'Child Soldiers and the Lubanga Case' and 'The Tallinn Manual on the International Law Applicable to Cyber Warfare' are the two central themes of this volume.
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises.
Global criminology is an emerging field covering international and transnational crimes that have not traditionally been the focus of mainstream criminology or criminal justice.
Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important.
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle.
Regulating Hate Speech Created by Generative AI explores the new hybrid space of Human Machine Interaction (HMI) in which hate speech is represented and computed through algorithms and AI generative systems.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful.
This book focuses on the "e;algorithmic turn"e; in state surveillance and the development of new platforms that allow the Chinese Communist Party (CCP) to shape human behavior in all areas of life through its widespread social credit system.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications.
This book offers a comprehensive overview from diverse perspectives of online gaming technology, policy, and experiments to understand and review the Indian approach.
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.
Dieses Praktikerhandbuch enthält Hinweise zur praktischen Umsetzung der EU-Datenschutz-Grundverordnung (DSGVO) sowie eine systematische Analyse der neuen Vorschriften.
Digitale Dienste werden für unsere Gesellschaft immer wichtiger, daher gelangen sie auch stärker ins Visier von Wirtschaftskriminellen, Spionen, Terroristen oder staatsfeindlichen Gruppierungen.
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling technologies.
UX research, the key to comprehending users' behaviors, motivations, and preferences for developing delightful experiences, thrives on effective teamwork and collaboration.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful.
This book explores how the design, construction, and use of robotics technology may affect today's legal systems and, more particularly, matters of responsibility and agency in criminal law, contractual obligations, and torts.
5G, the emerging technology in mobile communication, is expected to deliver an important and decisive impact on several of the UN's Sustainable Development Goals where universal accessibility to ICTs remains a serious concern.
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity.
Currently, computational intelligence approaches are utilised in various science and engineering applications to analyse information, make decisions, and achieve optimisation goals.