![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
This book discusses issues relating to the application of AI and computational modelling in criminal proceedings from a European perspective. Part one provides a definition of the topics. Rather than focusing on policing or prevention of crime - largely tackled by recent literature - it explores ways in which AI can affect the investigation and adjudication of crime. There are two main areas of application: the first is evidence gathering, which is addressed in Part two. This section examines how traditional evidentiary law is affected by both new ways of investigation - based on automated processes (often using machine learning) - and new kinds of evidence, automatically generated by AI instruments. Drawing on the comprehensive case law of the European Court of Human Rights, it also presents reflections on the reliability and, ultimately, the admissibility of such evidence. Part three investigates the second application area: judicial decision-making, providing an unbiased review of the meaning, benefits, and possible long-term effects of 'predictive justice' in the criminal field. It highlights the prediction of both violent behaviour, or recidivism, and future court decisions, based on precedents. Touching on the foundations of common law and civil law traditions, the book offers insights into the usefulness of 'prediction' in criminal proceedings.
An inside view of the experimental practices of cognitive psychology-and their influence on the addictive nature of social media Experimental cognitive psychology research is a hidden force in our online lives. We engage with it, often unknowingly, whenever we download a health app, complete a Facebook quiz, or rate our latest purchase. How did experimental psychology come to play an outsized role in these developments? Experiments of the Mind considers this question through a look at cognitive psychology laboratories. Emily Martin traces how psychological research methods evolved, escaped the boundaries of the discipline, and infiltrated social media and our digital universe. Martin recounts her participation in psychology labs, and she conveys their activities through the voices of principal investigators, graduate students, and subjects. Despite claims of experimental psychology's focus on isolated individuals, Martin finds that the history of the field-from early German labs to Gestalt psychology-has led to research methods that are, in fact, highly social. She shows how these methods are deployed online: amplified by troves of data and powerful machine learning, an unprecedented model of human psychology is now widespread-one in which statistical measures are paired with algorithms to predict and influence users' behavior. Experiments of the Mind examines how psychology research has shaped us to be perfectly suited for our networked age.
In Hashtag Authentic, social media guru Sara Tasker provides tips, advice, and guidance on how to turn your personal Instagram account into a profitable creative outlet. Since setting up her Instagram account (@me_and_orla) while on maternity leave in 2013, Sara has become a celebrated influencer and iPhoneographer, and through her calm, atmospheric, and authentic style has garnered legions of followers. Here, Sara presents the lessons she has learned along the way. Sara's nurturing voice and enchanting photography provide guidance on: storytelling, with tips on finding your own visual style and personal niche; making pictures, including composing for Instagram, finding the best light, and getting the most out of your camera phone; archiving your life, with tips organized by themes like Craft & Making, Family & Pets, and Food & Ingredients; and sharing your world, detailing the keys to Instagram success and beyond. Hashtag Authentic is both an inspiring manual and an interactive tool for finding an online voice, growing a tribe, and becoming an influencer.
Pensar el estudio de la comunicacion como una "guerra" implica reconocer que este no es un campo de estudio delimitado por una sola disciplina o una estricta definicion del concepto "comunicacion". Exige, tambien, identificar diversas tradiciones de investigacion, asi como explorar los principales dilemas que han guiado varias disciplinas en distintas epocas historicas y latitudes del mundo. Esta coleccion de tres volumenes propone, entonces, analizar la comunicacion y los medios desde diversas trincheras. Estos diversos panoramas, enfoques, tradiciones, epocas, escuelas, autores y sus preocupaciones dialogan entre si. No hay consensos definitivos; pero tampoco perdedores o ganadores en el debate. La "guerra" consiste, entonces, en identificar lo que esta en juego, en reconocer la diversidad de opiniones e intereses y en considerar el vasto arsenal disponible para resolver los grandes dilemas de la comunicacion. Volumen II. Tradiciones de pensamiento y escuelas Este segundo volumen de La comunicacion y sus guerras teoricas. Introduccion a las teorias de la comunicacion y los medios analiza y contrasta distintas escuelas de pensamiento comunmente ancladas en fronteras nacionales: la influencia norteamericana, el pensamiento frances, la Escuela de Frankfurt, los estudios culturales ingleses, la propuesta de la Escuela Invisible, los planteamientos de la escuela canadiense o el enfoque critico desde America Latina. Estas diversas tradiciones han evolucionado de manera paralela, pero desde trincheras y paradigmas encontrados. Sin embargo, los analisis en este tomo de expertas y expertos en cada tradicion dejan ver que es posible rastrear origenes e intereses comunes. Y aunque las diferencias siguen siendo evidentes, en la mayoria de los casos residen en aspectos menos visibles como: el regimen politico bajo el cual estas escuelas se desarrollan, el interes, el financiamiento e incluso, el impulso que las y los propios academicos dan a algunos temas frente a otros.
Pensar el estudio de la comunicacion como una "guerra" implica reconocer que este no es un campo de estudio delimitado por una sola disciplina o una estricta definicion del concepto "comunicacion". Exige, tambien, identificar diversas tradiciones de investigacion, asi como explorar los principales dilemas que han guiado varias disciplinas en distintas epocas historicas y latitudes del mundo. Esta coleccion de tres volumenes propone, entonces, analizar la comunicacion y los medios desde diversas trincheras. Estos diversos panoramas, enfoques, tradiciones, epocas, escuelas, autores y sus preocupaciones dialogan entre si. No hay consensos definitivos; pero tampoco perdedores o ganadores en el debate. La "guerra" consiste, entonces, en identificar lo que esta en juego, en reconocer la diversidad de opiniones e intereses y en considerar el vasto arsenal disponible para resolver los grandes dilemas de la comunicacion. Volumen II. Tradiciones de pensamiento y escuelas Este segundo volumen de La comunicacion y sus guerras teoricas. Introduccion a las teorias de la comunicacion y los medios analiza y contrasta distintas escuelas de pensamiento comunmente ancladas en fronteras nacionales: la influencia norteamericana, el pensamiento frances, la Escuela de Frankfurt, los estudios culturales ingleses, la propuesta de la Escuela Invisible, los planteamientos de la escuela canadiense o el enfoque critico desde America Latina. Estas diversas tradiciones han evolucionado de manera paralela, pero desde trincheras y paradigmas encontrados. Sin embargo, los analisis en este tomo de expertas y expertos en cada tradicion dejan ver que es posible rastrear origenes e intereses comunes. Y aunque las diferencias siguen siendo evidentes, en la mayoria de los casos residen en aspectos menos visibles como: el regimen politico bajo el cual estas escuelas se desarrollan, el interes, el financiamiento e incluso, el impulso que las y los propios academicos dan a algunos temas frente a otros.
This volume focuses on predicting users' attendance at a future event at specific time and location based on their common interests. Event attendance prediction has attracted considerable attention because of its wide range of potential applications. By predicting event attendance, events that better fit users' interests can be recommended, and personalized location-based or topic-based services related to the events can be provided to users. Moreover, it can help event organizers estimating the event scale, identifying conflicts, and help manage resources. This book first surveys existing techniques on event attendance prediction and other related topics in event-based social networks. It then introduces a context-aware data mining approach to predict the event attendance by learning how users are likely to attend future events. Specifically, three sets of context-aware attributes are identified by analyzing users' past activities, including semantic, temporal, and spatial attributes. This book illustrates how these attributes can be applied for event attendance prediction by incorporating them into supervised learning models, and demonstrates their effectiveness through a real-world dataset collected from event-based social networks.
Approximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects of the discipline. It provides guidance on how to seize data, examine it, and prepare it as evidence for court. This includes the use of chain of custody forms for seized evidence and Faraday Bags for digital devices to prevent further connectivity and tampering of evidence. Emphasizing the policies required in the work environment, the author provides readers with a clear understanding of the differences between a corporate investigation and a criminal investigation. The book also: Offers best practices for establishing an incident response policy and seizing data from company or privately owned digital devices Provides guidance in establishing dedicated examinations free of viruses, spyware, and connections to other devices that could taint evidence Supplies guidance on determining protocols for complicated crime scenes with external media and devices that may have connected with the handheld device Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks. It includes examples of commercially available digital forensic tools and ends with a discussion of the education and certifications required for various careers in mobile device forensics.
Explores new perspectives on social media entertainment There is a new class of cultural producers-YouTube vloggers, Twitch gameplayers, Instagram influencers, TikTokers, Chinese wanghong, and others-who are part of a rapidly emerging and highly disruptive industry of monetized "user-generated" content. As this new wave of native social media entrepreneurs emerge, so do new formations of culture and the ways they are studied. In this volume, contributors draw on scholarship in media and communication studies, science and technology studies, and social media, Internet, and platform studies, in order to define this new field of study and the emergence of creator culture. Creator Culture introduces readers to new paradigms of social media entertainment from critical perspectives, demonstrating both relations to and differentiations from the well-established media forms and institutions traditionally within the scope of media studies. This volume does not seek to impose a uniform perspective; rather, the goal is to stimulate in-depth, globally-focused engagement with this burgeoning industry and establish a dynamic research agenda for scholars, teachers, and students, as well as creators and professionals across the media, communication, creative, and social media industries. Contributors include: Jean Burgess, Zoe Glatt, Sarah Banet-Weiser, Brent Luvaas, Carlos A. Scolari, Damian Fraticelli, Jose M. Tomasena, Junyi Lv, Hector Postigo, Brooke Erin Duffy, Megan Sawey, Jarrod Walzcer, Sangeet Kumar, Sriram Mohan, Aswin Punathambekar, Mohamed El Marzouki, Elaine Jing Zhao, Arturo Arriagada, Jeremy Shtern, Stephanie Hill
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linkoeping University, Sweden, and held online during November 23-24, 2020.The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
Sponsored by the Communication, Information Technologies, and Media Sociology section of the American Sociological Association (CITAMS), this volume focuses on media and social movements. Contributing authors draw on cases as diverse as the Harry Potter Alliance to youth oriented, non-profit educational organizations, in order to assess systematically how media environments, systems, and usage affect collective action in the 21st century. The volume demonstrates that the study of media and social movements has developed into a vibrant sub-field stretched across Communication Studies, Political Science, and Sociology, and illustrates the need for serious interdisciplinary research. Chapters in the volume reinforce the need to examine many kinds of media (such as fiction) for social movements, particularly in terms of recruitment and framing. They show the critical importance of connecting classic and contemporary social movement research when trying to understand topics such as recruitment, identity, and discourse, even when these are playing out in the digital world. Chapters explore the difficulties that organizations face in organizing whether or not they are primarily offline or online; the ways that digital media usage affects various organizational functions and effectiveness; and the importance of examining the role of youth in social movements across all of these topics.
This book constitutes revised selected papers of the 9th International Conference on Analysis of Images, Social Networks and Texts, AIST 2020, held in Moscow, Russia, in october 2020. Due to the COVID-19 pandemic the conference was held online. The 14 full papers, 9 short papers and 4 poster papers were carefully reviewed and selected from 108 qualified submissions. The papers are organized in topical sections on natural language processing; computer vision; social network analysis; data analysis and machine learning; theoretical machine learning and optimization; process mining; posters.
Pensar el estudio de la comunicacion como una "guerra" implica reconocer que este no es un campo de estudio delimitado por una sola disciplina o una estricta definicion del concepto "comunicacion". Exige, tambien, identificar diversas tradiciones de investigacion, asi como explorar los principales dilemas que han guiado varias disciplinas en distintas epocas historicas y latitudes del mundo. Esta coleccion de tres volumenes propone, entonces, analizar la comunicacion y los medios desde muy diversas trincheras. Estos diversos panoramas, enfoques, tradiciones, epocas, escuelas, autores y sus preocupaciones dialogan entre si. No hay consensos definitivos; pero tampoco perdedores o ganadores en el debate. La "guerra" consiste pues, en identificar lo que esta en juego; reconocer la diversidad de opiniones e intereses, y; considerar el vasto arsenal disponible para resolver los grandes dilemas de la comunicacion. Volumen I. Enfoques disciplinarios Este primer volumen de La comunicacion y sus guerras teoricas. Introduccion a las teorias de la comunicacion y los medios revisa los principales enfoques disciplinarios: sus supuestos, alcances y limites, asi como las propuestas generales de los diversos cristales desde los que se mira este complejo campo de estudio. "Y es que en el mundo traidor", dicta el verso, "no hay ni verdad ni mentira: todo es segun el color del cristal con que se mira". Este volumen presenta algunas (im)precisiones necesarias, al tiempo que propone un mapa tentativo para navegar en esta muy variada area de estudio. El recorrido comienza por el enfoque tradicional de la sociologia invitandonos a cuestionar el determinismo tecnologico que constantemente amenaza el estudio de la comunicacion y los medios. Otros "cristales" como el enfoque normativo, el cultural, el afectivo, el biologico, el economico, el digital o el politico complementan esta revision critica a traves de las plumas de los grandes expertos de cada mirada.
Pensar el estudio de la comunicacion como una "guerra" implica reconocer que este no es un campo de estudio delimitado por una sola disciplina o una estricta definicion del concepto "comunicacion". Exige, tambien, identificar diversas tradiciones de investigacion, asi como explorar los principales dilemas que han guiado varias disciplinas en distintas epocas historicas y latitudes del mundo. Esta coleccion de tres volumenes propone, entonces, analizar la comunicacion y los medios desde muy diversas trincheras. Estos diversos panoramas, enfoques, tradiciones, epocas, escuelas, autores y sus preocupaciones dialogan entre si. No hay consensos definitivos; pero tampoco perdedores o ganadores en el debate. La "guerra" consiste pues, en identificar lo que esta en juego; reconocer la diversidad de opiniones e intereses, y; considerar el vasto arsenal disponible para resolver los grandes dilemas de la comunicacion. Volumen I. Enfoques disciplinarios Este primer volumen de La comunicacion y sus guerras teoricas. Introduccion a las teorias de la comunicacion y los medios revisa los principales enfoques disciplinarios: sus supuestos, alcances y limites, asi como las propuestas generales de los diversos cristales desde los que se mira este complejo campo de estudio. "Y es que en el mundo traidor", dicta el verso, "no hay ni verdad ni mentira: todo es segun el color del cristal con que se mira". Este volumen presenta algunas (im)precisiones necesarias, al tiempo que propone un mapa tentativo para navegar en esta muy variada area de estudio. El recorrido comienza por el enfoque tradicional de la sociologia invitandonos a cuestionar el determinismo tecnologico que constantemente amenaza el estudio de la comunicacion y los medios. Otros "cristales" como el enfoque normativo, el cultural, el afectivo, el biologico, el economico, el digital o el politico complementan esta revision critica a traves de las plumas de los grandes expertos de cada mirada.
This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues; Infrastructure Protection; Vehicle Infrastructure Security; Telecommunications Infrastructure Security; Cyber-Physical Systems Security; and Industrial Control Systems Security. This book is the thirteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Thirteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2019. Critical Infrastructure Protection XIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
This book examines the right to be forgotten and finds that this right enjoys recognition mostly in jurisdictions where privacy interests impose limits on freedom of expression. According to its traditional understanding, this right gives individuals the possibility to preclude the media from revealing personal facts that are no longer newsworthy, at least where no other interest prevails. Cases sanctioning this understanding still abound in a number of countries. In today's world, however, the right to be forgotten has evolved, and it appears in a more multi-faceted way. It can involve for instance also the right to access, control and even erase personal data. Of course, these prerogatives depend on various factors and competing interests, of both private and public nature, which again require careful balancing. Due to ongoing technological evolution, it is likely that the right to be forgotten in some of its new manifestations will become increasingly relevant in our societies.
This book assesses the normative and practical challenges for artificial intelligence (AI) regulation, offers comprehensive information on the laws that currently shape or restrict the design or use of AI, and develops policy recommendations for those areas in which regulation is most urgently needed. By gathering contributions from scholars who are experts in their respective fields of legal research, it demonstrates that AI regulation is not a specialized sub-discipline, but affects the entire legal system and thus concerns all lawyers. Machine learning-based technology, which lies at the heart of what is commonly referred to as AI, is increasingly being employed to make policy and business decisions with broad social impacts, and therefore runs the risk of causing wide-scale damage. At the same time, AI technology is becoming more and more complex and difficult to understand, making it harder to determine whether or not it is being used in accordance with the law. In light of this situation, even tech enthusiasts are calling for stricter regulation of AI. Legislators, too, are stepping in and have begun to pass AI laws, including the prohibition of automated decision-making systems in Article 22 of the General Data Protection Regulation, the New York City AI transparency bill, and the 2017 amendments to the German Cartel Act and German Administrative Procedure Act. While the belief that something needs to be done is widely shared, there is far less clarity about what exactly can or should be done, or what effective regulation might look like. The book is divided into two major parts, the first of which focuses on features common to most AI systems, and explores how they relate to the legal framework for data-driven technologies, which already exists in the form of (national and supra-national) constitutional law, EU data protection and competition law, and anti-discrimination law. In the second part, the book examines in detail a number of relevant sectors in which AI is increasingly shaping decision-making processes, ranging from the notorious social media and the legal, financial and healthcare industries, to fields like law enforcement and tax law, in which we can observe how regulation by AI is becoming a reality.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic.
This book critically assesses how the rise of the collaborative economy in the European Union Digital Single Market is disrupting consolidated legal acquisitions, such as classical internal market categories, as well as the applicability of consumer protection, data protection, and labour and competition law. It argues that the collaborative economy will, sooner or later, require some sort of regulatory intervention from the European Union. This regulatory intervention, far from stifling innovation, will benefit online platforms, service providers and users by providing them with a clearer and more predictable environment in which to conduct their business. Although primarily intended for academics, this book also appeals to a wider readership, including, but not limited to, national and international regulators, private firms and lobbies as well as online platforms, consumer associations and trade unions.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.
What's your story? The most successful brands aren't created, they are unearthed. Successful branding is based on authenticity. So how do you reveal your own brand? First, by searching yourself for answers to questions like these: What do you do better than anyone? What are you most proud of? What makes you lose track of time? In Digital You: Real Personal Branding in the Virtual Age, branding authority William Arruda describes the 21st century world of personal branding and guides you to define, express, and expand your personal brand for the virtual world. Branding is not about being famous, Arruda explains; it's about being selectively famous. It's about more than social media excess. When you understand the true value of personal branding, you can use it as a serious career development strategy. Digital You offers a deep dive to understanding and defining your unique promise of value-making a great first impression, mastering multimedia, and, ultimately, expanding your network and promoting thought leadership. You'll learn how to develop, design, and sustain a personal brand throughout the fluid movements of any career. Understand how to be clear about your digital brand and your unique promise of value so you can increase your success and happiness at work and in life. It's time to stop worrying about career extinction and start crafting a brand of distinction.
This book identifies and explains the different national approaches to data protection - the legal regulation of the collection, storage, transmission and use of information concerning identified or identifiable individuals - and determines the extent to which they could be harmonised in the foreseeable future. In recent years, data protection has become a major concern in many countries, as well as at supranational and international levels. In fact, the emergence of computing technologies that allow lower-cost processing of increasing amounts of information, associated with the advent and exponential use of the Internet and other communication networks and the widespread liberalization of the trans-border flow of information have enabled the large-scale collection and processing of personal data, not only for scientific or commercial uses, but also for political uses. A growing number of governmental and private organizations now possess and use data processing in order to determine, predict and influence individual behavior in all fields of human activity. This inevitably entails new risks, from the perspective of individual privacy, but also other fundamental rights, such as the right not to be discriminated against, fair competition between commercial enterprises and the proper functioning of democratic institutions. These phenomena have not been ignored from a legal point of view: at the national, supranational and international levels, an increasing number of regulatory instruments - including the European Union's General Data Protection Regulation applicable as of 25 May 2018 - have been adopted with the purpose of preventing personal data misuse. Nevertheless, distinct national approaches still prevail in this domain, notably those that separate the comprehensive and detailed protective rules adopted in Europe since the 1995 Directive on the processing of personal data from the more fragmented and liberal attitude of American courts and legislators in this respect. In a globalized world, in which personal data can instantly circulate and be used simultaneously in communications networks that are ubiquitous by nature, these different national and regional approaches are a major source of legal conflict.
The book provides a detailed overview and analysis of important EU Internet regulatory challenges currently found in various key fields of law directly linked to the Internet such as information technology, consumer protection, personal data, e-commerce and copyright law. In addition, it aims to shed light on the content and importance of various pending legislative proposals in these fields, and of the Court of Justice of the European Union's recent case law in connection with solving the different problems encountered. The book focuses on challenging legal questions that have not been sufficiently analyzed, while also presenting original thinking in connection with the regulation of emerging legal questions. As such, it offers an excellent reference tool for researchers, policymakers, judges, practitioners and law students with a special interest in EU Internet law and regulation.
This book addresses the question of how competition authorities assess mergers in the Information Communication Technology (ICT) sector so as to promote competition in innovation. A closer look at the question reveals that it is far more complex and difficult to answer for the ICT, telecommunications and multi-sided platform (MSP) economy than for more traditional sectors of the economy. This has led many scholars to re-think and question whether the current merger control framework is suitable for the ICT sector, which is often also referred to as the new economy. The book pursues an interdisciplinary approach combining insights from law, economics and corporate strategy. Further, it has a comparative dimension, as it discusses the practices of the US, the EU and, wherever relevant, of other competition authorities from around the globe. Considering that the research was conducted in the EU, the practices of the European Commission remain a key aspect of the content.Considering its normative dimension, the book concentrates on the substantive aspects of merger control. To facilitate a better understanding of the most important points, the book also offers a brief overview of the procedural aspects of merger control in the EU, the US and the UK, and discusses recent amendments to Austrian and German law regarding the notification threshold. Given its scope, the book offers an invaluable guide for competition law scholars, practitioners in the field, and competition authorities worldwide.
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic. |
You may like...
Winning on Purpose - The Unbeatable…
Fred Reichheld, Darci Darnell, …
Hardcover
R588
Discovery Miles 5 880
Managing Consumer Services - Factory or…
Enzo Baglieri, Uday Karmarkar
Hardcover
R2,680
Discovery Miles 26 800
Applying Metalytics to Measure Customer…
Devesh Bathla, Amandeep Singh
Hardcover
R6,816
Discovery Miles 68 160
|