![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Offers the most accessible overview of the topic currently available. Suitable for students coming to the topic without a law background. The authors have diverse backgrounds in academia, journalism and practice, and present the subject clearly and dynamically.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
Originality is an important element in different branches of law. For instance, under Belgian contract law, a written mutual agreement must be drafted in as many originals as there are parties. In other branches of law, there are requirements for the preservation of original documents. However, while originality may be an element common to different branches of law, there are clear indications that the precise meaning of this notion may be rather divergent between them. Moreover, the introduction of digital processes in many aspects of law has provided another dimension to this matter, as originality remains a difficult element to apply in the realm of electronic information.Currently, there are little to no guidelines on how to establish when electronic information is original and when it is not. Therefore, it is the aim of this book to analyse a select number of incarnations of the originality requirement in different branches of Belgian law in order to establish whether common elements or a common root can be found. These findings will subsequently be applied to the practice of digitalization in law in order to gain a better understanding of how the concept of originality should be interpreted in this matter.At a time when issues arising from digitalization in law are increasingly prevalent, this book aims to provide the reader with an examination of the current situation and attempts to find a uniform legal definition for the concept of originality that would be applicable across different branches of law.
The question of how to tax multinational companies that operate highly digitalised business models is one of the most contested areas of international taxation. The tax paid in the jurisdictions in which these companies operate has not kept pace with their immense growth and the OECD has proposed a new international tax compromise that will allocate taxing rights to market jurisdictions and remove the need to have a physical presence in the taxing jurisdictions in order to sustain taxability. In this work, Craig Elliffe explains the problems with the existing international tax system and its inability to respond to challenges posed by digitalised companies. In addition to looking at how the new international tax rules will work, Elliffe assesses their likely effectiveness and highlights features that are likely to endure in the next waves of international tax reform.
Are the cognitive sciences relevant for law? How do they influence legal theory and practice? Should lawyers become part-time cognitive scientists? The recent advances in the cognitive sciences have reshaped our conceptions of human decision-making and behavior. Many claim, for instance, that we can no longer view ourselves as purely rational agents equipped with free will. This change is vitally important for lawyers, who are forced to rethink the foundations of their theories and the framework of legal practice. Featuring multidisciplinary scholars from around the world, this book offers a comprehensive overview of the emerging field of law and the cognitive sciences. It develops new theories and provides often provocative insights into the relationship between the cognitive sciences and various dimensions of the law including legal philosophy and methodology, doctrinal issues, and evidence.
Governing Privacy in Knowledge Commons explores how privacy impacts knowledge production, community formation, and collaborative governance in diverse contexts, ranging from academia and IoT, to social media and mental health. Using nine new case studies and a meta-analysis of previous knowledge commons literature, the book integrates the Governing Knowledge Commons framework with Helen Nissenbaum's Contextual Integrity framework. The multidisciplinary case studies show that personal information is often a key component of the resources created by knowledge commons. Moreover, even when it is not the focus of the commons, personal information governance may require community participation and boundaries. Taken together, the chapters illustrate the importance of exit and voice in constructing and sustaining knowledge commons through appropriate personal information flows. They also shed light on the shortcomings of current notice-and-consent style regulation of social media platforms. This title is also available as Open Access on Cambridge Core.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.
The book provides a detailed overview and analysis of important EU Internet regulatory challenges currently found in various key fields of law directly linked to the Internet such as information technology, consumer protection, personal data, e-commerce and copyright law. In addition, it aims to shed light on the content and importance of various pending legislative proposals in these fields, and of the Court of Justice of the European Union's recent case law in connection with solving the different problems encountered. The book focuses on challenging legal questions that have not been sufficiently analyzed, while also presenting original thinking in connection with the regulation of emerging legal questions. As such, it offers an excellent reference tool for researchers, policymakers, judges, practitioners and law students with a special interest in EU Internet law and regulation.
This volume presents new research in artificial intelligence (AI) and Law with special reference to criminal justice. It brings together leading international experts including computer scientists, lawyers, judges and cyber-psychologists. The book examines some of the core problems that technology raises for criminal law ranging from privacy and data protection, to cyber-warfare, through to the theft of virtual property. Focusing on the West and China, the work considers the issue of AI and the Law in a comparative context presenting the research from a cross-jurisdictional and cross-disciplinary approach. As China becomes a global leader in AI and technology, the book provides an essential in-depth understanding of domestic laws in both Western jurisdictions and China on criminal liability for cybercrime. As such, it will be a valuable resource for academics and researchers working in the areas of AI, technology and criminal justice.
Covering the latest legal updates and rulings, the second edition of Digital Media Law presents a comprehensive introduction to all the critical issues surrounding media law. * Provides a solid foundation in media law * Illustrates how digitization and globalization are constantly shifting the legal landscape * Utilizes current and relevant examples to illustrate key concepts * Revised section on legal research covers how and where to find the law * Updated with new rulings relating to corporate political speech, student speech, indecency and Net neutrality, restrictions on libel tourism, cases filed against U.S. information providers, WikiLeaks and shield laws, file sharing, privacy issues, sexting, cyber-stalking, and many others * An accompanying website is regularly updated with new rulings, access to slip opinions and other supplementary material.
Networks powered by algorithms are pervasive. Major contemporary technology trends - Internet of Things, Big Data, Digital Platform Power, Blockchain, and the Algorithmic Society - are manifestations of this phenomenon. The internet, which once seemed an unambiguous benefit to society, is now the basis for invasions of privacy, massive concentrations of power, and wide-scale manipulation. The algorithmic networked world poses deep questions about power, freedom, fairness, and human agency. The influential 1997 Federal Communications Commission whitepaper "Digital Tornado" hailed the "endless spiral of connectivity" that would transform society, and today, little remains untouched by digital connectivity. Yet fundamental questions remain unresolved, and even more serious challenges have emerged. This important collection, which offers a reckoning and a foretelling, features leading technology scholars who explain the legal, business, ethical, technical, and public policy challenges of building pervasive networks and algorithms for the benefit of humanity. This title is also available as Open Access on Cambridge Core.
This is a unique interdisciplinary exploration of the contemporary phenomenon of online medicine purchasing. In this research, Sugiura provides a criminological understanding of the sale of online medicines as well as the traditional illegal markets. Crucially, the practice is investigated from the perspective of web users, moving beyond the headlines and warning campaigns to contextualise the provision of medicines online, to describe this practice and subjective accounts of purchasing medicines from the Web. Drawing together established deviance theories, Respectable Deviance and Purchasing Medicine Online considers the construction of online medicine purchasing, the justifications presented to challenge how it is labelled, and how the behaviour is managed to show how the framing of risks and deviance is challenged online. Offering a much-needed a critical overview of the UK healthcare regulatory system, Sugiura also analyses literature, data and policy documents originating from different countries highlighting that the geographical locations of participants in web forums, online surveys and non-face-to-face interviews cannot always be verified. With broad implications for regulation and safety surrounding medicines online, this innovative and timely study contributes to current online healthcare debates and broadens our understanding of cybercrime. It will be of particular interest to scholars of cybercrime and those interested in the changing nature of deviance.
First published in 1997, this volume explores how we live in a society which is developing beyond human experience and comprehension - fast. Advances in technology and medicine are profoundly affecting the manner of human living from the beginning through to the end of life. These advances present exciting and demanding challenges to law-makers, policy-makers and healthcare providers, who make decisions about genetics, human reproduction, competence, medical treatment priorities and dying. They also compel us to pay attention to human rights. This international collection of essays combines the thoughts and ideas of women scholars writing about these complex developments and aims at provoking debate and dissension as well as an opportunity for reflection. The writers explore a range of common themes in different areas and provide a coherent framework for law and policy-making, to serve as a foundation for the challenges ahead.
Internet Privacy Rights analyses the current threats to our online autonomy and privacy and proposes a new model for the gathering, retention and use of personal data. Key to the model is the development of specific privacy rights: a right to roam the internet with privacy, a right to monitor the monitors, a right to delete personal data and a right to create, assert and protect an online identity. These rights could help in the formulation of more effective and appropriate legislation, and shape more privacy-friendly business models. The conclusion examines how the internet might look with these rights in place and whether such an internet could be sustainable from both a governmental and a business perspective.
This book brings together a series of contributions by leading scholars and practitioners to examine the main features of smart contracts, as well as the response of key stakeholders in technology, business, government and the law. It explores how this new technology interfaces with the goals and content of contract law, introducing and evaluating several mechanisms to improve the 'observability' and reduce the costs of verifying contractual obligations and performance. It also outlines various 'design patterns' that ensure that end users are protected from themselves, prevent cognitive accidents, and translate expectations and values into more user-oriented agreements. Furthermore, the chapters map the new risks associated with smart contracts, particularly for consumers, and consider how they might be alleviated. The book also discusses the challenge of integrating data protection and privacy concerns into the design of these agreements and the broad range of legal knowledge and skills required. The case for using smart contracts goes beyond 'contracts' narrowly defined, and they are increasingly used to disrupt traditional models of business organisation. The book discusses so-called decentralised autonomous organisations and decentralised finance as illustrations of this trend. This book is designed for those interested in looking to deepen their understanding of this game-changing new legal technology.
This book describes how non-profit organisations (NPOs) communicate what they constitute, signal success and display sustainability in order to convince stakeholders to provide essential resources. Reports on intellectual capital offer a worthwhile approach. Based on empirical research, the book highlights the essential resources for NPOs and on the demand imposed on organisations, as well as the dependencies of those resources and demands. This insight helps NPOs to provide necessary information while keeping the disclosure to a minimum and thus not giving away possible competitive advantages. Further, the status-quo of IC disclosure in Germany is presented and a theoretical framework for the motivation for NPOs to disclose information on their IC is presented. Researchers will find these findings a solid foundation for further research. Finally, a framework for the disclosure of intellectual capital is provided to support practitioners.
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artefact correlation.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.
This book explores the legal and practical implications of the digital age for employment and industrial relations. To that end, the book analyses the problems arising from the digitalisation of work and the negative effects on working conditions in fields such as platform work, robotisation, discrimination, data protection, and freedom of speech. It also looks at how to ensure decent working conditions for workers affected by digitalisation, by investigating the minimum standards that should be ensured to mitigate negative effects - and how these could be best guaranteed by legislation and collective bargaining. The book presents a theoretical framework on the impact of automatisation, robotics, and digitalisation on the very basic principles of individual and collective labour law. The chapters provide an in-depth analysis of new patterns of work prompted by digitalisation, including: classification of platform workers; recognition of employment and social security rights; competition law aspects of platform work; remote (tele)work arrangements; algorithmic decision-making and remote surveillance; data protection and privacy; and social media in working environments. The book is an important reference for academics and researchers, social partners, and policy makers with an interest in labour law and industrial relations.
This book provides a comparison and practical guide for academics, students, and the business community of the current data protection laws in selected Asia Pacific countries (Australia, India, Indonesia, Japan Malaysia, Singapore, Thailand) and the European Union. The book shows how over the past three decades the range of economic, political, and social activities that have moved to the internet has increased significantly. This technological transformation has resulted in the collection of personal data, its use and storage across international boundaries at a rate that governments have been unable to keep pace. The book highlights challenges and potential solutions related to data protection issues arising from cross-border problems in which personal data is being considered as intellectual property, within transnational contracts and in anti-trust law. The book also discusses the emerging challenges in protecting personal data and promoting cyber security. The book provides a deeper understanding of the legal risks and frameworks associated with data protection law for local, regional and global academics, students, businesses, industries, legal profession and individuals.
Countries emerging from violent conflict face difficult challenges about what the role of media should be in political transitions, particularly when attempting to build a new state and balance a difficult legacy. Media, Conflict, and the State in Africa discusses how ideas, institutions and interests have shaped media systems in some of Africa's most complex state and nation-building projects. This timely book comes at a turbulent moment in global politics as waves of populist protests gain traction, and concerns continue to grow about fake news, social media echo chambers, and the increasing role of both traditional and new media in waging wars or influencing elections. Focusing on comparative cases from a historical perspective and the choices and ideas that informed the approaches of some of Africa's leaders, including guerrilla commanders Yoweri Museveni of Uganda and Meles Zenawi of Ethiopia, Nicole Stremlau offers a unique political insight into the development of contemporary media systems in Africa.
The General Data Protection Regulation in Plain Language is a guide for anyone interested in the much-discussed rules of the GDPR. In this legislation, which came into force in 2018, the European Union meticulously describes what you can and cannot do with data about other people. Violating these rules can lead to a fine of up to 20 million euros. This book sets out the most important obligations of individuals and organisations that process data about others. These include taking technical security measures, carrying out an impact assessment and registering all data-processing procedures within an organisation. It also discusses the rights of citizens whose data are processed, such as the right to be forgotten, the right to information and the right to data portability.
Presenting an integrated approach to information exchange among law enforcement institutions within the EU, this book addresses the dilemma surrounding the need to balance the security of individuals and the need to protect their privacy and data. Providing the reader with a comprehensive analysis of information exchange tools, exploring their history, political background, the most recent legal modifications and the advantages and disadvantages of their use, it includes a comparison between different information exchange tools. Written by an author who has worked as a police officer, Home Affairs counsellor and academic, this is an important read for scholars working with EU Law, Criminal Procedure Law, and International Law as well as for practitioners who directly deal with international police cooperation or who perform criminal investigation both within and outside the EU.
Social media hasn't just changed society-it's changing the way in which criminal law is prosecuted, defended, and adjudicated. This fascinating book explains how. While social media has become embedded in our society as a way to stay connected with friends, it serves another important purpose: to support the prosecution and defense of criminal cases. Social media is now used as proof of a crime; further, social media has become a vehicle for criminal activity. How should the law respond to the issue of online predators, stalkers, and identity thieves? This book comprehensively examines the complex impacts of social media on the major players in the criminal justice system: private citizens, attorneys, law enforcement officials, and judges. It outlines the many ways social media affects the judicial process, citing numerous example cases that demonstrate the legal challenges; and examines the issue from all sides, including law enforcement's role, citizens' privacy issues, and the principles of the Fourth Amendment. The author also shines a critical spotlight on how social media has enabled new types of investigations previously unimagined-some of which present ethical problems. Examines the criminal justice system from multiple perspectives in order to give fair attention to the successful uses of social media as well as the abuses Comprehensively covers current issues that have broad, long-term repercussions for the criminal justice system Provides a convenient overview of all the information related to social media and criminal law in one place Cites relevant cases and statutes
This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law. |
![]() ![]() You may like...
|