![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
A powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security. The most dangerous threat we-individually and as a society-face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack. In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data-more widespread by business than by government, and impossible to stop-should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analysed or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not only the simple loss of privacy, which is almost impossible to protect, but also that of individual autonomy-the ability to make personal choices free of manipulation or coercion. Offering colourful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today and charts a forceful new strategy that balances the needs of government, business and individuals alike.
Dieses Buch gibt einen umfassenden rechtlichen Uberblick uber den Vertrieb von Waren und Dienstleistungen im Internet. Behandelt werden zentrale Bereiche des elektronischen Geschaftsverkehrs. Dazu zahlen beispielsweise das Vertragsrecht, Prozessrecht sowie das Fernabsatzrecht im Internet. Eine Reihe potentieller Rechtsprobleme werden dargestellt, die es zu wissen gilt, wenn man selbst Waren- und Dienstleistungsvertrage uber das Internet abschliesst oder sich anderweitig mit diesem Bereich beschaftigt. Dieses Buch dient als zuverlassiger und verstandlicher Rechtsberater, um sich in dem sehr komplexen Bereich des Vertriebs- und Fernabsatzrechts im Internet orientieren zu konnen. Es richtet sich sowohl an Praktiker aus Wirtschaft, Justiz und Anwaltschaft, als auch an Verbraucherschutzverbande und Wissenschaftler."
In its first and second editions, Tomorrow's Lawyers became an international bestseller, widely read and cited by practitioners and students. The third edition focuses on the law and lawyers in the 2020s. For Richard Susskind, the future of legal service is neither Grisham nor Rumpole. Instead, he predicts a world of online courts, AI-based global legal businesses, disruptive legal technologies, liberalized markets, commoditization, alternative sourcing, simulated practice on the metaverse, and many new legal jobs. This volume is a definitive and updated introduction to this future - for aspiring lawyers, and for all who want to modernize and upgrade our legal and justice systems. It offers practical guidance for everyone intending to build careers and businesses in law. Written in an era of greater technological advance than humanity has ever witnessed, this work is a call to arms: it challenges those who feel that the law and lawyers are somehow immune from technological advance; it draws attention to the unaffordability and inaccessibility of legal service, for businesses and citizens alike; it invites the next generation of lawyers to harness the power of technology in improving and even overhauling the way in which legal and court service is currently provided. Tomorrow's Lawyers identifies new opportunities for lawyers, new ways of helping clients and the community. It enjoins its readers to become involved in building the systems that will replace outmoded forms of legal work. It argues that it is both a privilege and an obligation for tomorrow's lawyers to embrace and bring about change. A must-read for legal undergraduates, aspiring and young lawyers, senior practitioners, leaders in law firms and legal businesses, law professors and law teachers.
Since its emergence, big data has brought us new forms of energy, technology and means of organization which will generate greater values by crossover, integration, openness and sharing of data. Nevertheless, risks caused by open access and the flow of data also bring us enormous challenges to privacy, business secrets and social and national securities. This raises people's awareness on data sharing, privacy protection and social justice, and becomes a significant governance problem in the world. In order to solve these problems, Data Rights Law 1.0 is innovative in that it proposes a new concept of the "data person". It defines "data rights" as the rights derived from the "data person" and "data rights system" as the order based on "data rights". "Data rights law" is the legal normative formed out of the "data rights system". In this way, the book constructs a legal framework of "data rights-data rights system-data rights law". If data is considered as basic rights, on which new order and laws are to be built, it will bring brand new and profound meaning to future human life.
This work offers assistance to those who already have good elementary Italian language skills and wish to expand their vocabulary with expressions used in the Italian media.It is directed towards the academically influenced reader as well as interested laypeople. Based on the style of an Italian daily newspaper, the themes presented cover a broad range of subjects from politics to business, justice, labor and social issues as well as cultural topics, the environment, traffic, and sports.
This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement and regulatory bodies and management of the complex relationships between them. In drawing on interviews conducted with experts from a wide range of fields, the book presents the reader with dilemmas and paradigms that confront law makers, corporate leaders, law enforcement, and national leaders. The book is structured in a novel format by employing a series of vignettes which have been created as exercises intended to confront the reader with the dilemmas involved in cyber-security. Through the use of vignettes, the work seeks to highlight the constant threat of cyber-security against various audiences, with the overall aim of facilitating discussion and reaction to actual probable events. In this sense, the book seeks to provide recommendations for best practices in response to the complex and numerous threats related to cyber-security. This book will be of interest to students of cyber-security, terrorism, international law, security studies and IR in general, as well as policy makers, professionals and law-enforcement officials.
Privacy has become a pressing concern for many users of digital platforms who fear legal or social liability for sharing personal details online. Yet for queer women and others, an emphasis on privacy fails to reflect the creativity and struggles of everyday people seeking to represent themselves and form meaningful connections through social media. Personal but Not Private explores how queer women share and maintain their identities through digital technologies despite overlapping technological, social, economic, and political concerns. Focusing on representations of sexual identity through Tinder, Instagram, and Vine, this volume uncovers how queer women are continuously engaging in identity modulation, or the process through which people and platforms adjust or modify personal information, to form relationships, increase their social and economic participation, and counter intersecting forms of oppression. While queer women's representations of sexual identity give rise to publics and counterpublics through intimate and collective self-representation, platform-specific elements like design and governance place limitations on queer women's agency and often make them targets of censorship, harassment, and discrimination. This book also considers how identity modulation can be applied to a range of people negotiating digital contexts and promotes tangible changes to digital platforms and their broader social, economic, and political structures to empower individuals and their personal sharing on social media. Bringing together personal interviews and empirical research, Personal but Not Private offers a new lens for examining digitally mediated identities and highlights how platforms act as complicated sites of transformation.
Internet Marketplaces explains and analyses the legal questions and challenges posed by the increased use of online auctions and exchanges for business transactions. Rather than focusing on internet businesses as a whole, the author studies the rules related to closed internet marketplaces where commercial dealings are carried out. The book provides a detailed analysis of the new business models that are being employed, their legal structures, and the extent to which further work is still required to fill in the legal infrastructure.
This timely work examines the interplay between intellectual property protection and antitrust rules in the communications industry, with particular focus upon the role of externalities in that interplay. There is substantial discussion of the innovation process and of how companies leverage their intellectual property rights in order to obtain market leadership. Particular emphasis is also placed upon how legal doctrines have developed to cope with these issues, and related economic analysis is also discussed.
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research in the world's technology-crime hotspots. Cybercrime seems invisible. Attacks arrive out of nowhere, their origins hidden by layers of sophisticated technology. Only the victims are clear. But every crime has its perpetrator-specific individuals or groups sitting somewhere behind keyboards and screens. Jonathan Lusthaus lifts the veil on the world of these cybercriminals in the most extensive account yet of the lives they lead, and the vast international industry they have created. We are long past the age of the lone adolescent hacker tapping away in his parents' basement. Cybercrime now operates like a business. Its goods and services may be illicit, but it is highly organized, complex, driven by profit, and globally interconnected. Having traveled to cybercrime hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, Lusthaus takes us inside this murky underworld and reveals how this business works. He explains the strategies criminals use to build a thriving industry in a low-trust environment characterized by a precarious combination of anonymity and teamwork. Crime takes hold where there is more technical talent than legitimate opportunity, and where authorities turn a blind eye-perhaps for a price. In the fight against cybercrime, understanding what drives people into this industry is as important as advanced security. Based on seven years of fieldwork from Eastern Europe to West Africa, Industry of Anonymity is a compelling and revealing study of a rational business model which, however much we might wish otherwise, has become a defining feature of the modern world.
"Blockchains will matter crucially; this book, beautifully and clearly written for a wide audience, powerfully demonstrates how." -Lawrence Lessig "Attempts to do for blockchain what the likes of Lawrence Lessig and Tim Wu did for the Internet and cyberspace-explain how a new technology will upend the current legal and social order... Blockchain and the Law is not just a theoretical guide. It's also a moral one." -Fortune Bitcoin has been hailed as an Internet marvel and decried as the preferred transaction vehicle for criminals. It has left nearly everyone without a computer science degree confused: how do you "mine" money from ones and zeros? The answer lies in a technology called blockchain. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet in both form and impact. Blockchains are being used to create "smart contracts," to expedite payments, to make financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. But by cutting out the middlemen, they run the risk of undermining governmental authorities' ability to supervise activities in banking, commerce, and the law. As this essential book makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking. "If you...don't 'get' crypto, this is the book-length treatment for you." -Tyler Cowen, Marginal Revolution "De Filippi and Wright stress that because blockchain is essentially autonomous, it is inflexible, which leaves it vulnerable, once it has been set in motion, to the sort of unforeseen consequences that laws and regulations are best able to address." -James Ryerson, New York Times Book Review
This book investigates the intersection of terrorism, digital technologies and cyberspace. The evolving field of cyber-terrorism research is dominated by single-perspective, technological, political, or sociological texts. In contrast, Terrorism Online uses a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or addressed? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists and protest activities associated with 'hacktivist' groups to state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach to cyberterrorism which provides a unique and invaluable contribution to this subject matter. This book will be of great interest to students of cybersecurity, security studies, terrorism and International Relations.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, to electoral fraud prevention, to a wholesale decentralisation of power and the banishing of the exploitative practices of 'middlemen', blockchain stakeholders are nothing short of evangelical in their belief that it is a force for good. For these reasons and more the technology has captured the attention of entrepreneurs, venture capitalists, global corporations and governments the world over. Blockchain may indeed offer a unique technical opportunity to change cultures of transparency and trust within cyberspace, and as 'revolutionary' and 'disruptive' has the potential to shift global socioeconomic and political conventions. But as a yet largely unregulated, solutionist-driven phenomenon, blockchain exists squarely within the boundaries of capitalist logic and reason, fast becoming central to the business models of many sources of financial and political power the technology was specifically designed to undo, and increasingly allied to neoliberal strategies with scant regard for collective, political or democratic accountability in the public interest. Regulating Blockchain casts a critical eye over the technology, its 'ecosystem' of stakeholders, and offers a challenge to the prevailing discourse proclaiming it to be the great techno-social enabler of our times.
In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, Mark Tunick asks whether privacy interests can ever be weightier than society's interest in free speech and access to information. Taking a comparative and interdisciplinary approach, and drawing on the work of political theorist Jeremy Waldron concerning toleration, the book argues that we can still have a legitimate interest in controlling the extent to which information about us is disseminated. The book begins by exploring why privacy and free speech are valuable, before developing a framework for weighing these conflicting values. By taking up key cases in the US and Europe, and the debate about a 'right to be forgotten', Tunick discusses the potential costs of limiting free speech, and points to legal remedies and other ways to develop new social attitudes to privacy in an age of instant information sharing. This book will be of great interest to students of privacy law, legal ethics, internet governance and media law in general.
Innovative initiatives for online arbitration are needed to aid in resolving cross-border commercial and consumer disputes in the EU, UK, US and China. This book provides a comparative study of online dispute resolution (ODR) systems and a model of best practices, taking into consideration the features and characteristics of various practical experiences/examples of ODR services and technological development for ODR systems and platforms. The book begins with a theoretical approach, looking into the challenges in the use of online arbitration in commercial transactions and analysing the potential adoption of technology-assisted arbitration (e.g. Basic ODR systems and Intelligent/Advanced ODR systems) in resolving certain types of international commercial and consumer disputes. It then investigates the legal obstacles to adopting ODR by examining the compatibility of technology with current legislation and regulatory development. Finally, it suggests appropriate legal and technological measures to promote the recognition of ODR, in particular online arbitration, for cross-border commercial and consumer disputes. By exploring both the theoretical framework and the practical considerations of online arbitration, this book will be a vital reference for lawyers, policy-makers, government officials, industry professionals and academics who are involved with online arbitration.
This is the first book-length treatment of the advancement of EU global data flows and digital trade through the framework of European institutionalisation. Drawing on case studies of EU-US, EU-Japan and EU-China relations it charts the theoretical and empirical approaches at play. It illustrates how the EU has pioneered high standards in data flows and how it engages in significant digital trade reforms, committed to those standards. The book marks a major shift in how institutionalisation and the EU should be viewed as it relates to two of the more extraordinary areas of global governance: trade and data flows. This significant book will be of interest to EU constitutional lawyers, as well as those researching in the field of IT and data law.
Praise for Robert W. McChesney "Robert McChesney's work has been of extraordinary importance. .
. . It should be read with care and concern by people who care
about freedom and basic rights." "Robert McChesney is one of the nation's most important analysts
of the media." The symptoms of the crisis of the U.S. media are well-known--a decline in hard news, the growth of info-tainment and advertorials, staff cuts and concentration of ownership, increasing conformity of viewpoint and suppression of genuine debate. McChesney's new book, The Problem of the Media, gets to the roots of this crisis, explains it, and points a way forward for the growing media reform movement. Moving consistently from critique to action, the book explores the political economy of the media, illuminating its major flashpoints and controversies by locating them in the political economy of U.S. capitalism. It deals with issues such as the declining quality of journalism, the question of bias, the weakness of the public broadcasting sector, and the limits and possibilities of antitrust legislation in regulating the media. It points out the ways in which the existing media system has become a threat to democracy, and shows how it could be made to serve the interests of the majority. McChesney's "Rich Media, Poor Democracy" was hailed as a pioneering analysis of the way in which media had come to serve the interests of corporate profit rather than public enlightenment and debate. Bill Moyers commented, "If Thomas Paine were around, he would have written this book." The Problem of the Media is certain to be a landmark in media studies, a vital resource for media activism, and essential reading for concerned scholars and citizens everywhere.
The Seventh Edition covers the new set of EU Directives and the Electronic Communications Code, which will considerably change the legal framework for electronic communications. Essential reading for all lawyers and non-legal executives involved in telecoms, IT and media, this book will enable the reader to: - Make valuable comparative analyses with detailed coverage of 34 EU and non-EU countries in a single, accessible source - Ensure that your company's/clients' current and future activities do not conflict with the rules outlined in the 2009 EU Regulatory Package - Successfully evaluate opportunities for expansion within the European telecoms industry and potential pitfalls The EU chapter and the country chapters are complemented by detailed chapters on EU Data Protection and Privacy, EU Competition Law in the Telecommunications Sector, The Law of the International Telecommunication Union and the World Trade Organisation, and Compliance and Risk Management. Countries included: EU: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Russia, Slovakia, Slovenia, Spain, Sweden, UK. Non EU: Croatia, Macedonia, Norway, Switzerland, Turkey, Ukraine.
This book considers the rapidly evolving, both legally and socially, nature of image-based abuse, for both minors and adults. Drawing mainly from UK data, legislation and case studies, it presents a thesis that the law is, at best, struggling to keep up with some fundamental issues around image based abuse, such as the sexual nature of the crimes and the long term impact on victims, and at worst, in the case of supporting minors, not fit for purpose. It shows, through empirical and legislative analysis, that the dearth of education around this topic, coupled with cultural norms, creates a victim blaming culture that extends into adulthood. It proposes both legislative developments and need for wider stakeholder engagement to understand and support victims, and the impact the non-consensual sharing of intimate images can have on their long-term mental health and life in general. The book is of interest to scholar of law, criminology, sociology, police and socio-technical studies, and is also to those who practice law, law enforcement or wider social care role in both child and adult safeguarding.
In this riveting, behind-the-scenes courtroom drama, a brilliant legal team battles corporate greed and government overreach for our fundamental right to control our genes. When attorney Chris Hansen learned that the U.S. government was issuing patents for human genes to biotech companies, his first thought was, How can a corporation own what makes us who we are? Then he discovered that women were being charged exorbitant fees to test for hereditary breast and ovarian cancers, tests they desperately needed--all because Myriad Genetics had patented the famous BRCA genes. So he sued them. Jorge L. Contreras, one of the nation's foremost authorities on human genetics law, has devoted years to investigating the groundbreaking civil rights case known as AMP v. Myriad. In The Genome Defense Contreras gives us the view from inside as Hansen and his team of ACLU lawyers, along with a committed group of activists, scientists, and physicians, take their one-in-a-million case all the way to the U.S. Supreme Court. Contreras interviewed more than a hundred key players involved in all aspects of the case--from judges and policy makers to ethicists and genetic counselors, as well as cancer survivors and those whose lives would be impacted by the decision--expertly weaving together their stories into a fascinating narrative of this pivotal moment in history. The Genome Defense is a powerful and compelling story about how society must balance scientific discovery with corporate profits and the rights of all people.
The Technology and Construction Court is one of the specialist jurisdictions of the High Court. It deals with a specialised workload involving construction industry and engineering disputes and, increasingly, information technology disputes. Its work often involves heavy factual cases, but also action in support of other dispute resolution methods such as arbitration, mediation, or adjudication under the Housing Grants, Construction, and Regeneration Act 1996. Technology and Construction Court :Practice and Procedure provides a unique and authoritative guide to this jurisdiction. It examines the day-to-day workings of the Court in detail, including: the relevant Civil Procedure Rules, the Pre-Action Protocol procedure, case management, alternative dispute resolution, the Court's support for arbitration, the stages in proceedings leading up to trial, the enforcement of adjudicators' decisions and costs. The book is fully up-to-date to take account of the second edition of the TCC Guide, which took effect on October 2005. The text offers step-by-step guide to the practice and procedures involved in the initiating and defending of proceedings, together with expert analysis and guidance on matters unique to the Court - such as Scott schedules, handling of expert witnesses, and enforcement of adjudication decisions. The authors are specialist practitioners with extensive experience of the Court from both sides of the legal profession. They have combined an authoritative analysis of the powers and constitution of the Court with detailed attention to the practical matters facing litigants, including timescales, costs, and the interaction of the Court's powers with alternative dispute resolution methods. There are useful appendices with extensive materials including a list of the current Judges, a list of District Registries, relevant legislation, rules of procedure, Practice Directions, and statutory instruments and various standard forms. This detailed and authoritative guide to the practice and procedure of this Court will be an essential reference work for all practitioners and in-house counsel involved with construction, engineering and IT disputes.
Innovative initiatives for online arbitration are needed to aid in resolving cross-border commercial and consumer disputes in the EU, UK, US and China. This book provides a comparative study of online dispute resolution (ODR) systems and a model of best practices, taking into consideration the features and characteristics of various practical experiences/examples of ODR services and technological development for ODR systems and platforms. The book begins with a theoretical approach, looking into the challenges in the use of online arbitration in commercial transactions and analysing the potential adoption of technology-assisted arbitration (e.g. Basic ODR systems and Intelligent/Advanced ODR systems) in resolving certain types of international commercial and consumer disputes. It then investigates the legal obstacles to adopting ODR by examining the compatibility of technology with current legislation and regulatory development. Finally, it suggests appropriate legal and technological measures to promote the recognition of ODR, in particular online arbitration, for cross-border commercial and consumer disputes. By exploring both the theoretical framework and the practical considerations of online arbitration, this book will be a vital reference for lawyers, policy-makers, government officials, industry professionals and academics who are involved with online arbitration.
In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated. The rise of big data analytics in the political process has triggered official investigations in many countries around the world, and become the subject of broad and intense debate. Political parties increasingly rely on data analytics to profile the electorate and to target specific voter groups with individualised messages based on their demographic attributes. Political micro-targeting has become a major factor in modern campaigning, because of its potential to influence opinions, to mobilise supporters and to get out votes. The book explores the legal, philosophical and political dimensions of big data analytics in the electoral process. It demonstrates that the unregulated use of big personal data for political purposes not only infringes voters' privacy rights, but also has the potential to jeopardise the future of the democratic process, and proposes reforms to address the key regulatory and ethical questions arising from the mining, use and storage of massive amounts of voter data. Providing an interdisciplinary assessment of the use and regulation of big data in the political process, this book will appeal to scholars from law, political science, political philosophy and media studies, policy makers and anyone who cares about democracy in the age of data-driven political campaigning.
This book explores how the Internet impacts on the protection of fundamental rights, particularly with regard to freedom of speech and privacy. In doing so, it seeks to bridge the gap between Internet Law and European and Constitutional Law. The book aims to emancipate the debate on internet law and jurisprudence from the dominant position, with specific reference to European legal regimes. This approach aims to inject a European and constitutional "soul" into the topic. Moreover, the book addresses the relationship between new technologies and the protection of fundamental rights within the theoretical debate surrounding the process of European integration, with particular emphasis on judicial dialogue. This innovative book provides a thorough analysis of the forms, models and styles of judicial protection of fundamental rights in the digital era and compares the European vision to that of the United States. The book offers the first comparative analysis in which the notion of (judicial) frame, borrowed from linguistic and cognitive studies, is systematically applied to the theories of interpretation and argumentation. With a Foreword by Robert Spano, President of the European Court of Human Rights. |
![]() ![]() You may like...
Elements of STIL - Principles and…
Gregory A. Maston, Tony R. Taylor, …
Hardcover
R4,739
Discovery Miles 47 390
|