![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.
Law and the Technologies of the Twenty-First Century provides a contextual account of the way in which law functions in a broader regulatory environment across different jurisdictions. It identifies and clearly structures the four key challenges that technology poses to regulatory efforts, distinguishing between technology as a regulatory target and tool, and guiding the reader through an emerging field that is subject to rapid change. By extensive use of examples and extracts from the texts and materials that form and shape the scholarly and public debates over technology regulation, it presents complex material in a stimulating and engaging manner. Co-authored by a leading scholar in the field with a scholar new to the area, it combines comprehensive knowledge of the field with a fresh approach. This is essential reading for students of law and technology, risk regulation, policy studies, and science and technology studies.
Providing a scholarly analysis of how to govern and make the right
kinds of laws for cyberspace, in this work, Professor Reed
investigates the vast majority of cyberspace users who wish to act
lawfully and asks whether the current state of law in cyberspace
makes it possible for them to do so. If not, why not, and what is
the cure?
How can law ethically regulate a future of fast-changing technologies? From recent inventions to science fiction, Future Law explores how law, ethics and regulation must respond to new technologies that challenge the boundaries of our ethics.
The Organization for Security and Cooperation in Europe (OSCE), the world's largest regional security organisation, possesses most of the attributes traditionally ascribed to an international organisation, but lacks a constitutive treaty and an established international legal personality. Moreover, OSCE decisions are considered mere political commitments and thus not legally binding. As such, it seems to correspond to the general zeitgeist, in which new, less formal actors and forms of international cooperation gain prominence, while traditional actors and instruments of international law are in stagnation. However, an increasing number of voices - including the OSCE participating states - have been advocating for more formal and autonomous OSCE institutional structures, for international legal personality, or even for the adoption of a constitutive treaty. The book analyses why and how these demands have emerged, critically analyses the reform proposals and provides new arguments for revisiting the OSCE legal framework.
Welche rechtlichen Grenzen sollen bei der Mitwirkung von Kindern und Jugendlichen in den Medien gelten? Diese Frage ist nicht nur Gegenstand einer gesamtgesellschaftlichen Diskussion, sondern bewegt spatestens seit den "Caroline"-Urteilen auch die juristische Welt. Die Autorin erlautert nicht nur die rechtlichen Grundlagen fur minderjahrige Akteure in Medien und sozialen Netzwerken, sondern zeigt auch die vorhandenen Schutzlucken auf. Anhand konkreter Massnahmen empfiehlt Sie, die aktuelle Rechtslage zu reformieren, um dem verfassungsrechtlich garantierten Schutz Minderjahriger, aber auch der Meinungs- und Pressefreiheit, gerecht zu werden.
Canadian Communication Policy and Lawprovides a uniquely Canadian focus and perspective on telecommunications policy, broadcasting policy, internet regulation, freedom of expression, censorship, defamation, privacy, government surveillance, intellectual property, and more. Taking a critical stance, Sara Bannerman draws attention to unequal power structures by asking the question, whom does Canadian communication policy and law serve? Key theories for analysis of law and policy issues-such as pluralist, libertarian, critical political economy, Marxist, feminist, queer, critical race, critical disability, postcolonial, and intersectional theories-are discussed in detail in this accessibly written text. From critical and theoretical analysis to legal research and citation skills, Canadian Communication Policy and Law encourages deep analytic engagement. Serving as a valuable resource for students who are undertaking research and writing on legal topics for the first time, this comprehensive text is well suited for undergraduate communication and media studies programs. Features: Includes a practical chapter on how to do legal and policy research and how to cite legal sources Contains in-text pedagogy including suggested readings and a comprehensive glossary.
Which state has and should have the right and power to regulate sites and online events? Who can apply their defamation or contract law, obscenity standards, gambling or banking regulation, pharmaceutical licensing requirements or hate speech prohibitions to any particular Internet activity? Traditionally, transnational activity has been 'shared out' between national sovereigns with the aid of location-centric rules which can be adjusted to the transnational Internet. But can these allocation rules be stretched indefinitely, and what are the costs for online actors and for states themselves of squeezing global online activity into nation-state law? Does the future of online regulation lie in global legal harmonisation or is it a cyberspace that increasingly mirrors the national borders of the offline world? This 2007 book offers some uncomfortable insights into one of the most important debates on Internet governance.
European broadcasting policy has attracted attention from many disciplines because it has dual nature: cultural and commercial. This book offers a detailed treatment of European broadcasting law, set against an overview of policy in this area. In this respect the authors identify tensions within the EU polity as regards the appropriate level, purpose and mechanism of broadcast regulation. Key influences are problems of competence, the impact of changing technology and the consequences of increasing commercialisation. Furthermore, the focus of the analysis is on the practical implications of the legal framework on viewers, and the authors distinguish both between citizen and consumer and between the passive and active viewer. The underlying question is the extent to which those most in need of protection by regulation, given the purpose of broadcasting, are adequately protected.
Media Freedom under the Human Rights Act provides the most comprehensive analysis to date of the impact of Article 10 ECHR, as received through the Human Rights Act 1998, on the substantive law governing freedom of expression in the media. Fully up to date, the book provides extensive coverage of crucial recent developments in this field; these include: the key cases of Ashworth and Punch in the area of contempt; the ground-breaking privacy decisions in Von Hannover v Germany and Campbell v MGN; full consideration of theoretical approaches to explicit speech and blasphemy, including a detailed critique of Strasbourg case-law in the area; detailed discussion of the new offence of incitement to religious hatred; the new scheme for content regulation of broadcasting under the Communications Act 2003 in the light of Prolife Alliance; a full survey of recent domestic and Strasbourg caselaw in the areas of copyright and political defamation, and analysis of the early impact of the Freedom of Information Act. The authors - both leading academics in the field - have drawn on significant comparative decisions to formulate a coherent and provocative critique of the relationship between media law and freedom of expression, and suggested principles which make a significant contribution to the legal discourse surrounding media freedom in the Human Rights Act era. The result is a book which provides a scholarly and theoretically informed analysis of this very topical subject, of interest to those studying at all levels and practising in this area of law.
Will cyberanarchy rule the net? And if we do find a way to regulate our cyberlife will national borders dissolve as the Internet becomes the first global state? In this provocative new work, Jack L. Goldsmith and Tim Wu dismiss the fashionable talk of both a 'borderless' net and of a single governing 'code'. Territorial governments can and will, they contend, exercise significant control over all aspects of Internet communications. Examining policy puzzles from e-commerce to privacy, speech and pornography, intellectual property, and cybercrime, Who Controls the Internet demonstrates that individual governments rather than private or global bodies will play that dominant role in regulation. Accessible and controversial, this work is bound to stir comment.
The regulation of pornography has always been a contentious issue, which has sparked wide-ranging debates surrounding the acceptability and place of pornography in society. The use of the internet to distribute and access pornography has magnified this debate and has presented a number of challenges for the law in terms of effective and proportionate regulation. Following unsuccessful attempts by states to transpose traditional laws to cyberspace, a new and radical regulatory framework eventually evolved for regulating internet pornography. In this process, the focus of the law has changed from merely controlling the publication and distribution of obscene material to a model that aims to deter private consumption of illegal content. In addition, various self- and co-regulatory initiatives have been introduced with the involvement of non-state actors, imposing a certain degree of de facto liability on intermediaries, all of which raise interesting issues. This book examines the relevant regulatory responses to internet pornography, with particular reference to the UK, but also drawing comparisons with other countries where relevant. It argues that the internet has fundamentally, and in many ways irreversibly, changed the regulation of pornography. Classifying internet pornography into three broad categories - child pornography, extreme pornography, and adult pornography - the book provides an in-depth analysis of the legal issues involved in regulating internet pornography, and argues that the notions of obscenity and indecency on their own will not provide an adequate basis for regulating online pornography. The book identifies the legitimising factors that will lend credibility and normative force to the law in order to successfully regulate pornography in cyberspace. It is the only comprehensive text that rigorously addresses the regulation of internet pornography as a whole, and offers valuable insights that will appeal to academics, students, policy makers, and those working in the areas of broader internet governance and online child protection.
Highly publicized legal cases, such as those involving libel verdicts, obscenity prosecutions, the First Amendment, and other areas of media law have focused attention on only one part of the media's impact on law. This study, the first to explore the broad influence of computers and television on the future of the legal process, explains the critical role of information and argues that the influence of the new modes of communication can be seen in changes occurring in many areas of the law. These areas include the goals and purposes of law, the doctrines and rules of law, the processes law uses to settle disputes and shape behavior, the legal profession, and the values and concepts that underlie our system of law.
Now in its sixth edition, this invaluable handbook provides a complete guide to the practical application of data protection law in the UK. It is fully updated and expanded to include coverage of significant developments in the practice of data protection, and takes account of new legislation since the last edition. The sixth edition includes coverage of the Data Protection Act 2018, Data Protection, Privacy and Electronic Communications (Amendments etc.) (EU Exit) Regulations 2019, and the European Union (Withdrawal Agreement) Act 2020, and contains relevant analysis of the effect of Brexit on UK data protection law. Data Protection: A Practical Guide to UK Law is essential reading for all those working with data protection issues, including in compliance departments in both the public and private sectors, as well as in-house and private practice lawyers, company secretaries, HR Officers, marketing executives and IT specialists.
Smart Legal Contracts: Computable Law in Theory and Practice is a landmark investigation into one of the most important trends at the interface of law and technology: the effort to harness emerging digital technologies to change the way that parties form and perform contracts. While developments in distributed ledger technology have brought the topic of 'smart contracts' into the mainstream of legal attention, this volume takes a broader approach to ask how computers can be used in the contracting process. This book assesses how contractual promises are expressed in software and how code-based artefacts can be incorporated within more conventional legal structures. With incisive contributions from members of the judiciary, legal scholars, practitioners, and computer scientists, this book sets out to frame the borders of an emerging area of law and start a more productive dialogue between the various disciplines involved in the evolution of contracts as software. It provides the first step towards a more disciplined approach to computational contracts that avoids the techno-legal ambiguities of 'smart contracts' and reveals an emerging taxonomy of approaches to encoding contracts in whole or in part. Conceived and written during a time when major legal systems began to engage with the advent of contracts in computable form, and aimed at a fundamental level of enquiry, this collection will provide essential insight into future trends and will provide a point of orientation for future scholarship and innovation.
An adaptive cyber risk management guide from MIT scientist and Johns Hopkins professor Gregory Falco and "Cyber Czar" Eric Rosenbach Cyberattacks continue to grow in number, intensity, and sophistication. While attackers persistently adapt, business leaders have suffered from employing the same cyber risk management strategies for decades. Organizations must learn how to move past temporary solutions and invest in long-term resiliency measures to thrive in the future cyber economy. Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership guidebook outlining a new strategy for improving organizational cybersecurity and mitigating cyber risk. Veteran cybersecurity experts Falco and Rosenbach introduce the Embedded Endurance strategy as a systems-level approach to cyber risk management which addresses interdependent components of organizational risk and prepares organizations for the inevitability of cyber threats over the long-term. Using real world examples from SolarWinds to the Colonial Pipeline attack, the authors extend beyond hardware and software to provide a thoughtful ten-step process for organizations to address the simultaneous operational, reputational, and litigation risks common to cyberattacks. They conclude with helpful "cryptograms" from the future, in which business leaders are confronted with the next generation of cyber risk challenges. Clear and informative, Confronting Cyber Risk provides CEOs and cyber newcomers alike with concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks in an evolving cyber risk landscape.
The Internet has become a staple of modern civilized life, now as vital a utility as electricity. But despite its growing influence, the Internet isn't as stable as it might seem; rather, it can be best thought of as a network of networks reliant on developing technical and social measures to function, including hardware, software, standards, and protocols. As millions of new internet users sign on each year, governing bodies need to balance evolving social ideas surrounding internet use against shifting political pressures on internet governance-or risk disconnection. Four Internets offers a revelatory new approach for conceptualizing the Internet and understanding the sometimes rival values that drive its governance and stability. Four Internets contends that the apparently monolithic "Internet" is in fact maintained by four distinct value systems-the Silicon Valley Open Internet, the Brussels Bourgeois Internet, the DC Commercial Internet, and the Beijing Paternal Internet-competing to determine the future directions of internet affordances for freedom, innovation, security, and human rights. Starting with an analysis of the original vision of an "Open Internet," the book outlines challenges facing this vision and the subsequent rise of other internets popularized through political and monetary machinations. It then unravels how tensions between these internets play out across politics, economics, and technology, and offers perspectives on potential new internets that might arise from emerging technologies like artificial intelligence and smart cities. The book closes with an evaluation of whether all these models can continue to co-exist-and what might happen if any fall away. Visionary and accessible, Four Internets lends readers the confidence to believe in a diverse yet resilient Internet through a deeper understanding of this everyday commodity.
Recent revelations, by Edward Snowden and others, of the vast network of government spying enabled by modern technology have raised major concerns both in the European Union and the United States on how to protect privacy in the face of increasing governmental surveillance. This book brings together some of the leading experts in the fields of constitutional law, criminal law and human rights from the US and the EU to examine the protection of privacy in the digital era, as well as the challenges that counter-terrorism cooperation between governments pose to human rights. It examines the state of privacy protections on both sides of the Atlantic, the best mechanisms for preserving privacy, and whether the EU and the US should develop joint transnational mechanisms to protect privacy on a reciprocal basis. As technology enables governments to know more and more about their citizens, and about the citizens of other nations, this volume offers critical perspectives on how best to respond to one of the most challenging developments of the twenty-first century.
To better understand the heterogeneity of the international online intermediary liability regime, The Oxford Handbook of Intermediary Liability Online is designed to provide a comprehensive, authoritative and 'state-of-the-art' discussion of by highlighting emerging trends. This book discusses fundamental legal issues in intermediary liability online, while also describing advancement in intermediary liability theory and identifying recent policy trends. Sections I and II provide a taxonomy of internet platforms, a general discussion of possible basis for liability and remedies, while putting into context intermediary liability regulation with fundamental rights and the ethical implications of the intermediaries' role. Section III presents a jurisdictional overview discussing intermediary liability safe harbour arrangements and highlighting issues with systemic fragmentation and miscellaneous inconsistent approaches. Mapping online intermediary liability worldwide entails the review of a wide-ranging topic, stretching into many different areas of law and domain-specific solutions. Section IV provides an overview of intermediate liability for copyright, trademark, and privacy infringement, together with Internet platforms' obligations and liabilities for defamation, hate and dangerous speech. Section V reviews intermediary liability enforcement strategies by focusing on emerging trends, including proactive monitoring obligations across the entire spectrum of intermediary liability subject matters, blocking orders against innocent third parties, and the emergence of administrative enforcement of intermediary liability online. In addition, Section VI discusses an additional core emerging trend in intermediary liability enforcement: voluntary measures and private ordering. Finally, international private law issues are addressed in Section VII with special emphasis on the international struggle over Internet jurisdiction and extra-territorial enforcement of intermediaries' obligations.
This collection investigates the sharpening conflict between the nation state and the internet through a multidisciplinary lens. It challenges the idea of an inherently global internet by examining its increasing territorial fragmentation and, conversely, the notion that for states online law and order is business as usual. Cyberborders based on national law are not just erected around China's online community. Cultural, political and economic forces, as reflected in national or regional norms, have also incentivised virtual borders in the West. The nation state is asserting itself. Yet, there are also signs of the receding role of the state in favour of corporations wielding influence through de-facto control over content and technology. This volume contributes to the online governance debate by joining ideas from law, politics and human geography to explore internet jurisdiction and its overlap with topics such as freedom of expression, free trade, democracy, identity and cartographic maps.
WHAT IF YOUR BOSS WAS AN ALGORITHM? The gig economy promises to revolutionise work as we know it, offering flexibility and independence instead of 9-to-5 drudgery. The potential benefits are enormous: consumers enjoy the convenience and affordability of on-demand work while micro-entrepreneurs turn to online platforms in search of their next gig, task, or ride. IS THIS THE FUTURE OF WORK? The gig economy promises to revolutionise work as we know it, offering flexibility and independence instead of 9-to-5 drudgery. The potential benefits are enormous: consumers enjoy the convenience and affordability of on-demand work while micro-entrepreneurs turn to online platforms in search of their next gig, task, or ride. HOW CAN WE PROTECT CONSUMERS & WORKERS WITHOUT STIFLING INNOVATION? As courts and governments around the world begin to grapple with the gig economy, Humans as a Service explores the challenges of on-demand work, and explains how we can ensure decent working conditions, protect consumers, and foster innovation. Employment law plays a central role in levelling the playing field: gigs, tasks, and rides are work - and should be regulated as such.
As seen on CBS 60 Minutes "No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider." Did you know that these twenty-six words are responsible for much of America's multibillion-dollar online industry? What we can and cannot write, say, and do online is based on just one law-a law that protects online services from lawsuits based on user content. Jeff Kosseff exposes the workings of Section 230 of the Communications Decency Act, which has lived mostly in the shadows since its enshrinement in 1996. Because many segments of American society now exist largely online, Kosseff argues that we need to understand and pay attention to what Section 230 really means and how it affects what we like, share, and comment upon every day. The Twenty-Six Words That Created the Internet tells the story of the institutions that flourished as a result of this powerful statute. It introduces us to those who created the law, those who advocated for it, and those involved in some of the most prominent cases decided under the law. Kosseff assesses the law that has facilitated freedom of online speech, trolling, and much more. His keen eye for the law, combined with his background as an award-winning journalist, demystifies a statute that affects all our lives -for good and for ill. While Section 230 may be imperfect and in need of refinement, Kosseff maintains that it is necessary to foster free speech and innovation. For filings from many of the cases discussed in the book and updates about Section 230, visit jeffkosseff.com
When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the "trusted systems" underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking. |
![]() ![]() You may like...
Living Languages: An Integrated Approach…
Catherine Watts, Clare Forder, …
Hardcover
R4,491
Discovery Miles 44 910
Privacy and Identity Management - 15th…
Michael Friedewald, Stefan Schiffner, …
Hardcover
R1,547
Discovery Miles 15 470
Dynamics of Change in the European Union
Daniel Naurin, Anne Rasmussen
Hardcover
R4,027
Discovery Miles 40 270
Win-Win Survival Handbook - All-Hazards…
Marshall Masters
Hardcover
|