Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
This leading work provides a unique perspective on EU competition
law, authored by current and former members of DG Competition, and
giving insider knowledge into policies and their application.
The statutory framework for the communications sector largely was enacted prior to the commercial development and deployment of digital technology, Internet Protocol (IP), broadband networks, and online voice, data, and video services. These new technologies have driven changes in market structure throughout the communications sector. This book focuses on updating the statutory framework for communications for the digital age, and online video distributors and the current statutory and regulatory framework.
The statutory framework for the communications sector largely was enacted prior to the commercial development and deployment of digital technology, Internet Protocol (IP), broadband networks, and online voice, data, and video services. These new technologies have driven changes in market structure throughout the communications sector. In a technologically dynamic sector, the statutory framework cannot be modified every time there is a significant technological change. The challenge therefore is to create statutory language that is flexible enough to continue to foster articulated public policy objectives in the face of technological change, without artificially favouring either legacy technology or new technology. This book focuses on updating the statutory framework for communications for the digital age. The authors also provide statements and testimonies from hearings on lawful access to stored content, and geolocation privacy surveillance.
This book examines one of the greatest social and legal concerns of the modern age: social networking and the internet. The growing law and issues of, and created by, social networking and related websites involve real and diverse concerns. The concerns face the website operators, users, parents, schools, universities, employers, organisations, outsource organisations, the police, lawyers, courts, rights organisations and policymakers.Social networking is wonderful, yet staggering - in a short space of time, user populations greater than the populations of nation states have joined social networks. One social networking website reports to have amassed over 1 billion regular users. Yet, the legal issues (and others) involved with social networking and related websites are getting as many media headlines as the technologies themselves. Some of these are similar to established legal issues, however, with increasing frequency, the issues are entirely new. In addition, the scale of the issues are at a level unprecedented in collective memory. If that was not enough, the pace of the legal issues which must be considered and, more importantly, the pace and urgency with which they must be dealt with, add significant temporal pressures. This timely and appropriate book outlines the new law and issues relating to social networking. It offers a strong international comparative element and examines various legal jurisdictions. The growing law and issues of, and created by, social networking and related websites involve real and diverse concerns for policy. To victims, lawyers, parents, society, and policy makers, social networking in its various forms can be considered one of the most pressing legal issue today, with more issues and concerns than occur in any other field of contemporary law. Table of Contents include: Internet and Technology * Privacy and Data Protection * Social Networking Policies * Advertising and Marketing * Beacon Settlement * Europe against Facebook * Facebook Audit * Laws 'Re-Phormed'? * Data Breaches * Tagging * Evidential Issues * Cloud Computing * Employees * Educational Institutions * Tracking the Trackers * Personal Relations * Social Networking after Death * Profiles in Purgatory * A Critical Approach to the Right to Be Forgotten * Children and Social Networking * Social Networking and Internet Access * Peer to Peer and Privacy * Social Networking and Sports * Social Networking and the Courts * Privacy by Design * Data Protection Audits * The Future.
Internet gaming sparks controversy from corporate board rooms to legislative hallways. Unlike traditional casinos, the Internet permits people to engage in gaming activities from virtually anywhere over computers and mobile devices. Governments and policy makers looking at this activity struggle with such questions as whether regulation can assure that Internet gaming can be restricted to adults, the games offered are fair and honest, and players will be paid if they win. This book is a timely collection of eleven chapters discussing key considerations and model approaches to internet gaming regulation and outlining the important questions and emerging answers to regulating gaming activity outside of land-based casinos. Some of the regulatory insights are taken from lessons learned in the land-based casino industry and others from the relatively newer experiences of international internet gaming providers. Contributors are among the world's leading experts on Internet gaming. They focus on structural concerns including record-keeping, managing different taxing regimes, maintaining effective controls, protecting customer funds, and preventing money laundering, as well as on policy concerns ensuring responsible play, the detection of fraud, reliable age verification, and the enforcement of gaming laws and norms across jurisdictions. Internet gaming is an emerging field, especially in the U.S., and the contributors to this book provide regulatory examples and lessons that will be helpful to lawyers, policy makers, gaming operators and others interested in this burgeoning industry. Chapters include: 1 Licensing by Anthony Cabot 2 Accounting, Audits, and Recordkeeping by Peter J. Kulick 3 Taxation of Regulated Internet Gambling by Sanford I. Millar 4 Technical Compliance by Richard Williamson 5 The Protection Of Customer Funds by Nick Nocton 6 Financial Transactions and Money Laundering by Stuart Hoegner 7 Internet Gambling Advertising Best Practices by Lawrence G. Walters 8 Responsible Gaming by Frank Catania, Sr., Gary Ehrlich, and Antonia Cowan 9 Ensuring Internet Gaming that is Free from Fraud and Cheating by Alan Littler 10 Age Verification by J. Blair Richardson 11 Proposal for an International Convention on Online Gambling by Marketa Trimble The book also includes an introductory editors' note, an index, and a table of cases.
A data security breach occurs when there is a loss or theft of, or other unauthorized access to, sensitive personally identifiable information that could result in the potential compromise of the confidentiality or integrity of data. This book provides an overview of state security breach notification laws applicable to entities that collect, maintain, own, possess, or license personal information. This book describes information security and security breach notification requirements in the Office of Management and Budget's "Breach Notification Policy," the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and the Gramm-Leach-Bliley Act (GLBA).
This book examines legal and cybersecurity challenges resulting from malicious activities on global cyberspace and proposes feasible regulatory, and policy based solutions to address these challenges. Global cyberspace has become an enormous challenge from the security perspective partly due to complications in enforcing security and regulatory efforts of national jurisdictions. This book presents more practical solutions to counteract these and other security threats posed by private and state-sponsored actors. Illicit events on cyberspace become increasingly complex as cyber technology advances thereby undermining the ability of existing regulatory instruments aimed at cybersecurity and deterring cybercrime. As existing laws cannot cope with newly emerging cyber security incidents, these incidents pose security threats for digital assets including those associated with Foreign Direct Investment (FDI). Increasingly interdependent global market place calls for more collaborative efforts to make cyberspace safer and more suitable for business transactions. This means there is the need to work towards not only regulatory solutions at national levels but more internationally enforceable legal norms must be worked out, which is part of the discussions in this book.
Technological developments related to the Internet benefit consumers who want convenient ways to view and hear information and entertainment content on a variety of electronic devices. The global nature of the Internet offers expanded commercial opportunities for intellectual property (IP) rights holders but also increases the potential for copyright and trademark infringement. Piracy of the content created by movie, music, and software companies and sales of counterfeit pharmaceutical drugs and consumer products negatively impact the American economy and can pose risks to the health and safety of U.S. citizens. This book discusses legislative approaches to online piracy and copyright infringement.
Cryptoassets represent one of the most high profile financial products in the world, and fastest growing financial products in history. From Bitcoin, Etherium and Ripple's XRP-so called "utility tokens" used to access financial services-to initial coin offerings that in 2017 rivalled venture capital in money raised for startups, with an estimated $5.6 billion (USD) raised worldwide across 435 ICOs. All the while, technologists have hailed the underlying blockchain technology for these assets as potentially game changing applications for financial payments and record-keeping. At the same time, cryptoassets have produced considerable controversy. Many have turned out to be lacklustre investments for investors. Others, especially ICOs, have also attracted noticeable fraud, failing firms, and alarming lapses in information-sharing with investors. Consequently, many commentators around the world have pressed that ICO tokens be considered securities, and that concomitant registration and disclosure requirements attach to their sales to the public. This volume assembles an impressive group of scholars, businesspersons and regulators to collectively write on cryptoassets. This volume represents perspectives from across the regulatory ecosystem, and includes technologists, venture capitalists, scholars, and practitioners in securities law and central banking.
Social media is one of the hottest topics in business today. The power of reaching hundreds of thousands of people is enticing. Correct use of social media for marketing a law practice or legal nurse consulting business is an art as well as a science. You may use the material in this book to deepen your understanding of social media, and to define a realistic plan for your own efforts.
MS. DANIE VICTOR, ESQUIRE HAS BEEN PRACTICING LAW AND LECTURING WORLDWIDE ON A VARIETY OF TOPICS SINCE 1991. ALL REQUESTS MUST BE SUBMITTED VIA FACSIMILE ONLY: 772-283-2331.
Recent developments in Information and Communication Technologies (ICT) have brought about changes that have revolutionalised traditional ways of conducting business. While these developments in cyberspace bear legal implications, legal regimes in some African countries such as Tanzania have not kept pace with the changes in order to properly regulate related activities happening under cyberspace. This volume attempts to bridge the gap between the Law and ICT developments in East Africa. It attempts to respond to questions such as: What is Cyber Law? How are Parties Identified under a Relationship in a Cyberspace Environment? How are Banking and other Cyber Payments Done? What about Combating Cyber Crime and Managing E-Commerce? What is the Impact of ICT on Intellectual Property Rights? And, how are Internet Domain Names Regulated? The volume is a useful handbook for those who want to understand the changing legal guidelines in relation to developments in ICT.
The US Stock Market collapsed on Thursday, 6 May 2010 when the Dow Jones Index spiked down over 1000 points in a matter of a few minutes. Such a world market sell caused by a true Cyber attack could destroy the wealth of billions of people around the globe. This book will examine what Cyber Attacks could do to the civilized world, which grows more dependent on the Internet functioning properly to perform all of the complex tasks that need to be done every day.
The Software Licensing Handbook leads you through the twists and turns of the language found in almost all software, maintenance and professional services contracts. Plain English explanations of standard contract wording enables anyone to understand what you are reading, regardless of whether you are buying OR selling software. Additionally, sections on negotiation and contract management enable you to fully understand, appreciate and if necessary, implement a complete contracting process.
How can attorneys reach new clients on the Internet? Veteran attorney and Internet entrepreneur Jeff Lantz provides the definitive source for law firm Internet marketing, brand and value proposition creation, effective website development, search engine optimization (SEO), search engine/pay-per-click marketing on Google, Bing, and Yahoo , blogging, and social/business networking on Facebook and Twitter. The book discusses domain name acquisition, hosting, website platform and Content Management Systems, Web 2.0 design, SEO for high rankings on Google, and creating a powerful Client-Centered Website that resonates with clients and serves as a call to action. What Internet marketing is the most effective? Learn how to measure cost-per-client and to use website statistics for better marketing allocation. Step-by-step instructions are provided for domain registration, designing PPC ad campaigns on Google, Bing, and Yahoo , and creating business pages on Facebook and Twitter.
Is the Internet erasing national borders? Will the future of the Net be set by Internet engineers, rogue programmers, the United Nations, or powerful countries? Who's really in control of what's happening on the Net? In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world. It's a book about the fate of one idea - that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Google's struggles with the French government and Yahoo's capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBay's struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them. While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance. Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace and globalization communities.
Transmission of copyrighted work over the Internet has resulted in the introduction of a new exclusive right: the right of communication to the public, which was established by the WIPO Copyright Treaties. However, in implementing the Treaties, different jurisdictions have their own understandings and legislative solutions. This book examines these laws and the nature of the new right of communication to the public. In addition, copyright exceptions are an important way to balance the relationship of interest between copyright owners and the public by way of free uses, statutory licences and compulsory licences. In the environment of the Internet, this way is still effective on adjusting the relationship. This book analyses the relationship between transmission over the Internet and the exclusive rights, and examines all exceptions, such as fair use, sui generis rights, library and archive exceptions and educational use exceptions. |
You may like...
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, …
Hardcover
R6,101
Discovery Miles 61 010
Cyberlaw @ SA - The Law of the Internet…
S. Papadopoulos, S. Snail ka Mtuze
Paperback
Blockchain and Public Law - Global…
Oreste Pollicino, Giovanni De Gregorio
Hardcover
R2,880
Discovery Miles 28 800
|