![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Many pressing environmental and security threats now facing the international community may be traced to the frontiers. From climate change and cyber-attacks to the associated challenges of space weaponization and orbital debris mitigation, solutions to all of these issues have at their root some form of regulation over the 'global commons'. Yet governance over these spaces is now transitioning away from multilateral treaties to regional and bilateral accords. This book makes an original contribution by comparing and contrasting some of the principal issues facing the frontiers. It analyzes how and why existing governance structures are often failing to adequately meet global collective action problems, with special coverage on cybersecurity and Internet governance. It proposes a new way forward incorporating lessons from successful regimes as well as the interdisciplinary scholarship on polycentric governance, arguing that multi-stakeholder collaboration is imperative in order to avoid tragedies of the global commons.
This book addresses current issues regarding the ethical use of information technology in a holistic vision, by combining the perspectives of education specialists and those in the field of computer science at the level of higher education. It provides a current ethical perspective on the problems and solutions involved in the use of information technology in higher education. It appeals to readers interested in exploring the problems and appropriate solutions related to the ethical use of new technologies in higher education.
The world of fiber optic connections reaching neighborhoods, homes, and businesses will represent as great a change from what came before as the advent of electricity. The virtually unlimited amounts of data we'll be able to send and receive through fiber optic connections will enable a degree of virtual presence that will radically transform health care, education, urban administration and services, agriculture, retail sales, and offices. Yet all of those transformations will pale compared with the innovations and new industries that we can't even imagine today. In a fascinating account combining policy expertise and compelling on-the-ground reporting, Susan Crawford reveals how the giant corporations that control cable and internet access in the United States use their tremendous lobbying power to tilt the playing field against competition, holding back the infrastructure improvements necessary for the country to move forward. And she shows how a few cities and towns are fighting monopoly power to bring the next technological revolution to their communities.
Funksysteme bilden zunehmend die Grundlage von Kommunikation, privat ebenso wie in Industrie und Wirtschaft. Von WLAN bis zur Satellitenkommunikation mussen die Kommunikations-, Navigations- und Rundfunksatelliten und ihre Bodenanlagen national und international regulatorisch koordiniert werden. Das Buch beschreibt anschaulich das Prozedere einer Funkanmeldung, eroertert Beispiele von Satellitenprojekten und zeigt Wege auf, wie das endliche Spektrum effektiv genutzt werden kann, damit auch in Zukunft weitere Systeme zugelassen werden koennen.
An adaptive cyber risk management guide from MIT scientist and Johns Hopkins professor Gregory Falco and "Cyber Czar" Eric Rosenbach Cyberattacks continue to grow in number, intensity, and sophistication. While attackers persistently adapt, business leaders have suffered from employing the same cyber risk management strategies for decades. Organizations must learn how to move past temporary solutions and invest in long-term resiliency measures to thrive in the future cyber economy. Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership guidebook outlining a new strategy for improving organizational cybersecurity and mitigating cyber risk. Veteran cybersecurity experts Falco and Rosenbach introduce the Embedded Endurance strategy as a systems-level approach to cyber risk management which addresses interdependent components of organizational risk and prepares organizations for the inevitability of cyber threats over the long-term. Using real world examples from SolarWinds to the Colonial Pipeline attack, the authors extend beyond hardware and software to provide a thoughtful ten-step process for organizations to address the simultaneous operational, reputational, and litigation risks common to cyberattacks. They conclude with helpful "cryptograms" from the future, in which business leaders are confronted with the next generation of cyber risk challenges. Clear and informative, Confronting Cyber Risk provides CEOs and cyber newcomers alike with concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks in an evolving cyber risk landscape.
In Digital Data Collection and Information Privacy Law, Mark Burdon argues for the reformulation of information privacy law to regulate new power consequences of ubiquitous data collection. Examining developing business models, based on collections of sensor data - with a focus on the 'smart home' - Burdon demonstrates the challenges that are arising for information privacy's control-model and its application of principled protections of personal information exchange. By reformulating information privacy's primary role of individual control as an interrupter of modulated power, Burdon provides a foundation for future law reform and calls for stronger information privacy law protections. This book should be read by anyone interested in the role of privacy in a world of ubiquitous and pervasive data collection.
The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws (as part of Network Sovereignty policies) affect innovation in artificial intelligence (AI). The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017-2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the Cyber Security Law did not anticipate the changing nature of globalised AI innovation. It is argued that the deliberate deployment of what the book refers to as 'fuzzy logic' in drafting the Cyber Security Law allowed regulators to subsequently interpret key terms regarding data in that Law in a fluid and flexible fashion to benefit Chinese innovation.
Regulators have been more permissive for medical devices compared to their drug and biologic counterparts. While innovative products can thereby reach consumers more quickly, this approach raises serious public health and safety concerns. Additionally, the nature of medical devices is rapidly changing, as software has become as important as hardware. Regulation must keep pace with the current developments and controversies of this technology. This volume provides a multidisciplinary evaluation of the ethical, legal, and regulatory concerns surrounding medical devices in the US and EU. For medical providers, policymakers, and other stakeholders, the book offers a framework for the opportunities and challenges on the horizon for medical device regulation. Readers will gain a nuanced overview of the latest developments in patient privacy and safety, innovation, and new regulatory laws. This book is also available as Open Access on Cambridge Core.
The desire for humanity and the desire for security have co-existed as long as humans have been alive. As science has become increasingly sophisticated, so have the methods of self-defence by States. Nanotechnology is already changing warfare by increasing capabilities upon which armed forces are heavily reliant: more efficient energy storage, advanced photovoltaics, and improved military protective equipment to name a few of these developments. Some applications of nanomaterials by the military are both powerful and subtle, and have neurological and biological applications: 'devices that can infiltrate electronics and seize control at crucial moments, artificial "disease" agents that can rest harmlessly in victims' bodies until activated by an external signal'. The advance of the use or contemplation of use of these types of nanoscale applications by the military requires urgent analysis in light of existing international law, particularly in light of their potential effects on humans and on the environment.
This book is about the human factor in cybercrime: its offenders, victims and parties involved in tackling cybercrime. It takes a diverse international perspective of the response to and prevention of cybercrime by seeking to understand not just the technological, but the human decision-making involved. This edited volume represents the state of the art of research on the human factor in cybercrime, addressing its victims, offenders, and policing. It originated at the Second annual Conference on the Human Factor in Cybercrime, held in The Netherlands in October 2019, bringing together empirical research from a variety of disciplines, and theoretical and methodological approaches. This volume will be of particular interest to researchers and students in cybercrime and the psychology of cybercrime, as well as policy makers and law enforcement interested in prevention and detection.
In Government Cloud Procurement, Kevin McGillivray explores the question of whether governments can adopt cloud computing services and still meet their legal requirements and other obligations to citizens. The book focuses on the interplay between the technical properties of cloud computing services and the complex legal requirements applicable to cloud adoption and use. The legal issues evaluated include data privacy law (GDPR and the US regime), jurisdictional issues, contracts, and transnational private law approaches to addressing legal requirements. McGillivray also addresses the unique position of governments when they outsource core aspects of their information and communications technology to cloud service providers. His analysis is supported by extensive research examining actual cloud contracts obtained through Freedom of Information Act requests. With the demand for cloud computing on the rise, this study fills a gap in legal literature and offers guidance to organizations considering cloud computing.
International legal scholars tend to think of their work as the interpretation of rules: the application of a law 'out there' to concrete situations. This book takes a different approach to that scholarship: it views doctrine as a socio-linguistic practice. In other words, this book views legal scholars not as law-appliers, but as constructing knowledge within a particular academic discipline. By means of three close-ups of the discourse on cyberwar and international law, this book shows how international legal knowledge is constructed in ways usually overlooked: by means of footnotes, for example, or conference presentations. In so doing, this book aims to present a new way of seeing international legal scholarship: one that pays attention to the mundane parts of international legal texts and provides a different understanding of how international law as we know it comes about.
New technologies have always challenged the social, economic, legal, and ideological status quo. Constitutional law is no less impacted by such technologically driven transformations, as the state must formulate a legal response to new technologies and their market applications, as well as the state's own use of new technology. In particular, the development of data collection, data mining, and algorithmic analysis by public and private actors present unique challenges to public law at the doctrinal as well as the theoretical level. This collection, aimed at legal scholars and practitioners, describes the constitutional challenges created by the algorithmic society. It offers an important synthesis of the state of play in law and technology studies, addressing the challenges for fundamental rights and democracy, the role of policy and regulation, and the responsibilities of private actors. This title is also available as Open Access on Cambridge Core.
Fur neue und kunftige Geschaftsfelder von E-Commerce und E-Government stellen der Datenschutz und der Identitatsschutz wichtige Herausforderungen dar. Renommierte Autoren aus Wissenschaft und Praxis widmen sich in dem Band aktuellen Problemen des Daten- und Identitatsschutzes aus rechtlicher und technischer Perspektive. Sie analysieren aktuelle Problemfalle aus der Praxis und bieten Handlungsempfehlungen an. Das Werk richtet sich an Juristen und technisch Verantwortliche in Behorden und Unternehmen sowie an Rechtsanwalte und Wissenschaftler."
The most fascinating and profitable subject of predictive algorithms is the human actor. Analysing big data through learning algorithms to predict and pre-empt individual decisions gives a powerful tool to corporations, political parties and the state. Algorithmic analysis of digital footprints, as an omnipresent form of surveillance, has already been used in diverse contexts: behavioural advertising, personalised pricing, political micro-targeting, precision medicine, and predictive policing and prison sentencing. This volume brings together experts to offer philosophical, sociological, and legal perspectives on these personalised data practices. It explores common themes such as choice, personal autonomy, equality, privacy, and corporate and governmental efficiency against the normative frameworks of the market, democracy and the rule of law. By offering these insights, this collection on data-driven personalisation seeks to stimulate an interdisciplinary debate on one of the most pervasive, transformative, and insidious socio-technical developments of our time.
This collection explores the relevance of global trade law for data, big data and cross-border data flows. Contributing authors from different disciplines including law, economics and political science analyze developments at the World Trade Organization and in preferential trade venues by asking what future-oriented models for data governance are available and viable in the area of trade law and policy. The collection paints the broad picture of the interaction between digital technologies and trade regulation as well as provides in-depth analyses of critical to the data-driven economy issues, such as privacy and AI, and different countries' perspectives. This title is also available as Open Access on Cambridge Core.
This open access book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by the NCSA (National Cybersecurity System Act - this act was the first attempt to create a legal regulation of cybersecurity and, in addition, has implemented the provisions of the NIS Directive) but may discuss a number of other issues. The book presents international and EU regulations in the field of cybersecurity and issues pertinent to combating cybercrime and cyberterrorism. Moreover, regulations concerning cybercrime in a few select European countries are presented in addition to the problem of collision of state actions in ensuring cybersecurity and human rights. The advantages of the book include a comprehensive and synthetic approach to the issues related to the cybersecurity system of the Republic of Poland, a research perspective that takes as the basic level of analysis issues related to the security of the state and citizens, and the analysis of additional issues related to cybersecurity, such as cybercrime, cyberterrorism, and the problem of collision between states ensuring security cybernetics and human rights. The book targets a wide range of readers, especially scientists and researchers, members of legislative bodies, practitioners (especially judges, prosecutors, lawyers, law enforcement officials), experts in the field of IT security, and officials of public authorities. Most authors are scholars and researchers at the War Studies University in Warsaw. Some of them work at the Academic Centre for Cybersecurity Policy - a thinktank created by the Ministry of National Defence of the Republic of Poland.
This volume explores from a legal perspective, how blockchain works. Perhaps more than ever before, this new technology requires us to take a multidisciplinary approach. The contributing authors, which include distinguished academics, public officials from important national authorities, and market operators, discuss and demonstrate how this technology can be a driver of innovation and yield positive effects in our societies, legal systems and economic/financial system. In particular, they present critical analyses of the potential benefits and legal risks of distributed ledger technology, while also assessing the opportunities offered by blockchain, and possible modes of regulating it. Accordingly, the discussions chiefly focus on the law and governance of blockchain, and thus on the paradigm shift that this technology can bring about.
Algorithms are now widely employed to make decisions that have increasingly far-reaching impacts on individuals and society as a whole ("algorithmic governance"), which could potentially lead to manipulation, biases, censorship, social discrimination, violations of privacy, property rights, and more. This has sparked a global debate on how to regulate AI and robotics ("governance of algorithms"). This book discusses both of these key aspects: the impact of algorithms, and the possibilities for future regulation.
Are the cognitive sciences relevant for law? How do they influence legal theory and practice? Should lawyers become part-time cognitive scientists? The recent advances in the cognitive sciences have reshaped our conceptions of human decision-making and behavior. Many claim, for instance, that we can no longer view ourselves as purely rational agents equipped with free will. This change is vitally important for lawyers, who are forced to rethink the foundations of their theories and the framework of legal practice. Featuring multidisciplinary scholars from around the world, this book offers a comprehensive overview of the emerging field of law and the cognitive sciences. It develops new theories and provides often provocative insights into the relationship between the cognitive sciences and various dimensions of the law including legal philosophy and methodology, doctrinal issues, and evidence.
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim.
Should we regulate artificial intelligence? Can we? From self-driving cars and high-speed trading to algorithmic decision-making, the way we live, work, and play is increasingly dependent on AI systems that operate with diminishing human intervention. These fast, autonomous, and opaque machines offer great benefits - and pose significant risks. This book examines how our laws are dealing with AI, as well as what additional rules and institutions are needed - including the role that AI might play in regulating itself. Drawing on diverse technologies and examples from around the world, the book offers lessons on how to manage risk, draw red lines, and preserve the legitimacy of public authority. Though the prospect of AI pushing beyond the limits of the law may seem remote, these measures are useful now - and will be essential if it ever does.
Governing Privacy in Knowledge Commons explores how privacy impacts knowledge production, community formation, and collaborative governance in diverse contexts, ranging from academia and IoT, to social media and mental health. Using nine new case studies and a meta-analysis of previous knowledge commons literature, the book integrates the Governing Knowledge Commons framework with Helen Nissenbaum's Contextual Integrity framework. The multidisciplinary case studies show that personal information is often a key component of the resources created by knowledge commons. Moreover, even when it is not the focus of the commons, personal information governance may require community participation and boundaries. Taken together, the chapters illustrate the importance of exit and voice in constructing and sustaining knowledge commons through appropriate personal information flows. They also shed light on the shortcomings of current notice-and-consent style regulation of social media platforms. This title is also available as Open Access on Cambridge Core.
Our court system is struggling. It is too costly to deliver justice for all but the few, too slow to satisfy those who can access it. Yet the values implicit in disputes being resolved in person, and in public, are fundamental to how we have imagined the fair resolution of disputes for centuries. Could justice be delivered online? The idea has excited and appalled in equal measure, promising to bring justice to all, threatening to strike at the heart of what we mean by justice. With online courts now moving from idea to reality, we are looking at the most fundamental change to our justice system for centuries, but the public understanding of and debate about the revolution is only just beginning. In Online Courts and the Future of Justice Richard Susskind, a pioneer of rethinking law for the digital age, confronts the challenges facing our legal system and the potential for technology to bring much needed change. Drawing on years of experience leading the discussion on conceiving and delivering online justice, Susskind here charts and develops the public debate. Against a background of austerity politics and cuts to legal aid, the public case for online courts has too often been framed as a business case by both sides of the debate. Are online courts preserving the public bottom line by finding efficiencies? Or sacrificing the interests of the many to deliver cut price justice? Susskind broadens the debate by making the moral case (whether online courts are required by principles of justice) and the jurisprudential case (whether online courts are compatible with our understanding of judicial process and constitutional rights) for delivering justice online. Includes a substantial new chapter updating the book with the developments in online courts since the onset of Covid-19.
This volume provides an overview of cyber economic crime in India, analyzing fifteen years of data and specific case studies from Mumbai to add to the limited research in cyber economic crime detection. Centering around an integrated victim-centered approach to investigating a global crime on the local level, the book examines the criminal justice system response to cyber economic crime and proposes new methods of detection and prevention. It considers the threat from a national security perspective, a cybercrime perspective, and as a technical threat to business and technology installations. Among the topics discussed: Changing landscape of crime in cyberspace Cybercrime typology Legal framework for cyber economic crime in India Cyber security mechanisms in India A valuable resource for law enforcement and police working on the local, national, and global level in the detection and prevention of cybercrime, Cyber Economic Crime in India will also be of interest to researchers and practitioners working in financial crimes and white collar crime. |
You may like...
Cyberlaw @ SA - The Law of the Internet…
S. Papadopoulos, S. Snail ka Mtuze
Paperback
R988
Discovery Miles 9 880
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R762
Discovery Miles 7 620
Competition and Regulation in the Data…
Gintare Surblyte-Namaviciene
Hardcover
R3,574
Discovery Miles 35 740
Research Handbook on EU Data Protection…
Eleni Kosta, Ronald Leenes, …
Hardcover
R8,496
Discovery Miles 84 960
Digital Justice - Technology and the…
Ethan Katsh, Orna Rabinovich-Einy
Hardcover
R2,990
Discovery Miles 29 900
Tugendhat and Christie: The Law of…
Nicole Moreham, Mark Warby
Hardcover
R16,085
Discovery Miles 160 850
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R4,152
Discovery Miles 41 520
|