![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This book asks a simple question: are the tech giants monopolies? In the current environment of suspicion towards the major technology companies as a result of concerns about their power and influence, it has become commonplace to talk of Google, Facebook, Amazon, Apple, Microsoft, or Netflix as the modern day version of the 19th century trusts. In turn, the tech giants are vilified for a whole range of monopoly harms towards consumers, workers and even the democratic process. In the US and the EU, antitrust, and regulatory reform is on the way. Using economics, business and management science as well legal reasoning, this book offers a new perspective on big tech. It builds a theory of "moligopoly". The theory advances that the tech giants, or at least some of them, coexist both as monopolies and oligopoly firms that compete against each other in an environment of substantial uncertainty and economic dynamism. With this, the book assesses ongoing antitrust and regulatory policy efforts. It demonstrates that it is counterproductive to pursue policies that introduce more rivalry in moligopoly markets subject to technological discontinuities. And that non-economic harms like privacy violations, fake news, or hate speech are difficult issues that belong to the realm of regulation, not antimonopoly remediation.
This brand new title brings together the different streams of the transfer landscape and outlines the separate legal rules all in one accessible place. Data transfers (under data protection legal rules) are one of the most discussed areas of data protection, and are currently undergoing mass change. Following on from Brexit, professionals now have more than one set of transfer rules to comply with, including: - New Adequacy Decision - New Standard Contracts - Forthcoming UK Contracts - Consultation on future laws
Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply with them. Where US organizations and businesses who collect or receive EU personal data fail to comply with the rule, the bottom line can suffer from very significant official fines and penalties, as well as from users, customers or representative bodies to pursuing litigation. This guide is essential for all US enterprises who directly or indirectly deal with EU personal data.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.
This volume focuses on the responsibilities of online service providers (OSPs) in contemporary societies. It examines the complexity and global dimensions of the rapidly evolving and serious challenges posed by the exponential development of Internet services and resources. It looks at the major actors - such as Facebook, Google, Twitter, and Yahoo! - and their significant influence on the informational environment and users' interactions within it, as well as the responsibilities and liabilities such influence entails. It discusses the position of OSPs as information gatekeepers and how they have gone from offering connecting and information-sharing services to paying members to providing open, free infrastructure and applications that facilitate digital expression and the communication of information. The book seeks consensus on the principles that should shape OSPs' responsibilities and practices, taking into account business ethics and policies. Finally, it discusses the rights of users and international regulations that are in place or currently lacking.
The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws (as part of Network Sovereignty policies) affect innovation in artificial intelligence (AI). The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017-2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the Cyber Security Law did not anticipate the changing nature of globalised AI innovation. It is argued that the deliberate deployment of what the book refers to as 'fuzzy logic' in drafting the Cyber Security Law allowed regulators to subsequently interpret key terms regarding data in that Law in a fluid and flexible fashion to benefit Chinese innovation.
Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.
This is the latest book from law and technology guru Richard Susskind, author of best-selling The Future of Law, bringing together in one volume eleven significant essays on the application of IT to legal practice and the administration of justice, including Susskind's very latest thinking on key topics such as knowledge management and the impact of electronic commerce and electronic government.
This book focuses on database law (a branch of intellectual property law) and further explores the legal protection currently available for data and data-related products in India. It offers a comparative study of the position of copyright law in protecting databases in the US and EU, while also presenting responses from the Indian database industry and its aspirations regarding the role of copyright law in database protection. India is undoubtedly leading the way as a knowledge economy. Its strengths are its information technology capability and its knowledge society, as well as its booming database industry - aspects that also necessitate the study of the role of law, as well as the protection of data and databases, in India. This book examines the growing importance of copyright law for protecting databases as well as for ensuring access in information societies. The book concludes with a discussion of key principles to be kept in mind in the context of drafting legal regimes for databases in India that will both benefit the database industry and ensure accessibility.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.
This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards, rules and guidelines in order to address cyber-threats and catch up with global trends and technological developments. A key focus is on specific countries' engagement in cyberattacks and the development of cyber-warfare capabilities. Further, the book demonstrates how a nation's technological advancement may not necessarily lead to cyber-superiority. It covers cybersecurity issues with regard to conflicts that shape relationships between major economies, and explains how attempts to secure the cyber domain have been hampered by the lack of an international consensus on key issues and concepts. The book also reveals how some economies are now facing a tricky trade-off between economically productive uses of emerging technologies and an enhanced cybersecurity profile. In the context of current paradigms related to the linkages between security and trade/investment, it also delves into new perspectives that are being brought to light by emerging cybersecurity issues.
The volume is devoted to the relevant problems in the legal sphere, created and generated by recent advances in science and technology. In particular, it investigates a series of cutting-edge contemporary and controversial case-studies where scientific and technological issues intersect with individual legal rights. The book addresses challenging topics at the intersection of communication technologies and biotech innovations such as freedom of expression, right to health, knowledge production, Internet content regulation, accessibility and freedom of scientific research.
This book investigates the intersection of terrorism, digital technologies and cyberspace. The evolving field of cyber-terrorism research is dominated by single-perspective, technological, political, or sociological texts. In contrast, Terrorism Online uses a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or addressed? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists and protest activities associated with 'hacktivist' groups to state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach to cyberterrorism which provides a unique and invaluable contribution to this subject matter. This book will be of great interest to students of cybersecurity, security studies, terrorism and International Relations.
The fifth edition of Information Technology Law continues to be dedicated to a detailed analysis of and commentary on the latest developments within this burgeoning field of law. It provides an essential read for all those interested in the interface between law and technology and the effect of new technological developments on the law. The contents have been restructured and the reordering of the chapters provides a coherent flow to the subject matter. Criminal law issues are now dealt with in two separate chapters to enable a more focused approach to content crime. The new edition contains both a significant amount of incremental change as well as substantial new material and, where possible, case studies have been used to illustrate significant issues. In particular, new additions include: * Social media and the criminal law; * The impact of the decision in Google Spain and the 'right to be forgotten'; * The Schrems case and the demise of the Safe Harbour agreement; * The judicial reassessment of the proportionality of ICT surveillance powers within the UK and EU post the Madrid bombings; * The expansion of the ICANN gTLDs and the redesigned domain name registration and dispute resolution processes.
This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy. It inquires into the physics, the technologies, the business models, the governmental strategies and last but not least the legal frameworks concerning access, organisation and control of information. It debates whether it is in the very nature of information to be either free or monopolized, or both. Analysing upcoming power structures, new types of colonization and attempts to replace legal norms with techno-nudging, this book also presents the idea of an infra-ethics capable of pre-empting our pre-emption. It discusses the interrelations between open access, the hacker ethos, the personal data economy, and freedom of information, highlighting the ephemeral but pivotal role played by information in a data-driven society. This book is a must-read for those working on the contemporary dimensions of freedom of information, data protection, and intellectual property rights.
This book presents groundbreaking discussions on e-residency, cryptocurrencies, scams, smart contracts, 3D printing, software agents, digital evidence and e-governance at the intersection of law, legal policies and modern technologies. The reader benefits from cutting-edge analyses that offer ideas and solutions to some of the most pressing issues caused by e-technologies. This collection is a useful tool for law and IT practitioners and an inspiring source for interdisciplinary research. Besides serving as a practical guideline, this book also reflects theoretical dimensions of future perspectives, as new technologies are not meant to change common values but to accommodate them.
This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called 'EU-cookie law' and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.
This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the book discusses the legal issues in smart grid implementations, particularly from a privacy (EU data protection) point of view.
On 25 January 2012, the European Commission presented its long awaited new "Data protection package". With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory network was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
This book analyses emerging constitutional principles addressing the regulation of the internet at both the national and the supranational level. These principles have arisen from cases involving the protection of fundamental rights. This is the reason why the book explores the topic thorough the lens of constitutional adjudication, developing an analysis of Courts' argumentation. The volume examines the gradual consolidation of a "constitutional core" of internet law at the supranational level. It addresses the European Court of Human Rights and the Court of Justice of the European Union case law, before going on to explore Constitutional or Supreme Courts' decisions in individual jurisdictions in Europe and the US. The contributions to the volume discuss the possibility of the "constitutionalization" of internet law, calling into question the thesis of the so-called anarchic nature of the internet.
The classification of services in the digital economy proves critical for doing business, but it appears to be a particularly complex regulatory matter that is based upon a manifold set of issues. In the context of the General Agreement on Trade in Services (GATS), when the services classification scheme was drafted in the early 1990s, convergence processes had not unfolded yet and the internet was still in its infancy and not a reality in daily life. Therefore, policy makers are now struggling with the problem of regulating trade in electronic services and are in search of a future-oriented solution for classifying them in multilateral and preferential trade agreements. In late fall 2011, the authors of this study were mandated by the European Union, Delegation to Vietnam, in the context of the Multilateral Trade Assistance Project 3 (MUTRAP 3), to work out a report clarifying the classification of services in the information/digital economy and to assess the impact of any decision regarding the classifications on the domestic and external relations policy of Vietnam, as well as to discuss the relevant issues with local experts during three on-site visits.
Crossroads in New Media, Identity and Law is a compilation of essays on the nexus of new information and communication technologies, cultural identity, law and politics. The essays provoke timely discussions on how these different spheres affect each other and co-evolve in our increasingly hyper-connected and globalized world.
In many respects cyberspace has created a new world. The online phenomena encompass social, cultural, economic, and legal facets. Exceeding the present Internet Governance concept the book analyses the normative foundations and guiding principles of a global cyberspace regime that includes the exchange of people, businesses, governments, and other entities. Based on this assessment and philosophical theories the book attempts to outline a model for a general legal framework enshrining key principles of civil society (such as human rights, ethics). The proposed global framework, not in the form of a multilateral treaty but a morally convincing declaration, could then be complemented by additional polycentric regulations with binding effect, developed on the basis of multistakeholder participation in a multi-layer concept.
Exploring Communication Law, Second Edition, provides an overview of the law as it pertains to print, broadcast, and online journalism, as well as non-journalistic forms of expression. It begins by introducing students to the First Amendment in a general sense, then explores how the principles of free speech are applied in various circumstances, such as political speech, sexual expression, and K-12 and college campuses. The text also explains the fundamentals of media law in areas such as defamation, privacy, the media and the courts, confidentiality and privilege, access to information, broadcasting, and cyberspace.
Through a comparison of the telecommunications sectors in four small EU-countries, an outstanding cast of contributors explore how regulatory authorities at international, EU-, national and regional level within and between sectors coordinate their regulatory decisions in order to provide coherent regulation of markets. |
![]() ![]() You may like...
Cyberlaw @ SA - The Law of the Internet…
S. Papadopoulos, S. Snail ka Mtuze
Paperback
R1,126
Discovery Miles 11 260
Bioinformatics, Medical Informatics and…
Jorge L. Contreras, A.J. Cuticchia, …
Hardcover
R4,621
Discovery Miles 46 210
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R776
Discovery Miles 7 760
Research Handbook on Contract Design
Marcelo Corrales Compagnucci, Helena Haapio, …
Hardcover
R6,321
Discovery Miles 63 210
Blockchain and Public Law - Global…
Oreste Pollicino, Giovanni De Gregorio
Hardcover
R3,066
Discovery Miles 30 660
|