Cellular technology has always been a surveillance technology, but "e;cellular convergence"e; - the growing trend for all forms of communication to consolidate onto the cellular handset - has dramatically increased the impact of that surveillance.
The first edition of this book in 2002 was the first UK text to examine digital copyright together with related areas such as performers' rights, moral rights, database rights and competition law as a subject in its own right.
The first edition of this book in 2002 was the first UK text to examine digital copyright together with related areas such as performers' rights, moral rights, database rights and competition law as a subject in its own right.
New innovations are created every day, but today's business leaders are focused on finding disruptive innovations which are cheaper and lower performing than upmarket technologies.
Modern Intellectual Property Law combines coverage of each intellectual property right granted for creations of the mind into a thoughtful, unified textbook.
The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data.
The fifth edition of Information Technology Law continues to be dedicated to a detailed analysis of and commentary on the latest developments within this burgeoning field of law.
Featuring specially commissioned chapters from experts in the field of media and communications law, this book provides an authoritative survey of media law from a comparative perspective.
A riveting account of espionage for the digital age, from one of America's leading intelligence expertsSpying has never been more ubiquitous-or less understood.
Attorney and legal scholar Daxton Stewart examines the intersection of media law and science fiction, exploring the past, present, and future of communication technology and policy debates.
This edited book promotes and facilitates cybercrime research by providing a cutting-edge collection of perspectives on the critical usage of online data across platforms, as well as the implementation of both traditional and innovative analysis methods.
The hazards of perfect memory in the digital ageDelete looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget.
Whilst paying lip service to the importance of public access to court proceedings and its corollary of unfettered media reporting,a trawl through common law jurisdictions reveals that judges and legislators have been responsible for substantial inroads into the ideal of open justice.
In the months after the Federal Communications Commission's (FCC) 2017 decision to repeal network neutrality as US policy, it is easy to forget the decades of public, organizational, media and governmental struggle to control digital policy and open access to the internet.
Cybersecurity is set to be one of the dominant themes in EU governance in the coming years, and EU law has begun to adapt to the challenges presented by security with the adoption of the Network and Information Security (NIS) Directive.
This comprehensive textbook by the editor of Law and the Internet seeks to provide students, practitioners and businesses with an up-to-date and accessible account of the key issues in internet law and policy from a European and UK perspective.
This book explains Europol's online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, and online child sexual exploitation that Europol has already pushed private and public actors to cooperate.
This book is about cyber security, but it's also about so much more; it's about giving you the skills to think creatively about your role in the cyber security industry.
This volume tackles a quickly-evolving field of inquiry, mapping the existing discourse as part of a general attempt to place current developments in historical context; at the same time, breaking new ground in taking on novel subjects and pursuing fresh approaches.
Digital Totalitarianism: Algorithms and Society focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity, and the collapse of critical thinking with the social media fueled rise of conspiranoia.
The book provides a critical analysis of electronic alternatives to documents used in the international sale of goods carried by sea, including invoices, bills of lading, certificates of insurance, as well as other documentation required under documentary credits, and payment processing arrangements.
Using numerous practical examples,this book examines the evolution of EC telecommunications law following the achievement of liberalisation, the main policy goal of the 1990s.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it.
Dramatic and controversial changes in the funding of science over the past two decades, towards its increasing commercialization, have stimulated a huge literature trying to set out an "e;economics of science"e;.
Although the law on infringement is relatively straightforward in relation to thecopying of literal and textual elements of software, it is the copying of non-literaland functional elements that poses complex and topical questions in the contextof intellectual property (IP) protection.
Legal Data and Information in Practice provides readers with an understanding of how to facilitate the acquisition, management, and use of legal data in organizations such as libraries, courts, governments, universities, and start-ups.
This book is a means to diagnose, anticipate and address new cyber risks and vulnerabilities while building a secure digital environment inside and around businesses.