![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
A provocative analysis of net neutrality and a call to democratize online communication This short book is both a primer that explains the history and politics of net neutrality and an argument for a more equitable framework for regulating access to the internet. Pickard and Berman argue that we should not see internet service as a commodity but as a public good necessary for sustaining democratic society in the twenty-first century. They aim to reframe the threat to net neutrality as more than a conflict between digital leviathans like Google and internet service providers like Comcast but as part of a much wider project to commercialize the public sphere and undermine the free speech essential for democracy. Readers will come away with a better understanding of the key concepts underpinning the net neutrality battle and rallying points for future action to democratize online communication.
Chapter 1 INTRODUCTION 1. 1 Research Objective 1 The modern State is unlikely to be the end configuration of organized political life. Throughout history, both the nature and manifestation of political organization have continuously adapted to the specific needs of the age. Despite the natural tendency of organizations to retain a certain status quo, there is no reason to suggest that the dominant form of political organization, the State, has lost the ability to adapt to changing circumstances. Today's needs are shaped by a process of glob- ization increasing the level of transnational interdependence between actors in terms of social, economic and political activity. As such, this process is likely to inform the next transformation of organized political life. This inquiry sets out to shed some light on the consequences of this transformation for the modern State in the view of its constitutional commitments and responsibilities using the Internet's - terdependency-imposing nature as foundation for the inquiry. In investigating the way in which traditional public commitments and responsibilities take shape on the Internet, this inquiry aims to further our understanding of how globalization inf- ences decision making in the public interest. The vast amount of literature on the effects of globalization on the State roughly divides into three categories. The first strand of literature stresses the economic dimension of globalization.
While the digital revolution has touched every aspect of law
librarianship, perhaps nowhere has the effect been more profound
than in the area of collection development. Many of the materials
law libraries traditionally collected in print form are now
available in electronic format.
Should we regulate artificial intelligence? Can we? From self-driving cars and high-speed trading to algorithmic decision-making, the way we live, work, and play is increasingly dependent on AI systems that operate with diminishing human intervention. These fast, autonomous, and opaque machines offer great benefits - and pose significant risks. This book examines how our laws are dealing with AI, as well as what additional rules and institutions are needed - including the role that AI might play in regulating itself. Drawing on diverse technologies and examples from around the world, the book offers lessons on how to manage risk, draw red lines, and preserve the legitimacy of public authority. Though the prospect of AI pushing beyond the limits of the law may seem remote, these measures are useful now - and will be essential if it ever does.
The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.
This is the first book-length treatment of the advancement of EU global data flows and digital trade through the framework of European institutionalisation. Drawing on case studies of EU-US, EU-Japan and EU-China relations it charts the theoretical and empirical approaches at play. It illustrates how the EU has pioneered high standards in data flows and how it engages in significant digital trade reforms, committed to those standards. The book marks a major shift in how institutionalisation and the EU should be viewed as it relates to two of the more extraordinary areas of global governance: trade and data flows. This significant book will be of interest to EU constitutional lawyers, as well as those researching in the field of IT and data law.
Many pressing environmental and security threats now facing the international community may be traced to the frontiers. From climate change and cyber-attacks to the associated challenges of space weaponization and orbital debris mitigation, solutions to all of these issues have at their root some form of regulation over the 'global commons'. Yet governance over these spaces is now transitioning away from multilateral treaties to regional and bilateral accords. This book makes an original contribution by comparing and contrasting some of the principal issues facing the frontiers. It analyzes how and why existing governance structures are often failing to adequately meet global collective action problems, with special coverage on cybersecurity and Internet governance. It proposes a new way forward incorporating lessons from successful regimes as well as the interdisciplinary scholarship on polycentric governance, arguing that multi-stakeholder collaboration is imperative in order to avoid tragedies of the global commons.
In Digital Data Collection and Information Privacy Law, Mark Burdon argues for the reformulation of information privacy law to regulate new power consequences of ubiquitous data collection. Examining developing business models, based on collections of sensor data - with a focus on the 'smart home' - Burdon demonstrates the challenges that are arising for information privacy's control-model and its application of principled protections of personal information exchange. By reformulating information privacy's primary role of individual control as an interrupter of modulated power, Burdon provides a foundation for future law reform and calls for stronger information privacy law protections. This book should be read by anyone interested in the role of privacy in a world of ubiquitous and pervasive data collection.
By adopting a multi-disciplinary approach, this book provides a comprehensive analysis of the legality of the use of autonomous weapons systems under international law. It examines different arguments presented by States, roboticists and scholars to demonstrate the challenges such systems will create for the laws of war. This study examines how technology of warfare seeks to increase the dissociation of risk and communication between weapons and their human operators. Furthermore, it explains how algorithms might give rise to 'errors' on the battlefield that cannot be directly attributed to human operators. Against this backdrop, Dr Seixas-Nunes examines three distinct legal frameworks: the distinction between the legality of weapons and the laws of targeting; different mechanisms of individual accountability and the importance of recovering the category of 'dolus eventualis' for programmers and technicians and, finally, State responsibility for violations of the laws of war caused by weapons' software errors.
Patents are important tools for innovation policy. They incentivize the creation and dissemination of new technical solutions and help to disclose their working to the public in exchange for limited exclusivity. Injunctions are important tools of their enforcement. Much has been written about different aspects of the patent system, but the issue of injunctions is largely neglected in the comparative legal literature. This book explains how the drafting, tailoring and enforcement of injunctions in patent law works in several leading jurisdictions: Europe, the United States, Canada, and Israel. The chapters provide in-depth explanation of how and why national judges provide for or reject flexibility and tailoring of injunctive relief. With its transatlantic and intra- European comparisons, as well as a policy and theoretical synthesis, this is the most comprehensive overview available for practicing attorneys and scholars in patent law. This book is also available as Open Access on Cambridge Core.
As technology makes it easier for people to work together, large-scale collaboration is becoming increasingly prevalent. In this context, the question of how to determine authorship - and hence ownership - of copyright in collaborative works is an important question to which current copyright law fails to provide a coherent or consistent answer. In Copyright and Collective Authorship, Daniela Simone engages with the problem of how to determine the authorship of highly collaborative works. Employing insights from the ways in which collaborators understand and regulate issues of authorship, the book argues that a recalibration of copyright law is necessary, proposing an inclusive and contextual approach to joint authorship that is true to the legal concept of authorship but is also more aligned with creative reality.
Regulators have been more permissive for medical devices compared to their drug and biologic counterparts. While innovative products can thereby reach consumers more quickly, this approach raises serious public health and safety concerns. Additionally, the nature of medical devices is rapidly changing, as software has become as important as hardware. Regulation must keep pace with the current developments and controversies of this technology. This volume provides a multidisciplinary evaluation of the ethical, legal, and regulatory concerns surrounding medical devices in the US and EU. For medical providers, policymakers, and other stakeholders, the book offers a framework for the opportunities and challenges on the horizon for medical device regulation. Readers will gain a nuanced overview of the latest developments in patient privacy and safety, innovation, and new regulatory laws. This book is also available as Open Access on Cambridge Core.
Regulators have been more permissive for medical devices compared to their drug and biologic counterparts. While innovative products can thereby reach consumers more quickly, this approach raises serious public health and safety concerns. Additionally, the nature of medical devices is rapidly changing, as software has become as important as hardware. Regulation must keep pace with the current developments and controversies of this technology. This volume provides a multidisciplinary evaluation of the ethical, legal, and regulatory concerns surrounding medical devices in the US and EU. For medical providers, policymakers, and other stakeholders, the book offers a framework for the opportunities and challenges on the horizon for medical device regulation. Readers will gain a nuanced overview of the latest developments in patient privacy and safety, innovation, and new regulatory laws. This book is also available as Open Access on Cambridge Core.
The desire for humanity and the desire for security have co-existed as long as humans have been alive. As science has become increasingly sophisticated, so have the methods of self-defence by States. Nanotechnology is already changing warfare by increasing capabilities upon which armed forces are heavily reliant: more efficient energy storage, advanced photovoltaics, and improved military protective equipment to name a few of these developments. Some applications of nanomaterials by the military are both powerful and subtle, and have neurological and biological applications: 'devices that can infiltrate electronics and seize control at crucial moments, artificial "disease" agents that can rest harmlessly in victims' bodies until activated by an external signal'. The advance of the use or contemplation of use of these types of nanoscale applications by the military requires urgent analysis in light of existing international law, particularly in light of their potential effects on humans and on the environment.
This little gem of a book, which first appeared in 1920, was written in Walter Lippmann's thirtieth year. He was still full of the passionate faith in democracy that was evident in his writings before the First World War. From today's point of view, Lippmann's argument seems unusually prescient. He was troubled by distortions in newspaper journalism, but was also deeply aware of the need to protect a free press. Lippmann believed that toleration of alternative beliefs was essential to maintaining the vitality of democracy. Liberty and the News is a key transitional work in the corpus of Lippmann's writings. For it is here that he proposes that public opinion is largely a response not to truths but rather to a "pseudo-environment" which exists between people and the external world. Lippmann was worried that if the beliefs that get exchanged between people are hollow, and bear only a purely accidental relationship to the world as it truly is, then the entire case for democracy is in danger of having been built on sand. His concerns remain very much alive and important.
The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws (as part of Network Sovereignty policies) affect innovation in artificial intelligence (AI). The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017-2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the Cyber Security Law did not anticipate the changing nature of globalised AI innovation. It is argued that the deliberate deployment of what the book refers to as 'fuzzy logic' in drafting the Cyber Security Law allowed regulators to subsequently interpret key terms regarding data in that Law in a fluid and flexible fashion to benefit Chinese innovation.
In Government Cloud Procurement, Kevin McGillivray explores the question of whether governments can adopt cloud computing services and still meet their legal requirements and other obligations to citizens. The book focuses on the interplay between the technical properties of cloud computing services and the complex legal requirements applicable to cloud adoption and use. The legal issues evaluated include data privacy law (GDPR and the US regime), jurisdictional issues, contracts, and transnational private law approaches to addressing legal requirements. McGillivray also addresses the unique position of governments when they outsource core aspects of their information and communications technology to cloud service providers. His analysis is supported by extensive research examining actual cloud contracts obtained through Freedom of Information Act requests. With the demand for cloud computing on the rise, this study fills a gap in legal literature and offers guidance to organizations considering cloud computing.
New technologies have always challenged the social, economic, legal, and ideological status quo. Constitutional law is no less impacted by such technologically driven transformations, as the state must formulate a legal response to new technologies and their market applications, as well as the state's own use of new technology. In particular, the development of data collection, data mining, and algorithmic analysis by public and private actors present unique challenges to public law at the doctrinal as well as the theoretical level. This collection, aimed at legal scholars and practitioners, describes the constitutional challenges created by the algorithmic society. It offers an important synthesis of the state of play in law and technology studies, addressing the challenges for fundamental rights and democracy, the role of policy and regulation, and the responsibilities of private actors. This title is also available as Open Access on Cambridge Core.
International legal scholars tend to think of their work as the interpretation of rules: the application of a law 'out there' to concrete situations. This book takes a different approach to that scholarship: it views doctrine as a socio-linguistic practice. In other words, this book views legal scholars not as law-appliers, but as constructing knowledge within a particular academic discipline. By means of three close-ups of the discourse on cyberwar and international law, this book shows how international legal knowledge is constructed in ways usually overlooked: by means of footnotes, for example, or conference presentations. In so doing, this book aims to present a new way of seeing international legal scholarship: one that pays attention to the mundane parts of international legal texts and provides a different understanding of how international law as we know it comes about.
This book critically investigates the role of data subject rights in countering information and power asymmetries online. It aims at dissecting 'data subject empowerment' in the information society through the lens of the right to erasure ("right to be forgotten") in Article 17 of the General Data Protection Regulation (GDPR). In doing so, it provides an extensive analysis of the interaction between the GDPR and the fundamental right to data protection in Art.8 of the Charter of Fundamental Rights of the EU (Charter), how data subject rights affect fair balancing of fundamental rights, and what the practical challenges are to effective data subject rights. The book starts with exploring the data-driven asymmetries that characterise individuals' relationship with tech giants. These commercial entities increasingly anticipate and govern how people interact with each other and the world around them, affecting core values such as individual autonomy, dignity and freedom. The book explores how data protection law, and data subject rights in particular, enable resisting, breaking down or at the very least critically engaging with these asymmetric relationships. It concludes that despite substantial legal and practical hurdles, the GDPR's right to erasure does play a meaningful role in furthering the fundamental right to data protection (Art. 8 Charter) in the face of power asymmetries online.
The most fascinating and profitable subject of predictive algorithms is the human actor. Analysing big data through learning algorithms to predict and pre-empt individual decisions gives a powerful tool to corporations, political parties and the state. Algorithmic analysis of digital footprints, as an omnipresent form of surveillance, has already been used in diverse contexts: behavioural advertising, personalised pricing, political micro-targeting, precision medicine, and predictive policing and prison sentencing. This volume brings together experts to offer philosophical, sociological, and legal perspectives on these personalised data practices. It explores common themes such as choice, personal autonomy, equality, privacy, and corporate and governmental efficiency against the normative frameworks of the market, democracy and the rule of law. By offering these insights, this collection on data-driven personalisation seeks to stimulate an interdisciplinary debate on one of the most pervasive, transformative, and insidious socio-technical developments of our time.
This collection explores the relevance of global trade law for data, big data and cross-border data flows. Contributing authors from different disciplines including law, economics and political science analyze developments at the World Trade Organization and in preferential trade venues by asking what future-oriented models for data governance are available and viable in the area of trade law and policy. The collection paints the broad picture of the interaction between digital technologies and trade regulation as well as provides in-depth analyses of critical to the data-driven economy issues, such as privacy and AI, and different countries' perspectives. This title is also available as Open Access on Cambridge Core.
Should we regulate artificial intelligence? Can we? From self-driving cars and high-speed trading to algorithmic decision-making, the way we live, work, and play is increasingly dependent on AI systems that operate with diminishing human intervention. These fast, autonomous, and opaque machines offer great benefits - and pose significant risks. This book examines how our laws are dealing with AI, as well as what additional rules and institutions are needed - including the role that AI might play in regulating itself. Drawing on diverse technologies and examples from around the world, the book offers lessons on how to manage risk, draw red lines, and preserve the legitimacy of public authority. Though the prospect of AI pushing beyond the limits of the law may seem remote, these measures are useful now - and will be essential if it ever does.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.
Are the cognitive sciences relevant for law? How do they influence legal theory and practice? Should lawyers become part-time cognitive scientists? The recent advances in the cognitive sciences have reshaped our conceptions of human decision-making and behavior. Many claim, for instance, that we can no longer view ourselves as purely rational agents equipped with free will. This change is vitally important for lawyers, who are forced to rethink the foundations of their theories and the framework of legal practice. Featuring multidisciplinary scholars from around the world, this book offers a comprehensive overview of the emerging field of law and the cognitive sciences. It develops new theories and provides often provocative insights into the relationship between the cognitive sciences and various dimensions of the law including legal philosophy and methodology, doctrinal issues, and evidence. |
You may like...
The Evolution of Primary Sexual…
Janet Leonard, Alex Cordoba-Aguilar
Hardcover
R3,318
Discovery Miles 33 180
Cozy Toes for Baby - Sweet Shoes to…
Chantal Garceau, Mary King
Paperback
|