![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This clearly written and well-focused volume combines concise decisions of the primary areas of communication law with the foundational case decisions in those domains. Thus, in one volume, students of communication law, constitutional law, political science, and related fields find both the key rulings that define each area of law and a detailed summary of the legal concepts, doctrines, and policies so vital to understanding the rulings within their legal context. The text forgoes the tendency to provide encyclopedic treatment of all the relevant cases and focuses instead on the two or three cases most vital to an accurate and informed understanding of the current state of each field of communication law. The chapters provide readers with the most salient concepts and the necessary depth to understand the law while permitting most reading time to be directed to the law itself. Full-text rulings allow readers to immerse themselves in the law itself--to develop a feel for its complexity, its flexibility, and its language. Useful as a quick reference to the landmark rulings and the jurisprudence of communication law, this book also serves well as the primary text in related undergraduate courses or as a supplemental text in graduate classes in the field.
The information society is a key issue in everyday life and a phenomenon enc- passing social, cultural, economic, and legal facettes. Currently, an information society's legal framework is gradually crystallizing under the newly introduced term of "Internet governance." During the last few years, intensive discussions about the contents of Internet governance have addressed manifold aspects of a possible regulatory regime. In light of the general comprehension that an international treaty structure is mi- ing and that self-regulation as a normative model does not sufce in all respects, new architectural and constitutional theories have been developed; furthermore, the international body of the Internet Governance Forum (IGF) came to life. N- withstanding the available literature on IGF, however, a thorough and systematic study sheding light on the main topics of Internet governance (such as legitimacy, transparency, accountability, and participation) and on the key regulatory issues (for example critical Internet resources, access, protection of civil liberties/- man rights, realization of security, safety and privacy standards, as well as the overcoming of the digital divide) from a legal perspective is not yet at hand. The present publication aims at discussing these legal challenges. This book has benefted from many inputs and encouragements from colleagues that I am deeply grateful for. In particular, I am indebted to the very meaningful discussions and valuable support in the preparation of the publication by my - search assistants lic. iur Mirin . a Grosz and lic. iurR . omana Weber, to lic. iur.
Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public. The establishment of the European Cybercrime Centre at Europol and the recent publication of guidelines on the prosecution of social media cases by the Director of Public Prosecutions serve as illustrations of the reach and impact of cybercrime related issues. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more important than ever for practitioners working in this area to stay up to date. Building on the detailed legal analysis in the first edition, this updated text remains the only comprehensive work to cover the complete lifecycle of cybercrimes, from their commission to their investigation and prosecution. With its clear and accesible structure, Computer Crimes and Digital Investigations provides essential guidance on the substantive and procedural aspects of cybercrimes for both experienced practitioners and for those new to the field. Substantial developments have occurred since the publication of the first edition of this work, in terms of the threats faced, the legislation and case law, and the response of law enforcement. The second edition will include new material on topics such as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception as well as expanded discussions of cyber security policy and laws, intermediary liability, developments in policing activities and prosecution policies, and developments in cross-border search and seizure and mutual legal assistance and extradition. An expanded comparative discussion of law and policy within the EU and under the Budapest Convention, as well as other international organisations such as the United Nations, places cybercrime in its international context.
First published in 1997, this volume explores how we live in a society which is developing beyond human experience and comprehension - fast. Advances in technology and medicine are profoundly affecting the manner of human living from the beginning through to the end of life. These advances present exciting and demanding challenges to law-makers, policy-makers and healthcare providers, who make decisions about genetics, human reproduction, competence, medical treatment priorities and dying. They also compel us to pay attention to human rights. This international collection of essays combines the thoughts and ideas of women scholars writing about these complex developments and aims at provoking debate and dissension as well as an opportunity for reflection. The writers explore a range of common themes in different areas and provide a coherent framework for law and policy-making, to serve as a foundation for the challenges ahead.
The Internet has created a formidable challenge for human rights law and practice worldwide. International scholarly and policy-oriented communities have so far established a consensus regarding only one main aspect - human rights in the internet are the same as offline. There are emerging and ongoing debates regarding not only the standards and methods to be used for achieving the "sameness" of rights online, but also whether "classical" human rights as we know them are contested by the online environment. The internet itself, in view of its cross-border nature and its ability to affect various areas of law, requires adopting an internationally oriented approach and a perspective strongly focused on social sciences. In particular, the rise of the internet, enhanced also by the influence of new technologies such as algorithms and intelligent artificial systems, has influenced individuals' civil, political and social rights not only in the digital world, but also in the atomic realm. As the coming of the internet calls into question well-established legal categories, a broader perspective than the domestic one is necessary to investigate this phenomenon. This book explores the main fundamental issues and practical dimensions related to the safeguarding of human rights in the internet, which are at the focus of current academic debates. It provides a comprehensive analysis with a forward-looking perspective of bringing order into the somewhat chaotic online dimension of human rights. It addresses the matter of private digital censorship, the apparent inefficiency of existing judicial systems to react to human rights violations online, the uncertainty of liability for online human rights violations, whether the concern with personal data protection overshadows multiple other human rights issues online and will be of value to those interested in human rights law and legal regulation of the internet.
In 1952, legal scholar and historian Frederick S. Siebert published
his monumental study of three centuries of press freedom in
England, in which he enunciated and supported two propositions that
were remarkable for their simplicity. The second of the
propositions has become a guiding principle in the study of free
expression. This special issue provides a remarkable body of work
focusing on this key proposition in the context of one of today's
great tragedies--September 11, 2001. It begins with an essay
examining cycles of stability/stress and the reactions to those
cycles, followed by the application of a concept to courtroom
access issues following September 11. The last two articles provide
an account of how times of stress--the period following the events
of September 11, in particular--inhibit academic freedom and an
overview of Siebert's life and work.
Tinker. R.A.V. Ollman. Hustler-Falwell. Reno-ACLU. Nebraska Press
Association. These names are synonymous with contemporary First
Amendment litigation. To explore these landmark cases more deeply,
author Joseph Russomanno interviewed the people at the core of
these and other influential First Amendment cases, and he presents
their stories here in a personal, in-depth oral history of First
Amendment law. Previously unavailable in other literature, these
stories go beyond the "what" of the cases and answer the "why" and
"how" of ten major cases from the latter part of the 20th century.
Through their own words and photographs, plaintiffs, defendants,
and their attorneys describe what it was like to be involved in the
development of these historic First Amendment cases.
Cybersecurity, data privacy law, and the related legal implications overlap into a relevant and developing area in the legal field. However, many legal practitioners lack the foundational understanding of computer processes which are fundamental for applying existing and developing legal structures to the issue of cybersecurity and data privacy. At the same time, those who work and research in cybersecurity are often unprepared and unaware of the nuances of legal application. This book translates the fundamental building blocks of data privacy and (cyber)security law into basic knowledge that is equally accessible and educational for those working and researching in either field, those who are involved with businesses and organizations, and the general public.
Economic regulation in the telecommunications sector can be performed through economy-wide instruments, such as antitrust law and antitrust authorities, or through sector-specific instruments, such as telecommunications regulation and regulatory authorities. Relying on a comparative analysis of five countries, the present book seeks to shed some light on the respective roles of both types of instruments in liberalized telecommunications markets.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it. Despite being ubiquitous, cyber technology is still seen as an enigma by many, mainly due to its rapid development and the high level of science involved. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further leads to various misconceptions and exaggerations. Cyber technology is the future, thus forcing us to understand this complex domain to survive and evolve as technological beings. To understand the enigma, the book analyzes and disentangles the issues related to cyber technology. The author unravels the threats that terrorize the cyber world and aims to decrypt its domain. It also presents the existing reality of cyber environment in India and charts out a few recommendations for enhancing the country's cyber security architecture. Further, the book delves into detailed analysis of various issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of countries like the US and China. Please note: Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka
In this exceptional volume, Matthew D. Bunker explores the work of
contemporary free speech critics and argues that, while at times
these critics provide important lessons, many of their conclusions
must be rejected. Moreover, Bunker suggests that we be wary of
interdisciplinary approaches to free speech theory that--by their
very assumptions and techniques--are a poor "fit" with existing
free speech theory and doctrine. In his investigation of diverse
critiques of free speech theory and his sophisticated rebuttal, he
provides an innovative and important examination of First Amendment
theory. In doing so, he establishes a new agenda for First
Amendment theory scholarship that incorporates some of the critics'
insights without abandoning the best aspects of the free speech
tradition.
Journalists have often lost constitutional rights for coverage and commentary during America's wars. Based on analysis of two hundred years of law and history, this study argues that press freedom cannot and should not be suspended during armed conflict. The military and the media must work together because neither has authority over the other.
This book provides an analysis of the legal and policy dimensions of open access to research, education and public sector information with a focus on Nigeria. Kunle shows how open access has evolved across the world and how such initiatives could be implemented in Nigeria and other countries in the developing world. The author argues for a platform where Nigerians are able to freely connect to the 'global library', through the open access dual platforms of self-archiving and open access publishing, thereby providing access to knowledge. The importance of connecting local works to the 'global library' to increase visibility and impact of such works is also underscored. This book furthers our understanding of open educational resources as alternative avenues to accessing education and seeks to foster citizenry participation, good governance, accountability, democratic values and spur creativity and innovation through open governance and access to public sector information. Providing a framework for open access in developing countries, Open Access to Knowledge in Nigeria is an important read for scholars interested in knowledge production in Africa, development of the knowledge economy and the open access and Access to Knowledge movements.
This study examines a key aspect of regulatory policy in the field of data protection, namely the frameworks governing the sharing of data for law enforcement purposes, both within the EU and between the EU and the US and other third party countries. The work features a thorough analysis of the main data-sharing instruments that have been used by law enforcement agencies and the intelligence services in the EU and in the US between 2001 to 2015. The study also explores the challenges to data protection which the current frameworks create, and explores the possible responses to those challenges at both EU and global levels. In offering a full overview of the current EU data-sharing instruments and their data protection rules, this book will be of significant benefit to scholars and policymakers working in areas related to privacy, data protection, national security and EU external relations.
Exploring Communication Law, Second Edition, provides an overview of the law as it pertains to print, broadcast, and online journalism, as well as non-journalistic forms of expression. It begins by introducing students to the First Amendment in a general sense, then explores how the principles of free speech are applied in various circumstances, such as political speech, sexual expression, and K-12 and college campuses. The text also explains the fundamentals of media law in areas such as defamation, privacy, the media and the courts, confidentiality and privilege, access to information, broadcasting, and cyberspace.
A broad explanation of the various dimensions of the problem of "bad" speech on the internet within the American context. One of the most fiercely debated issues of this era is what to do about "bad" speech-hate speech, disinformation and propaganda campaigns, and incitement of violence-on the internet, and in particular speech on social media platforms such as Facebook and Twitter. In Social Media, Freedom of Speech, and the Future of our Democracy, Lee C. Bollinger and Geoffrey R. Stone have gathered an eminent cast of contributors-including Hillary Clinton, Amy Klobuchar, Sheldon Whitehouse, Newt Minow, Cass Sunstein, Jack Balkin, Emily Bazelon, and others-to explore the various dimensions of this problem in the American context. They stress how difficult it is to develop remedies given that some of these forms of "bad" speech are ordinarily protected by the First Amendment. Bollinger and Stone argue that it is important to remember that the last time we encountered major new communications technology-television and radio-we established a federal agency to provide oversight and to issue regulations to protect and promote "the public interest." Featuring a variety of perspectives from some of America's leading experts on this hotly contested issue, this volume offers new insights for the future of free speech in the social media era.
Drones are taking the world by storm. The technology and laws governing them change faster than we can keep up with. The Big Book of Drones covers everything from drone law to laws on privacy, discussing the history and evolution of drones to where we are today. If you are new to piloting, it also covers how to fly a drone including a pre-flight checklist. For those who are interested in taking drones to the next level, we discuss how to build your own using a 3D printer as well as many challenging projects for your drone. For the truly advanced, The Big Book of Drones discusses how to hack a drone. This includes how to perform a replay attack, denial of service attack, and how to detect a drone and take it down. Finally, the book also covers drone forensics. This is a new field of study, but one that is steadily growing and will be an essential area of inquiry as drones become more prevalent.
Google's has proved to be one of the most successful business models in today's knowledge economy. Its services and applications have become part of our day-to-day life. However, Google has repeatedly been accused of acting outside the law in the development of services such as Adwords, Googlebooks or YouTube. One of the main purposes of this book is to assess whether those accusations are well-founded. But more important than that, this book provides a deeper reflection: are current legal systems adapted to business models such as that of Google or are they conceived for an industrial economy? Do the various lawsuits involving Google show an evolution of the existing legal framework that might favour the flourishing of other knowledge-economy businesses? Or do they simply reflect that Google has gone too far? What lessons can other knowledge-based businesses learn from all the disputes in which Google has been or is involved? This book is valuable reading for legal practitioners and academics in the field of information technologies and intellectual property law, economists interested in knowledge-economy business models and sociologists interested in internet and social networks. Dr. Aurelio Lopez-Tarruella is Senior Lecturer in Private International Law at the University of Alicante, Spain.
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementation This publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services. Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
This study examines a key aspect of regulatory policy in the field of data protection, namely the frameworks governing the sharing of data for law enforcement purposes, both within the EU and between the EU and the US and other third party countries. The work features a thorough analysis of the main data-sharing instruments that have been used by law enforcement agencies and the intelligence services in the EU and in the US between 2001 to 2015. The study also explores the challenges to data protection which the current frameworks create, and explores the possible responses to those challenges at both EU and global levels. In offering a full overview of the current EU data-sharing instruments and their data protection rules, this book will be of significant benefit to scholars and policymakers working in areas related to privacy, data protection, national security and EU external relations.
Publishing Law is an authoritative and engaging guide to a wide range of legal issues affecting publishing today. Hugh Jones and Christopher Benson present readers with clear and accessible guidance to the complex legal areas specific to the ever evolving world of contemporary publishing, including copyright, moral rights, contracts and licensing, privacy, confidentiality, defamation, infringement and trademarks, with analysis of legal issues relating to sales, advertising, marketing, distribution and competition. This new fifth edition presents updated coverage of the key principles of copyright , as well as new copyright exceptions, licensing and open access. There is also further in-depth coverage of the legal issues around the sale of digital content. Key features of the fifth edition include: updated coverage of EU and UK copyright, including a new chapter on copyright exceptions following the significant changes in the 2014 Regulations Comprehensive coverage of publishing contracts with authors, as well as with other providers, including translators, contributors and contracts for subsidiary rights up to date coverage of the Defamation Act 2013, and other changes to EU and UK legislation exploration of the legal issues relating to digital publishing, including eBook and other electronic agreements, data protection and online issues in relation to privacy, and copyright infringement a range of summary checklists on key issues, ranging from copyright ownership to promotion and data protection useful appendices offering an A to Z glossary of legal terms and lists of useful address and further reading.
Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.
All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another. Many of the essays look backwards through history or outwards across national borders. They all look forward to how today's policies will shape the future of the internet and society. A particular focus of interest for some of the contributors is the revelations that followed Edward Snowden's mass disclosure of classified documents in 2013, which revealed the U.S. National Security Agency's systematic and longstanding program of monitoring global communications. Some chapters consider different countries' varying approaches to regulating the proliferation of online communication, while others assess the current state of digital technology. They all call for policy interventions to solve market failures. This book was originally published as a special issue of Critical Studies in Media Communication. |
![]() ![]() You may like...
Modulation Spaces - With Applications to…
Arpad Benyi, Kasso A. Okoudjou
Hardcover
R2,860
Discovery Miles 28 600
Computability - Computable Functions…
Richard L. Epstein, Walter A. Carnielli
Hardcover
R1,312
Discovery Miles 13 120
Symmetries, Differential Equations and…
Victor G. Kac, Peter J. Olver, …
Hardcover
R4,354
Discovery Miles 43 540
|