|
Books > Law > Other areas of law > Military law & courts martial
This book examines the interconnections between artificial
intelligence, data governance and private law rules with a
comparative focus on selected jurisdictions in the Asia-Pacific
region. The chapters discuss the myriad challenges of translating
and adapting theory, doctrines and concepts to practice in the
Asia-Pacific region given their differing circumstances, challenges
and national interests. The contributors are legal experts from the
UK, Israel, Korea, and Singapore with extensive academic and
practical experience. The essays in this collection cover a wide
range of topics, including data protection and governance, data
trusts, information fiduciaries, medical AI, the regulation of
autonomous vehicles, the use of blockchain technology in land
administration, the regulation of digital assets and contract
formation issues arising from AI applications. The book will be of
interest to members of the judiciary, policy makers and academics
who specialise in AI, data governance and/or private law or who
work at the intersection of these three areas, as well as legal
technologists and practising lawyers in the Asia-Pacific, the UK
and the US.
This book is the first detailed and comprehensive research of the
history of the Cape Town Convention and its protocols. It
critically engages with the challenges faced by the developers of
this treaty, analyses thousands of pages of archived materials and
derives important lessons for the development of transnational
commercial law globally. The book is an invaluable addition to the
existing literature on the Cape Town Convention. It also informs
the debate about harmonisation of secured transactions regimes
generally, and as such will be of interest to academics, legal
practitioners and the judiciary involved in secured transactions
law around the world. Practising lawyers will better understand the
rationale behind the key provisions of the Cape Town Convention,
while the treaty-making lessons will assist governmental officials,
representatives of international organisations and legal advisors
engaged in harmonisation of commercial law. The text covers all
four protocols to the Cape Town Convention, including the MAC
Protocol adopted on 22 November 2019 in Pretoria.
What is the future of constitutionalism, state and law in the new
technological age? This edited collection explores the different
aspects of the impact of information and technology revolution on
state, constitutionalism and public law. Leading European scholars
in the fields of constitutional, administrative, financial and EU
law provide answers to fascinating conceptual questions including:
- What are the challenges of information and technological
revolution to sovereignty? - How will information and technology
revolution impact democracy and the public sphere? - What are the
disruptive effects of social media platforms on democratic
will-formation processes and how can we regulate the democratic
process in the digital age? - What are the main challenges to
courts and administrations in the algorithmic society? - What is
the impact of artificial intelligence on administrative law and
social and health services? - What is the impact of information and
technology revolution on data protection, privacy and human rights?
This book considers, and offers solutions to, the problems faced by
local communities and the environment with respect to global
mining. The author explores the idea of grievance mechanisms in the
home states of the major mining conglomerates. These grievance
mechanisms should be functional, pragmatic and effective at
resolving disputes between mining enterprises and impacted
communities. The key to this provocative solution is twofold: the
proposal harnesses the power of industry-sponsored dispute
mechanisms to reduce the costs and other burdens on home state
governments and judicial systems. Critically, civil society actors
will be given a role as both advocates and mediators in order to
achieve a fair result for those impacted abroad by extractive
enterprises. Compelling, engaging and timely, this book presents an
innovative approach for regulating the foreign conduct of the
extractive sector.
'Saidov has produced a detailed and highly readable text that
considers in turn the methods of limiting damages, the
determination of loss and the calculation of damages. It will
doubtless become a first point of reference for academics and
practitioners alike.' Martin J Doris, Edinburgh Law Review The
second edition of this internationally acclaimed book explores
damages for breach of an international sales contract, one of the
most important and frequently invoked remedies. The focus is on the
international contract law instruments such as the Convention on
Contracts for the International Sale of Goods (CISG), the UNIDROIT
Principles of International Commercial Contracts and the Principles
of European Contract Law. The book draws on the experience of some
major legal systems and engages with legal scholarship on the
international instruments and on contract damages, providing the
most comprehensive, in-depth and thorough examination of damages
under the instruments to date. The second edition is updated,
reflecting the latest developments in legal thinking on contract
damages. It incorporates around 60 new cases and now covers more
than 370 cases decided by courts and arbitration tribunals from
around the world. The new edition is substantially revised,
including new commentary on damages for a documentary breach. Truly
international in spirit, this book is analytically rigorous and
practically oriented, offering distinctive analyses of, and
solutions to, some of the most challenging problems surrounding
contract damages.
Investments in technologies such as the cloud, the internet of
things (IoT), and robotic process automation are part of a strategy
that helps organizations respond to changing customer demands and
operational challenges. Emerging technologies are becoming one of
the most remarkable elements to be considered in businesses, and
e-businesses are no exception. With the expansion of e-businesses
worldwide, the great population of e-business leaders tends to
increase their knowledge to make future investments in key aspects
and implications of their businesses. Thus, e-business leaders need
to realize and seize existing opportunities for the advancement of
their businesses. Driving Transformative Change in E-Business
Through Applied Intelligence and Emerging Technologies contributes
a comprehensive source to the existing knowledge and research in
the field of e-business and emerging technologies and provides an
understanding to readers about the current concepts, trends,
technologies, and platforms in e-business. Covering topics such as
competitive intelligence, enterprise resource planning systems, and
online crowdfunding, this premier reference source is a
comprehensive resource for business leaders and executives, IT
managers, computer scientists, software engineers, economists,
entrepreneurs, students, researchers, and academicians.
This detailed, practitioner text, explains national security law in
all its aspects. It collates and explains the core elements of the
law, both substantive and procedural, and the practical issues
which may arise in national security litigation. The book draws on
the professional experience of a team of expert contributors. The
first part explores the meaning of "national security", examines
the respective roles in this area of Parliament, the executive and
the courts, and explains the law relating to the security and
intelligence agencies, their powers and oversight. The core of the
book addresses the various executive measures used to disrupt
terrorism, espionage and other hostile state activity, usually on
the basis of secret intelligence, and the civil proceedings that
may result from executive action taken for the national security
purposes. The third part addresses national security and the
criminal law. The remaining chapters address national security law
in such diverse contexts as inquests, inquiries, employment,
vetting, family, freedom of information, and data protection
proceedings. National security law is now of relevance to a wide
range of practising lawyers, judges, legislators, policymakers,
oversight bodies, and academic experts working in a variety of
legal fields well beyond public law. The highly-specialised nature
of the topic make this book a vital text not only for those seeking
an overview of the law, but also for experienced practitioners
instructed to act in proceedings in which national security issues
may arise. The intense media and public scrutiny which accompanies
many national security cases will also make this book of interest
to a wider audience seeking to understand the legal context of such
cases. The enhanced digital product (included) provides both
offline and online access wherever you are on OUP LawReader.
Synchronize your notes and bookmarks across all of your devices,
and take advantage of the quick and simple search function to find
what you need, whenever you need it.
This book offers new perspectives on British nuclear policy-making
at the height of the Cold War, arguing that the decisions taken by
the British government during the 1950s and 1960s in pursuit of its
nuclear ambitions cannot be properly understood without close
reference to Duncan Sandys, and in particular the policy
preferences that emerged from his experiences of the Second World
War and his efforts leading Britain's campaign against the V-1 and
V-2. Immersing himself in this campaign against unmanned weaponry,
Sandys came to see ballistic missiles as the only guarantor of
nuclear credibility in the post-war world, placing them at the
centre of his strategic thinking and developing a sincerely-held
and logically-consistent belief system which he carried with him
through a succession of ministerial roles, allowing him to exert a
previously undocumented level of influence on the nature of
Britain's nuclear capabilities and its approach to the Cold War.
This book shows the profound influence Sandys' personal belief
system had on Britain's attempts to acquire a credible nuclear
deterrent.
|
You may like...
Security Ethics
Katerina Hadjimatheou, Tom Sorell, …
Hardcover
R5,828
Discovery Miles 58 280
|