![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Originality is an important element in different branches of law. For instance, under Belgian contract law, a written mutual agreement must be drafted in as many originals as there are parties. In other branches of law, there are requirements for the preservation of original documents. However, while originality may be an element common to different branches of law, there are clear indications that the precise meaning of this notion may be rather divergent between them. Moreover, the introduction of digital processes in many aspects of law has provided another dimension to this matter, as originality remains a difficult element to apply in the realm of electronic information.Currently, there are little to no guidelines on how to establish when electronic information is original and when it is not. Therefore, it is the aim of this book to analyse a select number of incarnations of the originality requirement in different branches of Belgian law in order to establish whether common elements or a common root can be found. These findings will subsequently be applied to the practice of digitalization in law in order to gain a better understanding of how the concept of originality should be interpreted in this matter.At a time when issues arising from digitalization in law are increasingly prevalent, this book aims to provide the reader with an examination of the current situation and attempts to find a uniform legal definition for the concept of originality that would be applicable across different branches of law.
This book provides a comparison and practical guide for academics, students, and the business community of the current data protection laws in selected Asia Pacific countries (Australia, India, Indonesia, Japan Malaysia, Singapore, Thailand) and the European Union. The book shows how over the past three decades the range of economic, political, and social activities that have moved to the internet has increased significantly. This technological transformation has resulted in the collection of personal data, its use and storage across international boundaries at a rate that governments have been unable to keep pace. The book highlights challenges and potential solutions related to data protection issues arising from cross-border problems in which personal data is being considered as intellectual property, within transnational contracts and in anti-trust law. The book also discusses the emerging challenges in protecting personal data and promoting cyber security. The book provides a deeper understanding of the legal risks and frameworks associated with data protection law for local, regional and global academics, students, businesses, industries, legal profession and individuals.
This book brings together a series of contributions by leading scholars and practitioners to examine the main features of smart contracts, as well as the response of key stakeholders in technology, business, government and the law. It explores how this new technology interfaces with the goals and content of contract law, introducing and evaluating several mechanisms to improve the 'observability' and reduce the costs of verifying contractual obligations and performance. It also outlines various 'design patterns' that ensure that end users are protected from themselves, prevent cognitive accidents, and translate expectations and values into more user-oriented agreements. Furthermore, the chapters map the new risks associated with smart contracts, particularly for consumers, and consider how they might be alleviated. The book also discusses the challenge of integrating data protection and privacy concerns into the design of these agreements and the broad range of legal knowledge and skills required. The case for using smart contracts goes beyond 'contracts' narrowly defined, and they are increasingly used to disrupt traditional models of business organisation. The book discusses so-called decentralised autonomous organisations and decentralised finance as illustrations of this trend. This book is designed for those interested in looking to deepen their understanding of this game-changing new legal technology.
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artefact correlation.
Social media hasn't just changed society-it's changing the way in which criminal law is prosecuted, defended, and adjudicated. This fascinating book explains how. While social media has become embedded in our society as a way to stay connected with friends, it serves another important purpose: to support the prosecution and defense of criminal cases. Social media is now used as proof of a crime; further, social media has become a vehicle for criminal activity. How should the law respond to the issue of online predators, stalkers, and identity thieves? This book comprehensively examines the complex impacts of social media on the major players in the criminal justice system: private citizens, attorneys, law enforcement officials, and judges. It outlines the many ways social media affects the judicial process, citing numerous example cases that demonstrate the legal challenges; and examines the issue from all sides, including law enforcement's role, citizens' privacy issues, and the principles of the Fourth Amendment. The author also shines a critical spotlight on how social media has enabled new types of investigations previously unimagined-some of which present ethical problems. Examines the criminal justice system from multiple perspectives in order to give fair attention to the successful uses of social media as well as the abuses Comprehensively covers current issues that have broad, long-term repercussions for the criminal justice system Provides a convenient overview of all the information related to social media and criminal law in one place Cites relevant cases and statutes
This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law.
Google's has proved to be one of the most successful business models in today's knowledge economy. Its services and applications have become part of our day-to-day life. However, Google has repeatedly been accused of acting outside the law in the development of services such as Adwords, Googlebooks or YouTube. One of the main purposes of this book is to assess whether those accusations are well-founded. But more important than that, this book provides a deeper reflection: are current legal systems adapted to business models such as that of Google or are they conceived for an industrial economy? Do the various lawsuits involving Google show an evolution of the existing legal framework that might favour the flourishing of other knowledge-economy businesses? Or do they simply reflect that Google has gone too far? What lessons can other knowledge-based businesses learn from all the disputes in which Google has been or is involved? This book is valuable reading for legal practitioners and academics in the field of information technologies and intellectual property law, economists interested in knowledge-economy business models and sociologists interested in internet and social networks. Dr. Aurelio Lopez-Tarruella is Senior Lecturer in Private International Law at the University of Alicante, Spain.
The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.
On 25 January 2012, the European Commission presented its long awaited new "Data protection package". With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory network was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.
This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy. It inquires into the physics, the technologies, the business models, the governmental strategies and last but not least the legal frameworks concerning access, organisation and control of information. It debates whether it is in the very nature of information to be either free or monopolized, or both. Analysing upcoming power structures, new types of colonization and attempts to replace legal norms with techno-nudging, this book also presents the idea of an infra-ethics capable of pre-empting our pre-emption. It discusses the interrelations between open access, the hacker ethos, the personal data economy, and freedom of information, highlighting the ephemeral but pivotal role played by information in a data-driven society. This book is a must-read for those working on the contemporary dimensions of freedom of information, data protection, and intellectual property rights.
Law and the Technologies of the Twenty-First Century provides a contextual account of the way in which law functions in a broader regulatory environment across different jurisdictions. It identifies and clearly structures the four key challenges that technology poses to regulatory efforts, distinguishing between technology as a regulatory target and tool, and guiding the reader through an emerging field that is subject to rapid change. By extensive use of examples and extracts from the texts and materials that form and shape the scholarly and public debates over technology regulation, it presents complex material in a stimulating and engaging manner. Co-authored by a leading scholar in the field with a scholar new to the area, it combines comprehensive knowledge of the field with a fresh approach. This is essential reading for students of law and technology, risk regulation, policy studies, and science and technology studies.
This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the book discusses the legal issues in smart grid implementations, particularly from a privacy (EU data protection) point of view.
Cryptoassets represent one of the most high profile financial products in the world, and fastest growing financial products in history. From Bitcoin, Etherium and Ripple's XRP-so called "utility tokens" used to access financial services-to initial coin offerings that in 2017 rivalled venture capital in money raised for startups, with an estimated $5.6 billion (USD) raised worldwide across 435 ICOs. All the while, technologists have hailed the underlying blockchain technology for these assets as potentially game changing applications for financial payments and record-keeping. At the same time, cryptoassets have produced considerable controversy. Many have turned out to be lacklustre investments for investors. Others, especially ICOs, have also attracted noticeable fraud, failing firms, and alarming lapses in information-sharing with investors. Consequently, many commentators around the world have pressed that ICO tokens be considered securities, and that concomitant registration and disclosure requirements attach to their sales to the public. This volume assembles an impressive group of scholars, businesspersons and regulators to collectively write on cryptoassets. This volume represents perspectives from across the regulatory ecosystem, and includes technologists, venture capitalists, scholars, and practitioners in securities law and central banking.
Chris Marsden argues that co-regulation is the defining feature of the Internet in Europe. Co-regulation offers the state a route back into questions of legitimacy, governance and human rights, thereby opening up more interesting conversations than a static no-regulation versus state regulation binary choice. The basis for the argument is empirical investigation, based on a multi-year, European Commission-funded study and is further reinforced by the direction of travel in European and English law and policy, including the Digital Economy Act 2010. He places Internet regulation within the regulatory mainstream, as an advanced technocratic form of self- and co-regulation which requires governance reform to address a growing constitutional legitimacy gap. The literature review, case studies and analysis shed a welcome light on policymaking at the centre of Internet regulation in Brussels, London and Washington, revealing the extent to which states, firms and, increasingly, citizens are developing a new type of regulatory bargain.
The classification of services in the digital economy proves critical for doing business, but it appears to be a particularly complex regulatory matter that is based upon a manifold set of issues. In the context of the General Agreement on Trade in Services (GATS), when the services classification scheme was drafted in the early 1990s, convergence processes had not unfolded yet and the internet was still in its infancy and not a reality in daily life. Therefore, policy makers are now struggling with the problem of regulating trade in electronic services and are in search of a future-oriented solution for classifying them in multilateral and preferential trade agreements. In late fall 2011, the authors of this study were mandated by the European Union, Delegation to Vietnam, in the context of the Multilateral Trade Assistance Project 3 (MUTRAP 3), to work out a report clarifying the classification of services in the information/digital economy and to assess the impact of any decision regarding the classifications on the domestic and external relations policy of Vietnam, as well as to discuss the relevant issues with local experts during three on-site visits.
Exploring Communication Law, Second Edition, provides an overview of the law as it pertains to print, broadcast, and online journalism, as well as non-journalistic forms of expression. It begins by introducing students to the First Amendment in a general sense, then explores how the principles of free speech are applied in various circumstances, such as political speech, sexual expression, and K-12 and college campuses. The text also explains the fundamentals of media law in areas such as defamation, privacy, the media and the courts, confidentiality and privilege, access to information, broadcasting, and cyberspace.
The development of new technologies places new challenges to the interpretation and implementation of legislation in the information society. The recent deployment of service-oriented computing and cloud computing for online commercial activities has urged countries to amend existing legislation and launch new regulations. With the exponential growth of international electronic commercial transactions, a consistent global standard of regulating the legal effects of electronic communications, the protection of data privacy security and the effectiveness of Internet-related dispute resolution are motivating factors to build users' trust and confidence in conducting cross-border business and their sharing information online. The second edition of this book continues taking a 'solutions to obstacles' approach and analyses the main legal obstacles to the establishment of trust and confidence in undertaking business online. In comparing the legislative frameworks of e-commerce in the EU, US, China and International Organisations, the book sets out solutions to modernise and harmonise laws at the national, regional and international levels in response to current technological developments. It specifically provides information on the key legal challenges caused by the increasing popularity of service-oriented computing and cloud computing as well as the growing number of cross-border transactions and its relation to data privacy protection, Internet jurisdiction, choice of law and online dispute resolution. It considers how greater legal certainty can be achieved in cloud computing service contracts and other agreements resulted in service-oriented computing. The second edition of Law of Electronic Commercial Transactions is a clear and up to date account of a fast-moving area of study. It will be of great value to legislators, politicians, practitioners, scholars, businesses, individuals, postgraduate and undergraduate students. It provides in-depth research into finding solutions to remove eight generic legal obstacles in electronic commercial transactions and offers insights into policy making, law reforms, regulatory developments and self-protection awareness.
The internet has the potential to increase the number of cross-border disputes between a wide range of different users. For many internet disputes, the use of Online Dispute Resolution (ODR) becomes critical. ODR uses information technology (such as expert systems) and internet communication applications (such as webforms or web filing platforms) to resolve disputes outside the courts. Although ODR is a progeny of ADR, using some of the same processes such as mediation and arbitration, ODR is also different in that it adds new and transformative technology and processes. This book, first published in 2009, sets out the process standards with which ODR, and in particular online arbitration, should comply and shows how these standards can be implemented in the real world. It considers applicable law and enforcement, thus providing a blueprint of how online arbitration processes should be devised.
European broadcasting policy has attracted attention from many disciplines because it has dual nature: cultural and commercial. This book offers a detailed treatment of European broadcasting law, set against an overview of policy in this area. In this respect the authors identify tensions within the EU polity as regards the appropriate level, purpose and mechanism of broadcast regulation. Key influences are problems of competence, the impact of changing technology and the consequences of increasing commercialisation. Furthermore, the focus of the analysis is on the practical implications of the legal framework on viewers, and the authors distinguish both between citizen and consumer and between the passive and active viewer. The underlying question is the extent to which those most in need of protection by regulation, given the purpose of broadcasting, are adequately protected.
Which state has and should have the right and power to regulate sites and online events? Who can apply their defamation or contract law, obscenity standards, gambling or banking regulation, pharmaceutical licensing requirements or hate speech prohibitions to any particular Internet activity? Traditionally, transnational activity has been 'shared out' between national sovereigns with the aid of location-centric rules which can be adjusted to the transnational Internet. But can these allocation rules be stretched indefinitely, and what are the costs for online actors and for states themselves of squeezing global online activity into nation-state law? Does the future of online regulation lie in global legal harmonisation or is it a cyberspace that increasingly mirrors the national borders of the offline world? This 2007 book offers some uncomfortable insights into one of the most important debates on Internet governance.
It’s been ten years since open data first broke onto the global stage. Over the past decade, thousands of programmes and projects around the world have worked to open data and use it to address a myriad of social and economic challenges. Meanwhile, issues related to data rights and privacy have moved to the centre of public and political discourse. As the open data movement enters a new phase in its evolution, shifting to target real-world problems and embed open data thinking into other existing or emerging communities of practice, big questions still remain. How will open data initiatives respond to new concerns about privacy, inclusion, and artificial intelligence? And what can we learn from the last decade in order to deliver impact where it is most needed? The State of Open Data brings together over 60 authors from around the world to address these questions and to take stock of the real progress made to date across sectors and around the world, uncovering the issues that will shape the future of open data in the years to come.
Providing a scholarly analysis of how to govern and make the right
kinds of laws for cyberspace, in this work, Professor Reed
investigates the vast majority of cyberspace users who wish to act
lawfully and asks whether the current state of law in cyberspace
makes it possible for them to do so. If not, why not, and what is
the cure?
The common fallacy regarding cyberspace is that the Internet is a new jurisdiction, in which none of the existing rules and regulations apply. However, all the actors involved in an Internet transaction live in one or more existing jurisdictions, so rather than being unregulated, the Internet is arguably highly regulated. Worse, much of this law and regulation is contradictory and difficult, or impossible, to comply with. This 2004 book takes a global view of the fundamental legal issues raised by the advent of the Internet as an international communications mechanism. Legal and other materials are integrated to support the discussion of how technological, economic and political factors are shaping the law governing the Internet. Global trends in legal issues are addressed and the effectiveness of potential mechanisms for legal change that are applicable to Internet law are also examined. Of interest to students and practitioners in computer and electronic commerce law. |
You may like...
Design of Intelligent Multi-Agent…
Rajiv Khosla, Nikhil Ichalkaranje
Hardcover
R4,262
Discovery Miles 42 620
Advanced Methodologies and Technologies…
D.B.A., Mehdi Khosrow-Pour,
Hardcover
R9,085
Discovery Miles 90 850
The Art of Therapeutic Communication…
Saralee Kane, Karen Olness
Hardcover
R1,158
Discovery Miles 11 580
|