This book brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy, data protection and Artificial Intelligence.
Dieses Buch stellt ein Kompendium ausgewählter spiel- und entscheidungstheoretischer Modelle zur Erreichung und Bewertung der Sicherheit kritischer Infrastrukturen vor.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
Technology underpins everything we do, and the contracts which underpin the delivery of technology-related services are important from both an economic and social perspective.
Exploring potential scenarios of artificial intelligence regulation which prevent automated reality harming individual human rights or social values, this book reviews current debates surrounding AI regulation in the context of the emerging risks and accountabilities.
During the first part of the twenty-first century, bloggers, citizen journalists, social media users, Yelp reviewers, and a myriad of other communicators have found themselves facing defamation, privacy, campaign finance, and other lawsuits as a result of the messages they have communicated.
This book provides an analysis of the legal and policy dimensions of open access to research, education and public sector information with a focus on Nigeria.
War and Press Freedom: The Problem of Prerogative Power is a groundbreaking and provocative study of one of the most perplexing civil liberties issues in American history: What authority does or should the government have to control press coverage and commentary in wartime?
This timely book examines crucial developments in the field of privacy law, efforts by legal systems to impose their data protection standards beyond their borders and claims by states to assert sovereignty over data.
In 2014, Conrad Roy committed suicide following encouragement from his long-distance girlfriend, Michelle Carter, in what has become known as the Texting Suicide case.
This book provides insights into how AI is changing legal practice, government processes, and individuals' access to those processes, encouraging each of us to consider how technological advances are changing the legal system.
Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.
This book offers the first comprehensive analysis of the national and international legal issues surrounding digital assets in enforcement and insolvency.
Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics.
Resilient Thinking - Protecting Organisations in the 21st Century, Second editionSince the release of the first edition in 2012, a lot has changed in the world of risk and organisational resilience.
Attorney and legal scholar Daxton Stewart examines the intersection of media law and science fiction, exploring the past, present, and future of communication technology and policy debates.
Since 25 May 2018 the General Data Protection Regulation 2016/679 (GDPR) has applied, representing a significant overhaul of data protection law in the European Union.
The Seventh Edition covers the new set of EU Directives and the Electronic Communications Code, which will considerably change the legal framework for electronic communications.
The winner of the 2020 British Insurance Law Association Book Prize, this timely, expertly written book looks at the legal impact that the use of 'Big Data' will have on the provision and substantive law of insurance.
The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018.
Islamic State's Online Activity and Responses provides a unique examination of Islamic State's online activity at the peak of its "e;golden age"e; between 2014 and 2017 and evaluates some of the principal responses to this phenomenon.