![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Cybersecurity, data privacy law, and the related legal implications overlap into a relevant and developing area in the legal field. However, many legal practitioners lack the foundational understanding of computer processes which are fundamental for applying existing and developing legal structures to the issue of cybersecurity and data privacy. At the same time, those who work and research in cybersecurity are often unprepared and unaware of the nuances of legal application. This book translates the fundamental building blocks of data privacy and (cyber)security law into basic knowledge that is equally accessible and educational for those working and researching in either field, those who are involved with businesses and organizations, and the general public.
By adopting a multi-disciplinary approach, this book provides a comprehensive analysis of the legality of the use of autonomous weapons systems under international law. It examines different arguments presented by States, roboticists and scholars to demonstrate the challenges such systems will create for the laws of war. This study examines how technology of warfare seeks to increase the dissociation of risk and communication between weapons and their human operators. Furthermore, it explains how algorithms might give rise to 'errors' on the battlefield that cannot be directly attributed to human operators. Against this backdrop, Dr Seixas-Nunes examines three distinct legal frameworks: the distinction between the legality of weapons and the laws of targeting; different mechanisms of individual accountability and the importance of recovering the category of 'dolus eventualis' for programmers and technicians and, finally, State responsibility for violations of the laws of war caused by weapons' software errors.
Patents are important tools for innovation policy. They incentivize the creation and dissemination of new technical solutions and help to disclose their working to the public in exchange for limited exclusivity. Injunctions are important tools of their enforcement. Much has been written about different aspects of the patent system, but the issue of injunctions is largely neglected in the comparative legal literature. This book explains how the drafting, tailoring and enforcement of injunctions in patent law works in several leading jurisdictions: Europe, the United States, Canada, and Israel. The chapters provide in-depth explanation of how and why national judges provide for or reject flexibility and tailoring of injunctive relief. With its transatlantic and intra- European comparisons, as well as a policy and theoretical synthesis, this is the most comprehensive overview available for practicing attorneys and scholars in patent law. This book is also available as Open Access on Cambridge Core.
Regulators have been more permissive for medical devices compared to their drug and biologic counterparts. While innovative products can thereby reach consumers more quickly, this approach raises serious public health and safety concerns. Additionally, the nature of medical devices is rapidly changing, as software has become as important as hardware. Regulation must keep pace with the current developments and controversies of this technology. This volume provides a multidisciplinary evaluation of the ethical, legal, and regulatory concerns surrounding medical devices in the US and EU. For medical providers, policymakers, and other stakeholders, the book offers a framework for the opportunities and challenges on the horizon for medical device regulation. Readers will gain a nuanced overview of the latest developments in patient privacy and safety, innovation, and new regulatory laws. This book is also available as Open Access on Cambridge Core.
This book provides a comparison and practical guide of the data protection laws of Canada, China (Hong Kong, Macau, Taiwan), Laos, Philippines, South Korea, United States and Vietnam. The book builds on the first book Data Protection Law. A Comparative Analysis of Asia-Pacific and European Approaches, Robert Walters, Leon Trakman, Bruno Zeller. As the world comes to terms with Artificial Intelligence (AI), which now pervades the daily lives of everyone. For instance, our smart or Iphone, and smart home technology (robots, televisions, fridges and toys) access our personal data at an unprecedented level. Therefore, the security of that data is increasingly more vulnerable and can be compromised. This book examines the interface of cyber security, AI and data protection. It highlights and recommends that regulators and governments need to undertake wider research and law reform to ensure the most vulnerable in the community have their personal data protected adequately, while balancing the future benefits of the digital economy.
Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the world, it contains an incredible amount of practical, directly applicable information. It follows a step-by-step approach to the investigation, seizure, and evaluation of computer evidence. The material in the book has been used at the Federal Law Enforcement Training Center and the Canadian Police College for teaching computer classes in white collar crime and sex crime investigations and by U.S. Army Intelligence in cooperation with NATO in Europe. It has also been used to teach a one-week course in computer crime investigation to agents from the IRS, Secret Service, and state and local agencies.
The world of fiber optic connections reaching neighborhoods, homes, and businesses will represent as great a change from what came before as the advent of electricity. The virtually unlimited amounts of data we'll be able to send and receive through fiber optic connections will enable a degree of virtual presence that will radically transform health care, education, urban administration and services, agriculture, retail sales, and offices. Yet all of those transformations will pale compared with the innovations and new industries that we can't even imagine today. In a fascinating account combining policy expertise and compelling on-the-ground reporting, Susan Crawford reveals how the giant corporations that control cable and internet access in the United States use their tremendous lobbying power to tilt the playing field against competition, holding back the infrastructure improvements necessary for the country to move forward. And she shows how a few cities and towns are fighting monopoly power to bring the next technological revolution to their communities.
In its first and second editions, Tomorrow's Lawyers became an international bestseller, widely read and cited by practitioners and students. The third edition focuses on the law and lawyers in the 2020s. For Richard Susskind, the future of legal service is neither Grisham nor Rumpole. Instead, he predicts a world of online courts, AI-based global legal businesses, disruptive legal technologies, liberalized markets, commoditization, alternative sourcing, simulated practice on the metaverse, and many new legal jobs. This volume is a definitive and updated introduction to this future - for aspiring lawyers, and for all who want to modernize and upgrade our legal and justice systems. It offers practical guidance for everyone intending to build careers and businesses in law. Written in an era of greater technological advance than humanity has ever witnessed, this work is a call to arms: it challenges those who feel that the law and lawyers are somehow immune from technological advance; it draws attention to the unaffordability and inaccessibility of legal service, for businesses and citizens alike; it invites the next generation of lawyers to harness the power of technology in improving and even overhauling the way in which legal and court service is currently provided. Tomorrow's Lawyers identifies new opportunities for lawyers, new ways of helping clients and the community. It enjoins its readers to become involved in building the systems that will replace outmoded forms of legal work. It argues that it is both a privilege and an obligation for tomorrow's lawyers to embrace and bring about change. A must-read for legal undergraduates, aspiring and young lawyers, senior practitioners, leaders in law firms and legal businesses, law professors and law teachers.
Many pressing environmental and security threats now facing the international community may be traced to the frontiers. From climate change and cyber-attacks to the associated challenges of space weaponization and orbital debris mitigation, solutions to all of these issues have at their root some form of regulation over the 'global commons'. Yet governance over these spaces is now transitioning away from multilateral treaties to regional and bilateral accords. This book makes an original contribution by comparing and contrasting some of the principal issues facing the frontiers. It analyzes how and why existing governance structures are often failing to adequately meet global collective action problems, with special coverage on cybersecurity and Internet governance. It proposes a new way forward incorporating lessons from successful regimes as well as the interdisciplinary scholarship on polycentric governance, arguing that multi-stakeholder collaboration is imperative in order to avoid tragedies of the global commons.
This book addresses current issues regarding the ethical use of information technology in a holistic vision, by combining the perspectives of education specialists and those in the field of computer science at the level of higher education. It provides a current ethical perspective on the problems and solutions involved in the use of information technology in higher education. It appeals to readers interested in exploring the problems and appropriate solutions related to the ethical use of new technologies in higher education.
Funksysteme bilden zunehmend die Grundlage von Kommunikation, privat ebenso wie in Industrie und Wirtschaft. Von WLAN bis zur Satellitenkommunikation mussen die Kommunikations-, Navigations- und Rundfunksatelliten und ihre Bodenanlagen national und international regulatorisch koordiniert werden. Das Buch beschreibt anschaulich das Prozedere einer Funkanmeldung, eroertert Beispiele von Satellitenprojekten und zeigt Wege auf, wie das endliche Spektrum effektiv genutzt werden kann, damit auch in Zukunft weitere Systeme zugelassen werden koennen.
In Digital Data Collection and Information Privacy Law, Mark Burdon argues for the reformulation of information privacy law to regulate new power consequences of ubiquitous data collection. Examining developing business models, based on collections of sensor data - with a focus on the 'smart home' - Burdon demonstrates the challenges that are arising for information privacy's control-model and its application of principled protections of personal information exchange. By reformulating information privacy's primary role of individual control as an interrupter of modulated power, Burdon provides a foundation for future law reform and calls for stronger information privacy law protections. This book should be read by anyone interested in the role of privacy in a world of ubiquitous and pervasive data collection.
The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws (as part of Network Sovereignty policies) affect innovation in artificial intelligence (AI). The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017-2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the Cyber Security Law did not anticipate the changing nature of globalised AI innovation. It is argued that the deliberate deployment of what the book refers to as 'fuzzy logic' in drafting the Cyber Security Law allowed regulators to subsequently interpret key terms regarding data in that Law in a fluid and flexible fashion to benefit Chinese innovation.
Regulators have been more permissive for medical devices compared to their drug and biologic counterparts. While innovative products can thereby reach consumers more quickly, this approach raises serious public health and safety concerns. Additionally, the nature of medical devices is rapidly changing, as software has become as important as hardware. Regulation must keep pace with the current developments and controversies of this technology. This volume provides a multidisciplinary evaluation of the ethical, legal, and regulatory concerns surrounding medical devices in the US and EU. For medical providers, policymakers, and other stakeholders, the book offers a framework for the opportunities and challenges on the horizon for medical device regulation. Readers will gain a nuanced overview of the latest developments in patient privacy and safety, innovation, and new regulatory laws. This book is also available as Open Access on Cambridge Core.
This book is about the human factor in cybercrime: its offenders, victims and parties involved in tackling cybercrime. It takes a diverse international perspective of the response to and prevention of cybercrime by seeking to understand not just the technological, but the human decision-making involved. This edited volume represents the state of the art of research on the human factor in cybercrime, addressing its victims, offenders, and policing. It originated at the Second annual Conference on the Human Factor in Cybercrime, held in The Netherlands in October 2019, bringing together empirical research from a variety of disciplines, and theoretical and methodological approaches. This volume will be of particular interest to researchers and students in cybercrime and the psychology of cybercrime, as well as policy makers and law enforcement interested in prevention and detection.
The desire for humanity and the desire for security have co-existed as long as humans have been alive. As science has become increasingly sophisticated, so have the methods of self-defence by States. Nanotechnology is already changing warfare by increasing capabilities upon which armed forces are heavily reliant: more efficient energy storage, advanced photovoltaics, and improved military protective equipment to name a few of these developments. Some applications of nanomaterials by the military are both powerful and subtle, and have neurological and biological applications: 'devices that can infiltrate electronics and seize control at crucial moments, artificial "disease" agents that can rest harmlessly in victims' bodies until activated by an external signal'. The advance of the use or contemplation of use of these types of nanoscale applications by the military requires urgent analysis in light of existing international law, particularly in light of their potential effects on humans and on the environment.
In Government Cloud Procurement, Kevin McGillivray explores the question of whether governments can adopt cloud computing services and still meet their legal requirements and other obligations to citizens. The book focuses on the interplay between the technical properties of cloud computing services and the complex legal requirements applicable to cloud adoption and use. The legal issues evaluated include data privacy law (GDPR and the US regime), jurisdictional issues, contracts, and transnational private law approaches to addressing legal requirements. McGillivray also addresses the unique position of governments when they outsource core aspects of their information and communications technology to cloud service providers. His analysis is supported by extensive research examining actual cloud contracts obtained through Freedom of Information Act requests. With the demand for cloud computing on the rise, this study fills a gap in legal literature and offers guidance to organizations considering cloud computing.
International legal scholars tend to think of their work as the interpretation of rules: the application of a law 'out there' to concrete situations. This book takes a different approach to that scholarship: it views doctrine as a socio-linguistic practice. In other words, this book views legal scholars not as law-appliers, but as constructing knowledge within a particular academic discipline. By means of three close-ups of the discourse on cyberwar and international law, this book shows how international legal knowledge is constructed in ways usually overlooked: by means of footnotes, for example, or conference presentations. In so doing, this book aims to present a new way of seeing international legal scholarship: one that pays attention to the mundane parts of international legal texts and provides a different understanding of how international law as we know it comes about.
New technologies have always challenged the social, economic, legal, and ideological status quo. Constitutional law is no less impacted by such technologically driven transformations, as the state must formulate a legal response to new technologies and their market applications, as well as the state's own use of new technology. In particular, the development of data collection, data mining, and algorithmic analysis by public and private actors present unique challenges to public law at the doctrinal as well as the theoretical level. This collection, aimed at legal scholars and practitioners, describes the constitutional challenges created by the algorithmic society. It offers an important synthesis of the state of play in law and technology studies, addressing the challenges for fundamental rights and democracy, the role of policy and regulation, and the responsibilities of private actors. This title is also available as Open Access on Cambridge Core.
This volume explores from a legal perspective, how blockchain works. Perhaps more than ever before, this new technology requires us to take a multidisciplinary approach. The contributing authors, which include distinguished academics, public officials from important national authorities, and market operators, discuss and demonstrate how this technology can be a driver of innovation and yield positive effects in our societies, legal systems and economic/financial system. In particular, they present critical analyses of the potential benefits and legal risks of distributed ledger technology, while also assessing the opportunities offered by blockchain, and possible modes of regulating it. Accordingly, the discussions chiefly focus on the law and governance of blockchain, and thus on the paradigm shift that this technology can bring about.
Algorithms are now widely employed to make decisions that have increasingly far-reaching impacts on individuals and society as a whole ("algorithmic governance"), which could potentially lead to manipulation, biases, censorship, social discrimination, violations of privacy, property rights, and more. This has sparked a global debate on how to regulate AI and robotics ("governance of algorithms"). This book discusses both of these key aspects: the impact of algorithms, and the possibilities for future regulation.
Fur neue und kunftige Geschaftsfelder von E-Commerce und E-Government stellen der Datenschutz und der Identitatsschutz wichtige Herausforderungen dar. Renommierte Autoren aus Wissenschaft und Praxis widmen sich in dem Band aktuellen Problemen des Daten- und Identitatsschutzes aus rechtlicher und technischer Perspektive. Sie analysieren aktuelle Problemfalle aus der Praxis und bieten Handlungsempfehlungen an. Das Werk richtet sich an Juristen und technisch Verantwortliche in Behorden und Unternehmen sowie an Rechtsanwalte und Wissenschaftler."
The most fascinating and profitable subject of predictive algorithms is the human actor. Analysing big data through learning algorithms to predict and pre-empt individual decisions gives a powerful tool to corporations, political parties and the state. Algorithmic analysis of digital footprints, as an omnipresent form of surveillance, has already been used in diverse contexts: behavioural advertising, personalised pricing, political micro-targeting, precision medicine, and predictive policing and prison sentencing. This volume brings together experts to offer philosophical, sociological, and legal perspectives on these personalised data practices. It explores common themes such as choice, personal autonomy, equality, privacy, and corporate and governmental efficiency against the normative frameworks of the market, democracy and the rule of law. By offering these insights, this collection on data-driven personalisation seeks to stimulate an interdisciplinary debate on one of the most pervasive, transformative, and insidious socio-technical developments of our time.
This collection explores the relevance of global trade law for data, big data and cross-border data flows. Contributing authors from different disciplines including law, economics and political science analyze developments at the World Trade Organization and in preferential trade venues by asking what future-oriented models for data governance are available and viable in the area of trade law and policy. The collection paints the broad picture of the interaction between digital technologies and trade regulation as well as provides in-depth analyses of critical to the data-driven economy issues, such as privacy and AI, and different countries' perspectives. This title is also available as Open Access on Cambridge Core.
Should we regulate artificial intelligence? Can we? From self-driving cars and high-speed trading to algorithmic decision-making, the way we live, work, and play is increasingly dependent on AI systems that operate with diminishing human intervention. These fast, autonomous, and opaque machines offer great benefits - and pose significant risks. This book examines how our laws are dealing with AI, as well as what additional rules and institutions are needed - including the role that AI might play in regulating itself. Drawing on diverse technologies and examples from around the world, the book offers lessons on how to manage risk, draw red lines, and preserve the legitimacy of public authority. Though the prospect of AI pushing beyond the limits of the law may seem remote, these measures are useful now - and will be essential if it ever does. |
You may like...
Cyberlaw @ SA - The Law of the Internet…
S. Papadopoulos, S. Snail ka Mtuze
Paperback
R988
Discovery Miles 9 880
Emerging Technologies - Ethics, Law and…
Gary E Marchant, Wendell Wallach
Hardcover
R9,337
Discovery Miles 93 370
Research Handbook on Contract Design
Marcelo Corrales Compagnucci, Helena Haapio, …
Hardcover
R7,053
Discovery Miles 70 530
Research Handbook on International Law…
Nicholas Tsagourias, Russell Buchan
Hardcover
R9,077
Discovery Miles 90 770
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay
Hardcover
R3,900
Discovery Miles 39 000
Digital Justice - Technology and the…
Ethan Katsh, Orna Rabinovich-Einy
Hardcover
R2,990
Discovery Miles 29 900
Tugendhat and Christie: The Law of…
Nicole Moreham, Mark Warby
Hardcover
R16,085
Discovery Miles 160 850
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R762
Discovery Miles 7 620
|