![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
In this book Konstantinos Komaitis identifies a tripartite problem - intellectual, institutional and ethical - inherent in the domain name regulation culture. Using the theory of property, Komaitis discusses domain names as sui generis 'e-property' rights and analyses the experience of the past ten years, through the Uniform Domain Name Dispute Resolution Policy (UDRP) and the Anticybersquatting Consumer Protection Act (ACPA). The institutional deficit he identifies, generates a further discussion on the ethical dimensions in the regulation of domain names and prompts Komaitis to suggest the creation of an environment based on justice. The relationship between trademarks and domain names has always been contentious and the existing institutions of the UDRP and ACPA have not assisted in alleviating the tension between the two identifiers. Over the past ten years, the trademark community has been systematic in encouraging and promoting a culture that indiscriminately considers domain names as secondclass citizens, suggesting that trademark rights should have priority over the registration in the domain name space. Komaitis disputes this assertion and brings to light the injustices and the trademark-oriented nature of the UDRP and ACPA. He queries what the appropriate legal source to protect registrants when not seeking to promote trademark interests is. He also delineates a legal hypothesis on their nature as well as the steps of their institutionalisation process that we need to reverse, seeking to create a just framework for the regulation of domain names. Finally he explores how the current policies contribute to the philosophy of domain names as second-class citizens. With these questions in mind, Komaitis suggests some recommendations concerning the reconfiguration of the regulation of domain names.
Cybersecurity is a vital issue for all countries, but those in the developing world face unique concerns. This innovative book evaluates the experience of cyberspace policies and strategies and their relation to cyber laws and regulations in developing and emerging economies, using economic, political and social bases as well as resource-based theory perspectives. This work is inspired by a number of factors including the burgeoning importance of cybersecurity in an interconnected world and the fact that cyber risk is now at the top of the global agenda, as high-profile breaches increase worries that cybersecurity attacks might compromise the world economy. Its unique and innovative look at radical changes in the use of governmental resources to improve the effectiveness and efficiency of cybersecurity policies and strategies, and its insight into the effects of these changes on the economic structure of a country, make this book useful to many disciplines. Scholars, students and policy makers will all find this vivid book of great value in understanding the vital issues in cybersecurity.
Blockchain Technology and the Law: Opportunities and Risks is one of the first texts to offer a critical analysis of Blockchain and the legal and economic challenges faced by this new technology. This book will offer those who are unfamiliar with Blockchain an introduction as to how the technology works and will demonstrate how a legal framework that governs it can be used to ensure that it can be successfully deployed. Discussions included in this book: - an introduction to smart contracts, and their potential, from a commercial and consumer law perspective, to change the nature of transactions between parties; - the impact that Blockchain has already had on financial services, and the possible consumer risks and macro-economic issues that may arise in the future; - the challenges that are facing global securities regulators with the development of Initial Coin Offerings and the ongoing risks that they pose to the investing public; - the risk of significant privacy breaches due to the online public nature of Blockchain; and - the future of Blockchain technology. Of interest to academics, policy-makers, technology developers and legal practitioners, this book will provide a thorough examination of Blockchain technology in relation to the law from a comparative perspective with a focus on the United Kingdom, Canada and the United States.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
The fusion between virtuality and reality has created a new quality of experience establishing metaverses and virtual worlds. Second Life, Twinity, Entropia Universe or Fregger have experienced rapid growth in recent years and show no signs of slowing down. Not only have countless companies discovered these "virtureal worlds" as marketplaces, but so have fraudsters and other criminals. In this book, European experts from different academic disciplines show how to meet the new challenges arising from virtual worlds. They discuss the reasons for and the impacts of these new forms of criminality as well as the necessity and means of combating them. Moreover, other fundamental issues are examined, such as the addictive potential of virtual-world use, media violence, and conflict resolution problems arising in the context of virtual worlds.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, to electoral fraud prevention, to a wholesale decentralisation of power and the banishing of the exploitative practices of 'middlemen', blockchain stakeholders are nothing short of evangelical in their belief that it is a force for good. For these reasons and more the technology has captured the attention of entrepreneurs, venture capitalists, global corporations and governments the world over. Blockchain may indeed offer a unique technical opportunity to change cultures of transparency and trust within cyberspace, and as 'revolutionary' and 'disruptive' has the potential to shift global socioeconomic and political conventions. But as a yet largely unregulated, solutionist-driven phenomenon, blockchain exists squarely within the boundaries of capitalist logic and reason, fast becoming central to the business models of many sources of financial and political power the technology was specifically designed to undo, and increasingly allied to neoliberal strategies with scant regard for collective, political or democratic accountability in the public interest. Regulating Blockchain casts a critical eye over the technology, its 'ecosystem' of stakeholders, and offers a challenge to the prevailing discourse proclaiming it to be the great techno-social enabler of our times.
This supplemental text on PR law is intended to be used with other mass communication textbooks. It is intended for the mass communication law course, which is a mainstay in all accredited programs in mass communication, journalism, broadcasting, telecommunications, public relations, mass media, and related curricula.
Billions of minutes a month are spent globally on social media. This raises not only serious legal issues, but also has a clear impact on everyday commercial activity. This book considers the significant legal developments that have arisen due to social media. It provides an expert explanation of the issues that practitioners and businesses need to consider, as well as the special measures that are required in order to minimise their exposure to risk. The content is highly practical, and not only explores the law related to social media, but also includes useful aids for the reader, such as flow charts, checklists and case studies. Various categories and channels of social media are covered in this book, alongside the legal classification of different social networks. Social media is also considered in the context of human rights law by evaluating the implications this has had upon the development of civil and criminal law when pursuing a civil remedy or criminal prosecution in relation to online speech. As part of these discussions the book deals specifically with the Defamation Act 2013, the Communications Act 2003, the Computer Misuse Act 1990 and the Contempt of Court Act 1988 among other key issues such as seeking Injunctions and the resulting privacy implications. Finally, the author also pays careful consideration to the commercial aspects raised by social media. The reader will find reference to key cases and regulatory guidance notes and statutes including, the Data Protection Act 1998 (including the draft Data Protection Regulation), user privacy, human rights, trading and advertising standards, special rules for FCA regulated bodies and social media insurance. This book is an invaluable guide for private practice and in-house practitioners, business professionals, academics and post-graduate students involved in the law surrounding social media.
The regulation of pornography has always been a contentious issue, which has sparked wide-ranging debates surrounding the acceptability and place of pornography in society. The use of the internet to distribute and access pornography has magnified this debate and has presented a number of challenges for the law in terms of effective and proportionate regulation. Following unsuccessful attempts by states to transpose traditional laws to cyberspace, a new and radical regulatory framework eventually evolved for regulating internet pornography. In this process, the focus of the law has changed from merely controlling the publication and distribution of obscene material to a model that aims to deter private consumption of illegal content. In addition, various self- and co-regulatory initiatives have been introduced with the involvement of non-state actors, imposing a certain degree of de facto liability on intermediaries, all of which raise interesting issues. This book examines the relevant regulatory responses to internet pornography, with particular reference to the UK, but also drawing comparisons with other countries where relevant. It argues that the internet has fundamentally, and in many ways irreversibly, changed the regulation of pornography. Classifying internet pornography into three broad categories - child pornography, extreme pornography, and adult pornography - the book provides an in-depth analysis of the legal issues involved in regulating internet pornography, and argues that the notions of obscenity and indecency on their own will not provide an adequate basis for regulating online pornography. The book identifies the legitimising factors that will lend credibility and normative force to the law in order to successfully regulate pornography in cyberspace. It is the only comprehensive text that rigorously addresses the regulation of internet pornography as a whole, and offers valuable insights that will appeal to academics, students, policy makers, and those working in the areas of broader internet governance and online child protection.
"The data economy" is a term used by many, but properly understood by few. Even more so the concept of "big data". Both terms embody the notion of a digital world in which many transactions and data flows animate a virtual space. This is the unseen world in which technology has become the master, with the hand of the human less visible. In fact, however, it is human interaction in and around technology that makes data so pervasive and important - the ability of the human mind to extract, manipulate and shape data that gives meaning to it. This book outlines the findings and conclusions of a multidisciplinary team of data scientists, lawyers, and economists tasked with studying both the possibilities of exploiting the rich data sets made available from many human-technology interactions and the practical and legal limitations of trying to do so. It revolves around a core case study of Singapore's public transport system, using data from both the private company operating the contactless payment system (EZ-Link) and the government agency responsible for public transport infrastructure (Land Transport Authority). In analysing both the possibilities and the limitations of these data sets, the authors propose policy recommendations in terms of both the uses of large data sets and the legislation necessary to enable these uses while protecting the privacy of users.
This book analyses emerging constitutional principles addressing the regulation of the internet at both the national and the supranational level. These principles have arisen from cases involving the protection of fundamental rights. This is the reason why the book explores the topic thorough the lens of constitutional adjudication, developing an analysis of Courts' argumentation. The volume examines the gradual consolidation of a "constitutional core" of internet law at the supranational level. It addresses the European Court of Human Rights and the Court of Justice of the European Union case law, before going on to explore Constitutional or Supreme Courts' decisions in individual jurisdictions in Europe and the US. The contributions to the volume discuss the possibility of the "constitutionalization" of internet law, calling into question the thesis of the so-called anarchic nature of the internet.
Examining the development and design of regulatory structures in the online environment, The Regulation of Cyberspace considers current practices and suggests a regulatory model that acknowledges its complexity and how it can be used by regulators to provide a more comprehensive regulatory structure for cyberspace. Drawing on the work of cyber-regulatory theorists, such as Yochai Benkler, Andrew Shapiro and Lawrence Lessig, Murray explores and analyzes how all forms of control, including design and market controls, as well as traditional command and control regulation, are applied within the complex and flexible environment of cyberspace. It includes chapters on: the role of the cyberlawyer environmental design and control online communities cyber laws and cyber law-making. This book is an essential read for anyone interested in law and information technology.
Examining the development and design of regulatory structures in the online environment, The Regulation of Cyberspace considers current practices and suggests a regulatory model that acknowledges its complexity and how it can be used by regulators to provide a more comprehensive regulatory structure for cyberspace. Drawing on the work of cyber-regulatory theorists, such as Yochai Benkler, Andrew Shapiro and Lawrence Lessig, Murray explores and analyzes how all forms of control, including design and market controls, as well as traditional command and control regulation, are applied within the complex and flexible environment of cyberspace. It includes chapters on:
This book is an essential read for anyone interested in law and information technology.
"Communication and Law" brings together scholars from law and
communication to talk both generally and specifically about the
theoretical and methodological approaches one can use to study the
First Amendment and general communication law issues. The volume is
intended to help graduate students and scholars at all skill levels
think about new approaches to questions about communication law by
offering a survey of the multidisciplinary work that is now
available. It is designed to challenge the conventional notion that
traditional legal research and social science methodological
approaches are mutually exclusive enterprises.
The Law and Economics of Privacy, Personal Data, Artificial Intelligence, and Incomplete Monitoring presents new findings and perspectives from leading international scholars on several emerging areas issues in legal and economic research. The collection contains new theoretical papers on privacy, the protection of personal data, the use of regulatory monitoring under legal standards versus rules, a study of the properties of market efficiency in securities fraud litigation, as well as an analysis of non-exclusionary price floors. It also contains an empirical paper on the relationship between uncertainty of patent approval of artificial intelligence applications and the Supreme Court's decision in Alice Corp. v. CLS Bank International. Finally, the volume features a law-and-economics assessment of the Chinese financial system within the context of the trade-off between centralized control and rapid growth. This 30th volume of Research in Law and Economics showcases the cutting edge theoretical and empirical findings for researchers and professionals considering these complex issues intersecting law, technology, and economics.
This book includes detailed coverage of intellectual property, contract, encryption and liability issues, including allocation of domain names, use of metatags and other forms of search engine optimization, digital signatures and the position of ISPs and other intermediaries. There are case studies on electronic conveyancing and e-taxation. Though the book is written from a UK perspective, comparative material is included from other jurisdictions, including America and Singapore in particular.
This book considers a new approach to online copyright infringement. Rather than looking at the subject within a purely technological context, it provides legal analysis from a human perspective. This book highlights that there are three key instances in which the capacity of a human mind intersects with the development of copyright regulation: (1) the development of copyright statutory law; (2) the interpretation of the copyright statutory law the judiciary; and (3) human interaction with new technology. Using a novel framework for constructing digital perspectives, the author, Dr Hayleigh Bosher, analyses the laws relating to online copyright infringement. She provides insights into why the law appears as it does, shedding light on the circumstances of how it came to pass and demonstrates a clear malfunction in the interpretation and application of copyright law to online activities that derives from the disconnect between the technological and the human perspectives. The book proposes putting the human element back into copyright analysis to enable the return of reason where it has been lost, and provide a clearer, more consistent and fair legal regulation of online copyright infringement. Law, Technology and Cognition: The Human Element in Online Copyright Infringement will be of interest to students, academics, researchers, as well as practitioners.
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.
In this new textbook, social media professor Jeremy Lipschultz introduces students to the study of social media law and ethics, integrating legal concepts and ethical theories. The book explores free expression, as it applies to students, media industry professionals, content creators and audience members. Key issues and practices covered include copyright law, data privacy, revenge porn, defamation, government censorship, social media platform rules, and employer policies. Research techniques are also used to suggest future trends in social media law and ethics. Touching on themes and topics of significant contemporary relevance, this accessible textbook can be used in standalone law and ethics courses, as well as emerging social media courses that are disrupting traditional public relations, advertising and journalism curricula. Case studies, discussion questions, and online resources help students engage with the complexities and ambiguities of this future-oriented area of media law, making it an ideal textbook for students of media law, policy and ethics, mass media, and communication studies.
This clearly written and well-focused volume combines concise decisions of the primary areas of communication law with the foundational case decisions in those domains. Thus, in one volume, students of communication law, constitutional law, political science, and related fields find both the key rulings that define each area of law and a detailed summary of the legal concepts, doctrines, and policies so vital to understanding the rulings within their legal context. The text forgoes the tendency to provide encyclopedic treatment of all the relevant cases and focuses instead on the two or three cases most vital to an accurate and informed understanding of the current state of each field of communication law. The chapters provide readers with the most salient concepts and the necessary depth to understand the law while permitting most reading time to be directed to the law itself. Full-text rulings allow readers to immerse themselves in the law itself--to develop a feel for its complexity, its flexibility, and its language. Useful as a quick reference to the landmark rulings and the jurisprudence of communication law, this book also serves well as the primary text in related undergraduate courses or as a supplemental text in graduate classes in the field.
The information society is a key issue in everyday life and a phenomenon enc- passing social, cultural, economic, and legal facettes. Currently, an information society's legal framework is gradually crystallizing under the newly introduced term of "Internet governance." During the last few years, intensive discussions about the contents of Internet governance have addressed manifold aspects of a possible regulatory regime. In light of the general comprehension that an international treaty structure is mi- ing and that self-regulation as a normative model does not sufce in all respects, new architectural and constitutional theories have been developed; furthermore, the international body of the Internet Governance Forum (IGF) came to life. N- withstanding the available literature on IGF, however, a thorough and systematic study sheding light on the main topics of Internet governance (such as legitimacy, transparency, accountability, and participation) and on the key regulatory issues (for example critical Internet resources, access, protection of civil liberties/- man rights, realization of security, safety and privacy standards, as well as the overcoming of the digital divide) from a legal perspective is not yet at hand. The present publication aims at discussing these legal challenges. This book has benefted from many inputs and encouragements from colleagues that I am deeply grateful for. In particular, I am indebted to the very meaningful discussions and valuable support in the preparation of the publication by my - search assistants lic. iur Mirin . a Grosz and lic. iurR . omana Weber, to lic. iur.
Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public. The establishment of the European Cybercrime Centre at Europol and the recent publication of guidelines on the prosecution of social media cases by the Director of Public Prosecutions serve as illustrations of the reach and impact of cybercrime related issues. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more important than ever for practitioners working in this area to stay up to date. Building on the detailed legal analysis in the first edition, this updated text remains the only comprehensive work to cover the complete lifecycle of cybercrimes, from their commission to their investigation and prosecution. With its clear and accesible structure, Computer Crimes and Digital Investigations provides essential guidance on the substantive and procedural aspects of cybercrimes for both experienced practitioners and for those new to the field. Substantial developments have occurred since the publication of the first edition of this work, in terms of the threats faced, the legislation and case law, and the response of law enforcement. The second edition will include new material on topics such as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception as well as expanded discussions of cyber security policy and laws, intermediary liability, developments in policing activities and prosecution policies, and developments in cross-border search and seizure and mutual legal assistance and extradition. An expanded comparative discussion of law and policy within the EU and under the Budapest Convention, as well as other international organisations such as the United Nations, places cybercrime in its international context.
Cybersecurity, data privacy law, and the related legal implications overlap into a relevant and developing area in the legal field. However, many legal practitioners lack the foundational understanding of computer processes which are fundamental for applying existing and developing legal structures to the issue of cybersecurity and data privacy. At the same time, those who work and research in cybersecurity are often unprepared and unaware of the nuances of legal application. This book translates the fundamental building blocks of data privacy and (cyber)security law into basic knowledge that is equally accessible and educational for those working and researching in either field, those who are involved with businesses and organizations, and the general public.
First published in 1997, this volume explores how we live in a society which is developing beyond human experience and comprehension - fast. Advances in technology and medicine are profoundly affecting the manner of human living from the beginning through to the end of life. These advances present exciting and demanding challenges to law-makers, policy-makers and healthcare providers, who make decisions about genetics, human reproduction, competence, medical treatment priorities and dying. They also compel us to pay attention to human rights. This international collection of essays combines the thoughts and ideas of women scholars writing about these complex developments and aims at provoking debate and dissension as well as an opportunity for reflection. The writers explore a range of common themes in different areas and provide a coherent framework for law and policy-making, to serve as a foundation for the challenges ahead.
In 1952, legal scholar and historian Frederick S. Siebert published
his monumental study of three centuries of press freedom in
England, in which he enunciated and supported two propositions that
were remarkable for their simplicity. The second of the
propositions has become a guiding principle in the study of free
expression. This special issue provides a remarkable body of work
focusing on this key proposition in the context of one of today's
great tragedies--September 11, 2001. It begins with an essay
examining cycles of stability/stress and the reactions to those
cycles, followed by the application of a concept to courtroom
access issues following September 11. The last two articles provide
an account of how times of stress--the period following the events
of September 11, in particular--inhibit academic freedom and an
overview of Siebert's life and work. |
![]() ![]() You may like...
AI, Data and Private Law - Translating…
Gary Chan Kok Yew, Man Yip
Hardcover
R3,453
Discovery Miles 34 530
Cyberlaw @ SA - The Law of the Internet…
S. Papadopoulos, S. Snail ka Mtuze
Paperback
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R819
Discovery Miles 8 190
Research Handbook on Contract Design
Marcelo Corrales Compagnucci, Helena Haapio, …
Hardcover
R6,711
Discovery Miles 67 110
|