![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This book considers a new approach to online copyright infringement. Rather than looking at the subject within a purely technological context, it provides legal analysis from a human perspective. This book highlights that there are three key instances in which the capacity of a human mind intersects with the development of copyright regulation: (1) the development of copyright statutory law; (2) the interpretation of the copyright statutory law the judiciary; and (3) human interaction with new technology. Using a novel framework for constructing digital perspectives, the author, Dr Hayleigh Bosher, analyses the laws relating to online copyright infringement. She provides insights into why the law appears as it does, shedding light on the circumstances of how it came to pass and demonstrates a clear malfunction in the interpretation and application of copyright law to online activities that derives from the disconnect between the technological and the human perspectives. The book proposes putting the human element back into copyright analysis to enable the return of reason where it has been lost, and provide a clearer, more consistent and fair legal regulation of online copyright infringement. Law, Technology and Cognition: The Human Element in Online Copyright Infringement will be of interest to students, academics, researchers, as well as practitioners.
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.
In 1952, legal scholar and historian Frederick S. Siebert published
his monumental study of three centuries of press freedom in
England, in which he enunciated and supported two propositions that
were remarkable for their simplicity. The second of the
propositions has become a guiding principle in the study of free
expression. This special issue provides a remarkable body of work
focusing on this key proposition in the context of one of today's
great tragedies--September 11, 2001. It begins with an essay
examining cycles of stability/stress and the reactions to those
cycles, followed by the application of a concept to courtroom
access issues following September 11. The last two articles provide
an account of how times of stress--the period following the events
of September 11, in particular--inhibit academic freedom and an
overview of Siebert's life and work.
Tinker. R.A.V. Ollman. Hustler-Falwell. Reno-ACLU. Nebraska Press
Association. These names are synonymous with contemporary First
Amendment litigation. To explore these landmark cases more deeply,
author Joseph Russomanno interviewed the people at the core of
these and other influential First Amendment cases, and he presents
their stories here in a personal, in-depth oral history of First
Amendment law. Previously unavailable in other literature, these
stories go beyond the "what" of the cases and answer the "why" and
"how" of ten major cases from the latter part of the 20th century.
Through their own words and photographs, plaintiffs, defendants,
and their attorneys describe what it was like to be involved in the
development of these historic First Amendment cases.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it. Despite being ubiquitous, cyber technology is still seen as an enigma by many, mainly due to its rapid development and the high level of science involved. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further leads to various misconceptions and exaggerations. Cyber technology is the future, thus forcing us to understand this complex domain to survive and evolve as technological beings. To understand the enigma, the book analyzes and disentangles the issues related to cyber technology. The author unravels the threats that terrorize the cyber world and aims to decrypt its domain. It also presents the existing reality of cyber environment in India and charts out a few recommendations for enhancing the country's cyber security architecture. Further, the book delves into detailed analysis of various issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of countries like the US and China. Please note: Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka
Economic regulation in the telecommunications sector can be performed through economy-wide instruments, such as antitrust law and antitrust authorities, or through sector-specific instruments, such as telecommunications regulation and regulatory authorities. Relying on a comparative analysis of five countries, the present book seeks to shed some light on the respective roles of both types of instruments in liberalized telecommunications markets.
In this exceptional volume, Matthew D. Bunker explores the work of
contemporary free speech critics and argues that, while at times
these critics provide important lessons, many of their conclusions
must be rejected. Moreover, Bunker suggests that we be wary of
interdisciplinary approaches to free speech theory that--by their
very assumptions and techniques--are a poor "fit" with existing
free speech theory and doctrine. In his investigation of diverse
critiques of free speech theory and his sophisticated rebuttal, he
provides an innovative and important examination of First Amendment
theory. In doing so, he establishes a new agenda for First
Amendment theory scholarship that incorporates some of the critics'
insights without abandoning the best aspects of the free speech
tradition.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
Journalists have often lost constitutional rights for coverage and commentary during America's wars. Based on analysis of two hundred years of law and history, this study argues that press freedom cannot and should not be suspended during armed conflict. The military and the media must work together because neither has authority over the other.
Cybersecurity, data privacy law, and the related legal implications overlap into a relevant and developing area in the legal field. However, many legal practitioners lack the foundational understanding of computer processes which are fundamental for applying existing and developing legal structures to the issue of cybersecurity and data privacy. At the same time, those who work and research in cybersecurity are often unprepared and unaware of the nuances of legal application. This book translates the fundamental building blocks of data privacy and (cyber)security law into basic knowledge that is equally accessible and educational for those working and researching in either field, those who are involved with businesses and organizations, and the general public.
This book provides an analysis of the legal and policy dimensions of open access to research, education and public sector information with a focus on Nigeria. Kunle shows how open access has evolved across the world and how such initiatives could be implemented in Nigeria and other countries in the developing world. The author argues for a platform where Nigerians are able to freely connect to the 'global library', through the open access dual platforms of self-archiving and open access publishing, thereby providing access to knowledge. The importance of connecting local works to the 'global library' to increase visibility and impact of such works is also underscored. This book furthers our understanding of open educational resources as alternative avenues to accessing education and seeks to foster citizenry participation, good governance, accountability, democratic values and spur creativity and innovation through open governance and access to public sector information. Providing a framework for open access in developing countries, Open Access to Knowledge in Nigeria is an important read for scholars interested in knowledge production in Africa, development of the knowledge economy and the open access and Access to Knowledge movements.
This study examines a key aspect of regulatory policy in the field of data protection, namely the frameworks governing the sharing of data for law enforcement purposes, both within the EU and between the EU and the US and other third party countries. The work features a thorough analysis of the main data-sharing instruments that have been used by law enforcement agencies and the intelligence services in the EU and in the US between 2001 to 2015. The study also explores the challenges to data protection which the current frameworks create, and explores the possible responses to those challenges at both EU and global levels. In offering a full overview of the current EU data-sharing instruments and their data protection rules, this book will be of significant benefit to scholars and policymakers working in areas related to privacy, data protection, national security and EU external relations.
Exploring Communication Law, Second Edition, provides an overview of the law as it pertains to print, broadcast, and online journalism, as well as non-journalistic forms of expression. It begins by introducing students to the First Amendment in a general sense, then explores how the principles of free speech are applied in various circumstances, such as political speech, sexual expression, and K-12 and college campuses. The text also explains the fundamentals of media law in areas such as defamation, privacy, the media and the courts, confidentiality and privilege, access to information, broadcasting, and cyberspace.
Drones are taking the world by storm. The technology and laws governing them change faster than we can keep up with. The Big Book of Drones covers everything from drone law to laws on privacy, discussing the history and evolution of drones to where we are today. If you are new to piloting, it also covers how to fly a drone including a pre-flight checklist. For those who are interested in taking drones to the next level, we discuss how to build your own using a 3D printer as well as many challenging projects for your drone. For the truly advanced, The Big Book of Drones discusses how to hack a drone. This includes how to perform a replay attack, denial of service attack, and how to detect a drone and take it down. Finally, the book also covers drone forensics. This is a new field of study, but one that is steadily growing and will be an essential area of inquiry as drones become more prevalent.
Google's has proved to be one of the most successful business models in today's knowledge economy. Its services and applications have become part of our day-to-day life. However, Google has repeatedly been accused of acting outside the law in the development of services such as Adwords, Googlebooks or YouTube. One of the main purposes of this book is to assess whether those accusations are well-founded. But more important than that, this book provides a deeper reflection: are current legal systems adapted to business models such as that of Google or are they conceived for an industrial economy? Do the various lawsuits involving Google show an evolution of the existing legal framework that might favour the flourishing of other knowledge-economy businesses? Or do they simply reflect that Google has gone too far? What lessons can other knowledge-based businesses learn from all the disputes in which Google has been or is involved? This book is valuable reading for legal practitioners and academics in the field of information technologies and intellectual property law, economists interested in knowledge-economy business models and sociologists interested in internet and social networks. Dr. Aurelio Lopez-Tarruella is Senior Lecturer in Private International Law at the University of Alicante, Spain.
This study examines a key aspect of regulatory policy in the field of data protection, namely the frameworks governing the sharing of data for law enforcement purposes, both within the EU and between the EU and the US and other third party countries. The work features a thorough analysis of the main data-sharing instruments that have been used by law enforcement agencies and the intelligence services in the EU and in the US between 2001 to 2015. The study also explores the challenges to data protection which the current frameworks create, and explores the possible responses to those challenges at both EU and global levels. In offering a full overview of the current EU data-sharing instruments and their data protection rules, this book will be of significant benefit to scholars and policymakers working in areas related to privacy, data protection, national security and EU external relations.
All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another. Many of the essays look backwards through history or outwards across national borders. They all look forward to how today's policies will shape the future of the internet and society. A particular focus of interest for some of the contributors is the revelations that followed Edward Snowden's mass disclosure of classified documents in 2013, which revealed the U.S. National Security Agency's systematic and longstanding program of monitoring global communications. Some chapters consider different countries' varying approaches to regulating the proliferation of online communication, while others assess the current state of digital technology. They all call for policy interventions to solve market failures. This book was originally published as a special issue of Critical Studies in Media Communication.
Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.
Publishing Law is an authoritative and engaging guide to a wide range of legal issues affecting publishing today. Hugh Jones and Christopher Benson present readers with clear and accessible guidance to the complex legal areas specific to the ever evolving world of contemporary publishing, including copyright, moral rights, contracts and licensing, privacy, confidentiality, defamation, infringement and trademarks, with analysis of legal issues relating to sales, advertising, marketing, distribution and competition. This new fifth edition presents updated coverage of the key principles of copyright , as well as new copyright exceptions, licensing and open access. There is also further in-depth coverage of the legal issues around the sale of digital content. Key features of the fifth edition include: updated coverage of EU and UK copyright, including a new chapter on copyright exceptions following the significant changes in the 2014 Regulations Comprehensive coverage of publishing contracts with authors, as well as with other providers, including translators, contributors and contracts for subsidiary rights up to date coverage of the Defamation Act 2013, and other changes to EU and UK legislation exploration of the legal issues relating to digital publishing, including eBook and other electronic agreements, data protection and online issues in relation to privacy, and copyright infringement a range of summary checklists on key issues, ranging from copyright ownership to promotion and data protection useful appendices offering an A to Z glossary of legal terms and lists of useful address and further reading.
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementation This publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services. Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
The book addresses representation of the public interest in Internet standard developing organisations (SDOs). Much of the existing literature on Internet governance focuses on international organisations such as the United Nations (UN), the Internet Governance Forum (IGF) and the Internet Corporation for Assigned Names and Numbers (ICANN). The literature covering standard developing organisations has to date focused on organisational aspects. This book breaks new ground with investigation of standard development within SDO fora. Case studies centre on standards relating to privacy and security, mobile communications, Intellectual Property Rights (IPR) and copyright. The book lifts the lid on internet standard setting with detailed insight into a world which, although highly technical, very much affects the way in which citizens live and work on a daily basis. In doing this it adds significantly to the trajectory of research on Internet standards and SDOs that explore the relationship between politics and protocols. The analysis contributes to academic debates on democracy and the internet, global self-regulation and civil society, and international decision-making processes in unstructured environments. The book advances work on the Multiple Streams Framework (MS) by applying it to decision-making in non-state environments, namely SDOs which have long been dominated by private actors. The book is aimed at academic audiences in political science, computer science, communications, and science and technology studies as well as representatives from civil society, the civil service, government, engineers and experts working within SDO fora. It will also be accessible to students at the postgraduate and undergraduate levels.
A broad explanation of the various dimensions of the problem of "bad" speech on the internet within the American context. One of the most fiercely debated issues of this era is what to do about "bad" speech-hate speech, disinformation and propaganda campaigns, and incitement of violence-on the internet, and in particular speech on social media platforms such as Facebook and Twitter. In Social Media, Freedom of Speech, and the Future of our Democracy, Lee C. Bollinger and Geoffrey R. Stone have gathered an eminent cast of contributors-including Hillary Clinton, Amy Klobuchar, Sheldon Whitehouse, Newt Minow, Cass Sunstein, Jack Balkin, Emily Bazelon, and others-to explore the various dimensions of this problem in the American context. They stress how difficult it is to develop remedies given that some of these forms of "bad" speech are ordinarily protected by the First Amendment. Bollinger and Stone argue that it is important to remember that the last time we encountered major new communications technology-television and radio-we established a federal agency to provide oversight and to issue regulations to protect and promote "the public interest." Featuring a variety of perspectives from some of America's leading experts on this hotly contested issue, this volume offers new insights for the future of free speech in the social media era.
The tension between freedom of expression and European personal data protection regulation is unmistakable. Nowhere is this more apparent than in its interface with professional journalism and other traditional publishers including artists, writers and academics. This book systematically explores how that tension has been managed across thirty-one European States from the 1970s through to the 2010s including under the General Data Protection Regulation (GDPR). It is found that, notwithstanding confusing laws, data authorities have regulated journalism through contextual rights balancing. However, they have struggled to establish a clear standard of strictness or ensure consistent enforcement. Their stance regarding other publishers has been more confused - whilst academics have been subject to onerous restrictions developed for medical and related research, other writers and artists have been largely ignored. This book suggests that contextual rights balancing should be extended to all traditional publishers and systematically developed through robust co-regulation that draws on the strength of both statutory control and self-regulation. |
![]() ![]() You may like...
Handbook on the Toxicology of Metals…
Gunnar F. Nordberg, Max Costa
Hardcover
R4,221
Discovery Miles 42 210
Statistical Modeling in Biomedical…
Yichuan Zhao, Ding-Geng (Din) Chen
Hardcover
R2,967
Discovery Miles 29 670
Targeting Chronic Inflammatory Lung…
Kamal Dua, Philip M. Hansbro, …
Paperback
R4,285
Discovery Miles 42 850
|