this book will appeal to civil society organizations, journalists, and policy makers in the field of internet and communication policy making. The book's overview of internet-related academic discourse combined with human rights-based policy analysis will be useful for scholars, students, and practitioners working within these fields. Contents: Preface Introduction Part I: Human Rights in the Internet Era 1. Theorizing the Internet Era 2. Revisiting Public and Private 3. Human Rights Part II: Framing the Net 4. The Internet as Infrastructure 5. The Internet as Public Sphere 6. The Internet as a Medium 7. The Internet as Culture Part III: ICT and Social Change 8. ICT as a Tool for Empowerment in Uganda 9. Wikipedia as a Platform for Community Life and Collaboration 10. Conclusion Appendices Bibliography Index
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
This book critically confronts perceptions that social media has become a 'wasteland' for young people. Law has become preoccupied with privacy, intellectual property, defamation and criminal behaviour in and through social media. In the case of children and youth, this book argues, these preoccupations - whilst important - have disguised and distracted public debate away from a much broader, and more positive, consideration of the nature of social media. In particular, the legal tendency to consider social media as 'dangerous' for young people - to focus exclusively on the need to protect and control their online presence and privacy, whilst tending to suspect, or to criminalise, their use of it - has obscured the potential of social media to help young people to participate more fully as citizens in society. Drawing on sociological work on the construction of childhood, and engaging a wide range of national and international legal material, this book argues that social media may yet offer the possibility of an entirely different - and more progressive -conceptualisation of children and youth.
E-voting is the use of electronic means in the casting of the vote at political elections or referendums. This book provides an overview of e-voting related case-law worldwide and explains how judicial decisions impact e-voting development. With contributions by renowned experts on thirteen countries, the authors discuss e-voting both from controlled environments, such as voting machines in polling stations, and uncontrolled ones, including internet voting. Each chapter examines a group of country-specific leading judicial decisions on e-voting and their likely impact on its future development. Reference is made to emerging standards on e-voting such as the Recommendation Rec(2004)11 of the Council of Europe, the only international instrument on e-voting regulation, and to other countries' case-law. The work provides a broader, informative and easily accessible perspective on the historical, political and legal aspects of an otherwise very technical subject, and contributes to a better understanding of the significance of case law and its impact in shaping e-voting's future development. The book will be significantly useful to anyone with an interest in e-voting, in particular decision makers and officials, researchers and academia, as well as NGOs and providers of e-voting solutions.
Providing a scholarly analysis of how to govern and make the right
kinds of laws for cyberspace, in this work, Professor Reed
investigates the vast majority of cyberspace users who wish to act
lawfully and asks whether the current state of law in cyberspace
makes it possible for them to do so. If not, why not, and what is
the cure? |
![]() ![]() You may like...
Prayer Power - 40 Days of Learning to…
Brent Patrick McDougal
Paperback
Topics in Differential Geometry: A New…
Donal J. Hurley, Michael A. Vandyck
Hardcover
R1,712
Discovery Miles 17 120
The Healing Game - A Vietnam Soldier's…
Charles Louis Singleton
Hardcover
R845
Discovery Miles 8 450
|