![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
The desire for humanity and the desire for security have co-existed as long as humans have been alive. As science has become increasingly sophisticated, so have the methods of self-defence by States. Nanotechnology is already changing warfare by increasing capabilities upon which armed forces are heavily reliant: more efficient energy storage, advanced photovoltaics, and improved military protective equipment to name a few of these developments. Some applications of nanomaterials by the military are both powerful and subtle, and have neurological and biological applications: 'devices that can infiltrate electronics and seize control at crucial moments, artificial "disease" agents that can rest harmlessly in victims' bodies until activated by an external signal'. The advance of the use or contemplation of use of these types of nanoscale applications by the military requires urgent analysis in light of existing international law, particularly in light of their potential effects on humans and on the environment.
The internet is now a key part of everyday life across the developed world, and growing rapidly across developing countries. This Handbook provides a comprehensive overview of the latest research on internet governance, written by the leading scholars in the field.With an international focus, it features contributions from lawyers, economists and political scientists across North America, Europe and Australia. They adopt a broad multidisciplinary perspective, taking in law, economics, political science, international relations, and communications studies. Thought-provoking chapters cover topics such as ICANN, the Internet Governance Forum, grassroots activism, innovation, human rights, privacy in social networks, and network neutrality. Being a forward-looking guide for the next decade, this Research Handbook will strongly appeal to scholars and graduate students in the social sciences studying and researching internet governance, political scientists, economists, lawyers and computer scientists working on governance issues, as well as regulators and policymakers responsible for internet governance in national governments and intergovernmental organizations. Contributors: J.M. Bauer, A. Brown, I. Brown, L. Bygrave, J. Cave, N. Economides, L. Edwards, A.M. Froomkin, G. Greenleaf, J. Hofmann, G. Hosein, R.F. Jorgensen, C.T. Marsden, A. Matwyshyn, T.J. McIntyre, M. Mueller, A. Powell, J. Tag, M. van Eeten, R.H. Weber, M. Ziewitz
IT Contracts and Dispute Management provides in-depth analysis of the legal issues that customers and suppliers involved in a technology project can face at each of its critical stages. The authors offer a practitioner'?s-eye view of both the impact of those issues and how to resolve them or minimise their effect. Key features include:? guidance on all stages of a technology project presented in the order in which they typically occur? discussion of the tender process, preparation of contract terms and project delivery? advice on how to manage commonly occurring issues, such as delayed delivery? insight into potential methods of project ?'resuscitation'? when difficulties arise advice on ?'end of project?' issues, including termination options, formal resolution of disputes and quantification of losses first-hand insights drawing on the authors?' extensive personal experiences throughout. Being the only published work in this area relating to English law, this book will be a valuable resource for lawyers in private practice who are advising clients on the avoidance or resolution of disputes arising from IT projects. It will also be of great interest to in-house legal counsel who advise that part of their business responsible for procuring, supplying, or managing an IT project.
In Government Cloud Procurement, Kevin McGillivray explores the question of whether governments can adopt cloud computing services and still meet their legal requirements and other obligations to citizens. The book focuses on the interplay between the technical properties of cloud computing services and the complex legal requirements applicable to cloud adoption and use. The legal issues evaluated include data privacy law (GDPR and the US regime), jurisdictional issues, contracts, and transnational private law approaches to addressing legal requirements. McGillivray also addresses the unique position of governments when they outsource core aspects of their information and communications technology to cloud service providers. His analysis is supported by extensive research examining actual cloud contracts obtained through Freedom of Information Act requests. With the demand for cloud computing on the rise, this study fills a gap in legal literature and offers guidance to organizations considering cloud computing.
New technologies have always challenged the social, economic, legal, and ideological status quo. Constitutional law is no less impacted by such technologically driven transformations, as the state must formulate a legal response to new technologies and their market applications, as well as the state's own use of new technology. In particular, the development of data collection, data mining, and algorithmic analysis by public and private actors present unique challenges to public law at the doctrinal as well as the theoretical level. This collection, aimed at legal scholars and practitioners, describes the constitutional challenges created by the algorithmic society. It offers an important synthesis of the state of play in law and technology studies, addressing the challenges for fundamental rights and democracy, the role of policy and regulation, and the responsibilities of private actors. This title is also available as Open Access on Cambridge Core.
This book explores, through a children's rights-based perspective, the emergence of a safeguarding dystopia in child online protection that has emerged from a tension between an over-reliance in technical solutions and a lack of understanding around code and algorithm capabilities. The text argues that a safeguarding dystopia results in docile children, rather than safe ones, and that we should stop seeing technology as the sole solution to online safeguarding. The reader will, through reading this book, gain a deeper understanding of the current policy arena in online safeguarding, what causes children to beocme upset online, and the doomed nature of safeguarding solutions. The book also features a detailed analysis of issues surrounding content filtering, access monitoring, surveillance, image recognition, and tracking. This book is aimed at legal practitioners, law students, and those interested in child safeguarding and technology.
International legal scholars tend to think of their work as the interpretation of rules: the application of a law 'out there' to concrete situations. This book takes a different approach to that scholarship: it views doctrine as a socio-linguistic practice. In other words, this book views legal scholars not as law-appliers, but as constructing knowledge within a particular academic discipline. By means of three close-ups of the discourse on cyberwar and international law, this book shows how international legal knowledge is constructed in ways usually overlooked: by means of footnotes, for example, or conference presentations. In so doing, this book aims to present a new way of seeing international legal scholarship: one that pays attention to the mundane parts of international legal texts and provides a different understanding of how international law as we know it comes about.
This volume provides an overview of cyber economic crime in India, analyzing fifteen years of data and specific case studies from Mumbai to add to the limited research in cyber economic crime detection. Centering around an integrated victim-centered approach to investigating a global crime on the local level, the book examines the criminal justice system response to cyber economic crime and proposes new methods of detection and prevention. It considers the threat from a national security perspective, a cybercrime perspective, and as a technical threat to business and technology installations. Among the topics discussed: Changing landscape of crime in cyberspace Cybercrime typology Legal framework for cyber economic crime in India Cyber security mechanisms in India A valuable resource for law enforcement and police working on the local, national, and global level in the detection and prevention of cybercrime, Cyber Economic Crime in India will also be of interest to researchers and practitioners working in financial crimes and white collar crime.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
Companies, lawyers, privacy officers, compliance managers, as well as human resources, marketing and IT professionals are increasingly facing privacy issues. While information on privacy topics is freely available, it can be diffcult to grasp a problem quickly, without getting lost in details and advocacy. This is where Determann's Field Guide to Data Privacy Law comes into its own - identifying key issues and providing concise practical guidance for an increasingly complex field shaped by rapid change in international laws, technology and society. This fourth revised edition reflects significant changes to data privacy law since 2017 such as the entering into force of the EU General Data Protection Regulation, as well as the challenges companies face with respect to data monetization, cloud adoption and the Internet of Things. With data privacy law enforcement at an all time high, readers will benefit from this introduction to key data privacy concepts and the useful practical guidance on starting, maintaining and auditing compliance programs. Step-by-step direction on drafting privacy documentation is provided, with 'how-to' suggestions for tackling other tasks and projects. Finally, the book offers an A-Z list of hot topics, organized by commonly used words and terms. This should be on the desk and in the briefcase of every compliance officer and corporate counsel. New to this Edition: updated guidance based on EU GDPR enforcement, the California Consumer Privacy Act, the CLOUD Act and other new laws in-depth discussion of pros and cons of cross-border transfer compliance mechanisms trends, tips and terms for contracts roadmap for addressing data subject access and deletion rights checklists for marketing and data monetization programs guidance for impact assessments and accountability documentation information relating to hot topics in privacy such as clinical trials, artificial intelligence, connected cars risk mitigation suggestions for product manufacturers Key Features: A-Z of data privacy provides snapshot of key topics practical guide to starting, maintaining and auditing privacy compliance programs glossaries of key acronyms and terms help the user to navigate through the field sample documentation and checklists to ensure the clearest possible guidance advice on drafting documentation and tools to complete an end-to-end process concise overview of the practical requirements of data privacy compliance worldwide clear structure facilitates quick reference.
This book critiques the contemporary recourse to transparency in law and policy. This is, ostensibly, the information age. At the heart of the societal shift toward digitalisation is the call for transparency and the liberalisation of information and data. Yet, with the recent rise of concerns such as 'fake news', post-truth and misinformation, where the policy responses to all these phenomena has been a petition for even greater transparency, it becomes imperative to critically reflect on what this dominant idea means, whom it serves, and what the effects are of its power. In response, this book provides the first sustained critique of the concept of transparency in law and policy. It offers a concise overview of transparency in law and policy around the world, and critiques how this concept works discursively to delimit other forms of governance, other ways of knowing and other realities. It draws on the work of Michel Foucault on discourse, archaeology and genealogy, together with later Foucaultian scholars, including Gayatri Chakravorty Spivak and Judith Butler, as a theoretical framework for challenging and thinking anew the history and understanding of what has become one of the most popular buzzwords of 21st century law and governance. At the intersection of law and governance, this book will be of considerable interest to those working in these fields; but also to those engaged in other interdisciplinary areas, including society and technology, the digital humanities, technology laws and policy, global law and policy, as well as the surveillance society.
This collection explores the relevance of global trade law for data, big data and cross-border data flows. Contributing authors from different disciplines including law, economics and political science analyze developments at the World Trade Organization and in preferential trade venues by asking what future-oriented models for data governance are available and viable in the area of trade law and policy. The collection paints the broad picture of the interaction between digital technologies and trade regulation as well as provides in-depth analyses of critical to the data-driven economy issues, such as privacy and AI, and different countries' perspectives. This title is also available as Open Access on Cambridge Core.
The most fascinating and profitable subject of predictive algorithms is the human actor. Analysing big data through learning algorithms to predict and pre-empt individual decisions gives a powerful tool to corporations, political parties and the state. Algorithmic analysis of digital footprints, as an omnipresent form of surveillance, has already been used in diverse contexts: behavioural advertising, personalised pricing, political micro-targeting, precision medicine, and predictive policing and prison sentencing. This volume brings together experts to offer philosophical, sociological, and legal perspectives on these personalised data practices. It explores common themes such as choice, personal autonomy, equality, privacy, and corporate and governmental efficiency against the normative frameworks of the market, democracy and the rule of law. By offering these insights, this collection on data-driven personalisation seeks to stimulate an interdisciplinary debate on one of the most pervasive, transformative, and insidious socio-technical developments of our time.
Offers the most accessible overview of the topic currently available. Suitable for students coming to the topic without a law background. The authors have diverse backgrounds in academia, journalism and practice, and present the subject clearly and dynamically.
Are the cognitive sciences relevant for law? How do they influence legal theory and practice? Should lawyers become part-time cognitive scientists? The recent advances in the cognitive sciences have reshaped our conceptions of human decision-making and behavior. Many claim, for instance, that we can no longer view ourselves as purely rational agents equipped with free will. This change is vitally important for lawyers, who are forced to rethink the foundations of their theories and the framework of legal practice. Featuring multidisciplinary scholars from around the world, this book offers a comprehensive overview of the emerging field of law and the cognitive sciences. It develops new theories and provides often provocative insights into the relationship between the cognitive sciences and various dimensions of the law including legal philosophy and methodology, doctrinal issues, and evidence.
The question of how to tax multinational companies that operate highly digitalised business models is one of the most contested areas of international taxation. The tax paid in the jurisdictions in which these companies operate has not kept pace with their immense growth and the OECD has proposed a new international tax compromise that will allocate taxing rights to market jurisdictions and remove the need to have a physical presence in the taxing jurisdictions in order to sustain taxability. In this work, Craig Elliffe explains the problems with the existing international tax system and its inability to respond to challenges posed by digitalised companies. In addition to looking at how the new international tax rules will work, Elliffe assesses their likely effectiveness and highlights features that are likely to endure in the next waves of international tax reform.
The book provides a detailed overview and analysis of important EU Internet regulatory challenges currently found in various key fields of law directly linked to the Internet such as information technology, consumer protection, personal data, e-commerce and copyright law. In addition, it aims to shed light on the content and importance of various pending legislative proposals in these fields, and of the Court of Justice of the European Union's recent case law in connection with solving the different problems encountered. The book focuses on challenging legal questions that have not been sufficiently analyzed, while also presenting original thinking in connection with the regulation of emerging legal questions. As such, it offers an excellent reference tool for researchers, policymakers, judges, practitioners and law students with a special interest in EU Internet law and regulation.
Governing Privacy in Knowledge Commons explores how privacy impacts knowledge production, community formation, and collaborative governance in diverse contexts, ranging from academia and IoT, to social media and mental health. Using nine new case studies and a meta-analysis of previous knowledge commons literature, the book integrates the Governing Knowledge Commons framework with Helen Nissenbaum's Contextual Integrity framework. The multidisciplinary case studies show that personal information is often a key component of the resources created by knowledge commons. Moreover, even when it is not the focus of the commons, personal information governance may require community participation and boundaries. Taken together, the chapters illustrate the importance of exit and voice in constructing and sustaining knowledge commons through appropriate personal information flows. They also shed light on the shortcomings of current notice-and-consent style regulation of social media platforms. This title is also available as Open Access on Cambridge Core.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.
This innovative book sets itself at the crossroads of several rapidly developing areas of research in legal and global studies related to social computing, specifically in the context of how public emergency responders appropriate content on social media platforms for emergency and disaster management. The book - a collaboration between computer scientists, ethicists, legal scholars and practitioners - should be read by anyone concerned with the ongoing debate over the corporatization and commodification of user-generated content on social media and the extent to which this content can be legally and ethically harnessed for emergency and disaster management. The collaboration was made possible by EU's FP 7 Project Slandail (# 607691, 2014-17).
This volume presents new research in artificial intelligence (AI) and Law with special reference to criminal justice. It brings together leading international experts including computer scientists, lawyers, judges and cyber-psychologists. The book examines some of the core problems that technology raises for criminal law ranging from privacy and data protection, to cyber-warfare, through to the theft of virtual property. Focusing on the West and China, the work considers the issue of AI and the Law in a comparative context presenting the research from a cross-jurisdictional and cross-disciplinary approach. As China becomes a global leader in AI and technology, the book provides an essential in-depth understanding of domestic laws in both Western jurisdictions and China on criminal liability for cybercrime. As such, it will be a valuable resource for academics and researchers working in the areas of AI, technology and criminal justice.
Networks powered by algorithms are pervasive. Major contemporary technology trends - Internet of Things, Big Data, Digital Platform Power, Blockchain, and the Algorithmic Society - are manifestations of this phenomenon. The internet, which once seemed an unambiguous benefit to society, is now the basis for invasions of privacy, massive concentrations of power, and wide-scale manipulation. The algorithmic networked world poses deep questions about power, freedom, fairness, and human agency. The influential 1997 Federal Communications Commission whitepaper "Digital Tornado" hailed the "endless spiral of connectivity" that would transform society, and today, little remains untouched by digital connectivity. Yet fundamental questions remain unresolved, and even more serious challenges have emerged. This important collection, which offers a reckoning and a foretelling, features leading technology scholars who explain the legal, business, ethical, technical, and public policy challenges of building pervasive networks and algorithms for the benefit of humanity. This title is also available as Open Access on Cambridge Core.
There is order on the internet, but how has this order emerged and what challenges will threaten and shape its future? This study shows how a legitimate order of norms has emerged online, through both national and international legal systems. It establishes the emergence of a normative order of the internet, an order which explains and justifies processes of online rule and regulation. This order integrates norms at three different levels (regional, national, international), of two types (privately and publicly authored), and of different character (from ius cogens to technical standards). Matthias C. Kettemann assesses their internal coherence, their consonance with other order norms and their consistency with the order's finality. The normative order of the internet is based on and produces a liquefied system characterized by self-learning normativity. In light of the importance of the socio-communicative online space, this is a book for anyone interested in understanding the contemporary development of the internet. This is an open access title available under the terms of a CC BY-NC-ND 4.0 International licence. It is offered as a free PDF download from OUP and selected open access locations.
The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.
First published in 1997, this volume explores how we live in a society which is developing beyond human experience and comprehension - fast. Advances in technology and medicine are profoundly affecting the manner of human living from the beginning through to the end of life. These advances present exciting and demanding challenges to law-makers, policy-makers and healthcare providers, who make decisions about genetics, human reproduction, competence, medical treatment priorities and dying. They also compel us to pay attention to human rights. This international collection of essays combines the thoughts and ideas of women scholars writing about these complex developments and aims at provoking debate and dissension as well as an opportunity for reflection. The writers explore a range of common themes in different areas and provide a coherent framework for law and policy-making, to serve as a foundation for the challenges ahead. |
![]() ![]() You may like...
Blockchain Technologies and Applications…
Pradeep Nijalingappa, Mangesh Manikrao Ghonge
Hardcover
R6,834
Discovery Miles 68 340
Research Handbook on Contract Design
Marcelo Corrales Compagnucci, Helena Haapio, …
Hardcover
R6,431
Discovery Miles 64 310
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, …
Hardcover
R6,578
Discovery Miles 65 780
|