![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.
This volume presents new research in artificial intelligence (AI) and Law with special reference to criminal justice. It brings together leading international experts including computer scientists, lawyers, judges and cyber-psychologists. The book examines some of the core problems that technology raises for criminal law ranging from privacy and data protection, to cyber-warfare, through to the theft of virtual property. Focusing on the West and China, the work considers the issue of AI and the Law in a comparative context presenting the research from a cross-jurisdictional and cross-disciplinary approach. As China becomes a global leader in AI and technology, the book provides an essential in-depth understanding of domestic laws in both Western jurisdictions and China on criminal liability for cybercrime. As such, it will be a valuable resource for academics and researchers working in the areas of AI, technology and criminal justice.
Covering the latest legal updates and rulings, the second edition of Digital Media Law presents a comprehensive introduction to all the critical issues surrounding media law. * Provides a solid foundation in media law * Illustrates how digitization and globalization are constantly shifting the legal landscape * Utilizes current and relevant examples to illustrate key concepts * Revised section on legal research covers how and where to find the law * Updated with new rulings relating to corporate political speech, student speech, indecency and Net neutrality, restrictions on libel tourism, cases filed against U.S. information providers, WikiLeaks and shield laws, file sharing, privacy issues, sexting, cyber-stalking, and many others * An accompanying website is regularly updated with new rulings, access to slip opinions and other supplementary material.
Networks powered by algorithms are pervasive. Major contemporary technology trends - Internet of Things, Big Data, Digital Platform Power, Blockchain, and the Algorithmic Society - are manifestations of this phenomenon. The internet, which once seemed an unambiguous benefit to society, is now the basis for invasions of privacy, massive concentrations of power, and wide-scale manipulation. The algorithmic networked world poses deep questions about power, freedom, fairness, and human agency. The influential 1997 Federal Communications Commission whitepaper "Digital Tornado" hailed the "endless spiral of connectivity" that would transform society, and today, little remains untouched by digital connectivity. Yet fundamental questions remain unresolved, and even more serious challenges have emerged. This important collection, which offers a reckoning and a foretelling, features leading technology scholars who explain the legal, business, ethical, technical, and public policy challenges of building pervasive networks and algorithms for the benefit of humanity. This title is also available as Open Access on Cambridge Core.
This is a unique interdisciplinary exploration of the contemporary phenomenon of online medicine purchasing. In this research, Sugiura provides a criminological understanding of the sale of online medicines as well as the traditional illegal markets. Crucially, the practice is investigated from the perspective of web users, moving beyond the headlines and warning campaigns to contextualise the provision of medicines online, to describe this practice and subjective accounts of purchasing medicines from the Web. Drawing together established deviance theories, Respectable Deviance and Purchasing Medicine Online considers the construction of online medicine purchasing, the justifications presented to challenge how it is labelled, and how the behaviour is managed to show how the framing of risks and deviance is challenged online. Offering a much-needed a critical overview of the UK healthcare regulatory system, Sugiura also analyses literature, data and policy documents originating from different countries highlighting that the geographical locations of participants in web forums, online surveys and non-face-to-face interviews cannot always be verified. With broad implications for regulation and safety surrounding medicines online, this innovative and timely study contributes to current online healthcare debates and broadens our understanding of cybercrime. It will be of particular interest to scholars of cybercrime and those interested in the changing nature of deviance.
First published in 1997, this volume explores how we live in a society which is developing beyond human experience and comprehension - fast. Advances in technology and medicine are profoundly affecting the manner of human living from the beginning through to the end of life. These advances present exciting and demanding challenges to law-makers, policy-makers and healthcare providers, who make decisions about genetics, human reproduction, competence, medical treatment priorities and dying. They also compel us to pay attention to human rights. This international collection of essays combines the thoughts and ideas of women scholars writing about these complex developments and aims at provoking debate and dissension as well as an opportunity for reflection. The writers explore a range of common themes in different areas and provide a coherent framework for law and policy-making, to serve as a foundation for the challenges ahead.
This book brings together a series of contributions by leading scholars and practitioners to examine the main features of smart contracts, as well as the response of key stakeholders in technology, business, government and the law. It explores how this new technology interfaces with the goals and content of contract law, introducing and evaluating several mechanisms to improve the 'observability' and reduce the costs of verifying contractual obligations and performance. It also outlines various 'design patterns' that ensure that end users are protected from themselves, prevent cognitive accidents, and translate expectations and values into more user-oriented agreements. Furthermore, the chapters map the new risks associated with smart contracts, particularly for consumers, and consider how they might be alleviated. The book also discusses the challenge of integrating data protection and privacy concerns into the design of these agreements and the broad range of legal knowledge and skills required. The case for using smart contracts goes beyond 'contracts' narrowly defined, and they are increasingly used to disrupt traditional models of business organisation. The book discusses so-called decentralised autonomous organisations and decentralised finance as illustrations of this trend. This book is designed for those interested in looking to deepen their understanding of this game-changing new legal technology.
This book describes how non-profit organisations (NPOs) communicate what they constitute, signal success and display sustainability in order to convince stakeholders to provide essential resources. Reports on intellectual capital offer a worthwhile approach. Based on empirical research, the book highlights the essential resources for NPOs and on the demand imposed on organisations, as well as the dependencies of those resources and demands. This insight helps NPOs to provide necessary information while keeping the disclosure to a minimum and thus not giving away possible competitive advantages. Further, the status-quo of IC disclosure in Germany is presented and a theoretical framework for the motivation for NPOs to disclose information on their IC is presented. Researchers will find these findings a solid foundation for further research. Finally, a framework for the disclosure of intellectual capital is provided to support practitioners.
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artefact correlation.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.
This book explores the legal and practical implications of the digital age for employment and industrial relations. To that end, the book analyses the problems arising from the digitalisation of work and the negative effects on working conditions in fields such as platform work, robotisation, discrimination, data protection, and freedom of speech. It also looks at how to ensure decent working conditions for workers affected by digitalisation, by investigating the minimum standards that should be ensured to mitigate negative effects - and how these could be best guaranteed by legislation and collective bargaining. The book presents a theoretical framework on the impact of automatisation, robotics, and digitalisation on the very basic principles of individual and collective labour law. The chapters provide an in-depth analysis of new patterns of work prompted by digitalisation, including: classification of platform workers; recognition of employment and social security rights; competition law aspects of platform work; remote (tele)work arrangements; algorithmic decision-making and remote surveillance; data protection and privacy; and social media in working environments. The book is an important reference for academics and researchers, social partners, and policy makers with an interest in labour law and industrial relations.
This book provides a comparison and practical guide for academics, students, and the business community of the current data protection laws in selected Asia Pacific countries (Australia, India, Indonesia, Japan Malaysia, Singapore, Thailand) and the European Union. The book shows how over the past three decades the range of economic, political, and social activities that have moved to the internet has increased significantly. This technological transformation has resulted in the collection of personal data, its use and storage across international boundaries at a rate that governments have been unable to keep pace. The book highlights challenges and potential solutions related to data protection issues arising from cross-border problems in which personal data is being considered as intellectual property, within transnational contracts and in anti-trust law. The book also discusses the emerging challenges in protecting personal data and promoting cyber security. The book provides a deeper understanding of the legal risks and frameworks associated with data protection law for local, regional and global academics, students, businesses, industries, legal profession and individuals.
Countries emerging from violent conflict face difficult challenges about what the role of media should be in political transitions, particularly when attempting to build a new state and balance a difficult legacy. Media, Conflict, and the State in Africa discusses how ideas, institutions and interests have shaped media systems in some of Africa's most complex state and nation-building projects. This timely book comes at a turbulent moment in global politics as waves of populist protests gain traction, and concerns continue to grow about fake news, social media echo chambers, and the increasing role of both traditional and new media in waging wars or influencing elections. Focusing on comparative cases from a historical perspective and the choices and ideas that informed the approaches of some of Africa's leaders, including guerrilla commanders Yoweri Museveni of Uganda and Meles Zenawi of Ethiopia, Nicole Stremlau offers a unique political insight into the development of contemporary media systems in Africa.
The General Data Protection Regulation in Plain Language is a guide for anyone interested in the much-discussed rules of the GDPR. In this legislation, which came into force in 2018, the European Union meticulously describes what you can and cannot do with data about other people. Violating these rules can lead to a fine of up to 20 million euros. This book sets out the most important obligations of individuals and organisations that process data about others. These include taking technical security measures, carrying out an impact assessment and registering all data-processing procedures within an organisation. It also discusses the rights of citizens whose data are processed, such as the right to be forgotten, the right to information and the right to data portability.
Presenting an integrated approach to information exchange among law enforcement institutions within the EU, this book addresses the dilemma surrounding the need to balance the security of individuals and the need to protect their privacy and data. Providing the reader with a comprehensive analysis of information exchange tools, exploring their history, political background, the most recent legal modifications and the advantages and disadvantages of their use, it includes a comparison between different information exchange tools. Written by an author who has worked as a police officer, Home Affairs counsellor and academic, this is an important read for scholars working with EU Law, Criminal Procedure Law, and International Law as well as for practitioners who directly deal with international police cooperation or who perform criminal investigation both within and outside the EU.
This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy. It inquires into the physics, the technologies, the business models, the governmental strategies and last but not least the legal frameworks concerning access, organisation and control of information. It debates whether it is in the very nature of information to be either free or monopolized, or both. Analysing upcoming power structures, new types of colonization and attempts to replace legal norms with techno-nudging, this book also presents the idea of an infra-ethics capable of pre-empting our pre-emption. It discusses the interrelations between open access, the hacker ethos, the personal data economy, and freedom of information, highlighting the ephemeral but pivotal role played by information in a data-driven society. This book is a must-read for those working on the contemporary dimensions of freedom of information, data protection, and intellectual property rights.
This brand new title brings together the different streams of the transfer landscape and outlines the separate legal rules all in one accessible place. Data transfers (under data protection legal rules) are one of the most discussed areas of data protection, and are currently undergoing mass change. Following on from Brexit, professionals now have more than one set of transfer rules to comply with, including: - New Adequacy Decision - New Standard Contracts - Forthcoming UK Contracts - Consultation on future laws
This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law.
This book asks a simple question: are the tech giants monopolies? In the current environment of suspicion towards the major technology companies as a result of concerns about their power and influence, it has become commonplace to talk of Google, Facebook, Amazon, Apple, Microsoft, or Netflix as the modern day version of the 19th century trusts. In turn, the tech giants are vilified for a whole range of monopoly harms towards consumers, workers and even the democratic process. In the US and the EU, antitrust, and regulatory reform is on the way. Using economics, business and management science as well legal reasoning, this book offers a new perspective on big tech. It builds a theory of "moligopoly". The theory advances that the tech giants, or at least some of them, coexist both as monopolies and oligopoly firms that compete against each other in an environment of substantial uncertainty and economic dynamism. With this, the book assesses ongoing antitrust and regulatory policy efforts. It demonstrates that it is counterproductive to pursue policies that introduce more rivalry in moligopoly markets subject to technological discontinuities. And that non-economic harms like privacy violations, fake news, or hate speech are difficult issues that belong to the realm of regulation, not antimonopoly remediation.
Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply with them. Where US organizations and businesses who collect or receive EU personal data fail to comply with the rule, the bottom line can suffer from very significant official fines and penalties, as well as from users, customers or representative bodies to pursuing litigation. This guide is essential for all US enterprises who directly or indirectly deal with EU personal data.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.
This is the latest book from law and technology guru Richard Susskind, author of best-selling The Future of Law, bringing together in one volume eleven significant essays on the application of IT to legal practice and the administration of justice, including Susskind's very latest thinking on key topics such as knowledge management and the impact of electronic commerce and electronic government.
Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong. |
![]() ![]() You may like...
The Theology of the Heidelberg Catechism…
Lyle D. Bierma
Hardcover
Letters of Samuel Rutherford - Complete…
Samuel Rutherford, Andrew A. Bonar
Hardcover
R1,291
Discovery Miles 12 910
Calvinism and Middle Knowledge
John D. Laing, Kirk R. MacGregor, …
Hardcover
Fisher's Catechism - The Westminster…
James Fisher, Ebenezer Erskine
Hardcover
R1,002
Discovery Miles 10 020
|