![]() |
![]() |
Your cart is empty |
||
Showing 1 - 3 of 3 matches in All Departments
Examining open EDI, an application of electronic commerce, this volume deals with its relationship with law. Electronic commerce applications all allow the transfer of electronic data from one point to another. Open EDI also allows for commercial transactions to take place in a fully-automated and highly-organized trading environment. Open EDI permits "ad hoc" open electronic transactions irrespective of geographical border and jurisdictions among trading partners with no prior trade relationship. By doing this open EDI limits the possibility of using up-front interchange agreements to address legal problems of the interchange. It is therefore necessary to use legal instruments supported by information technology to overcome legal problems. The book advocates the use of possible regulations to address the need of the users to act in such a trading environment uninhibited by basic legal concerns. It concludes that to respond to the challenge of open EDI it is necessary to work towards a new legal framework based on international law and supported by information technology.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, "Data Protection Regulation", discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, "Neutralisation and Anonymization", discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, "Privacy Policies in Practice", discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility.
|
![]() ![]() You may like...
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, …
Paperback
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, …
Paperback
Art and Human Rights - A…
Fiana Gantheret, Nolwenn Guibert, …
Hardcover
R4,232
Discovery Miles 42 320
Long Term Care - An Annotated…
Theodore H Koff, Kristine M. Bursac
Hardcover
R1,416
Discovery Miles 14 160
Being Chris Hani's Daughter
Lindiwe Hani, Melinda Ferguson
Paperback
![]()
|