Freedom of information (FOI) is now an international phenomenon with over 100 countries from Albania to Zimbabwe enacting the right to know for their citizens.
This comprehensive textbook identifies the emerging legal, policy, and ethical considerations associated with the collection, analysis, storage, and distribution of data that can be tied to location on Earth - otherwise known as "e;geospatial information.
Der unaufhaltsame digitale Fortschritt bringt weitreichende Umwalzungen fur das Recht der Vertraulichkeit, des Datengeheimnisses und der Sicherheit von Informationen mit sich.
The winner of the 2020 British Insurance Law Association Book Prize, this timely, expertly written book looks at the legal impact that the use of 'Big Data' will have on the provision and substantive law of insurance.
This book presents a transnational and transsystemic perspective on the role of contract in Internet Governance, and considers parameters for assessing the utility and legitimacy of contracts in this context.
Der Autor widmet sich der Frage, welche rechtlichen Grenzen Privatpersonen, Unternehmen und staatliche Einrichtungen beim Einsatz von Drohnen beachten müssen.
Providing a scholarly analysis of how to govern and make the right kinds of laws for cyberspace, in this work, Professor Reed investigates the vast majority of cyberspace users who wish to act lawfully and asks whether the current state of law in cyberspace makes it possible for them to do so.
Dieses Buch stellt ein Kompendium ausgewählter spiel- und entscheidungstheoretischer Modelle zur Erreichung und Bewertung der Sicherheit kritischer Infrastrukturen vor.
Now in its second edition, Communication Law: Practical Applications in the Digital Age is an engaging and accessible text that brings a fresh approach to the fundamentals of mass media law.
This book is a means to diagnose, anticipate and address new cyber risks and vulnerabilities while building a secure digital environment inside and around businesses.
The World White Web provides an interdisciplinary analysis of far-right radicalisation in the digital age, drawing from criminology, history, and computer science to explore how technology and imagery accelerate extremist recruitment.
The rise and spread of the Internet has accelerated the global flows of money,technology and information that are increasingly perceived as a challenge to thetraditional regulatory powers of nation states and the effectiveness of their constitutions.
Focusing on four key aspects of Web3, the book explores metaverses, data governance, public and private law interfaces, and access to justice, presenting new research on the impact of data analytics on transactions within law, on regulatory activities, and on the practice of law.
The Ultimate GDPR Practitioner Guide provides those tasked with implementing Data Protection processes, useful information on how to achieve compliance with GDPR.
IT-Sicherheitsrecht und unbestimmte Rechtsnormen: Diese Arbeit untersucht die NIS-Richtlinien, das BSIG und ihre unbestimmten Rechtsnormen, die Unternehmen vor erhebliche Herausforderungen stellen.
This book explains Europol's online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, and online child sexual exploitation that Europol has already pushed private and public actors to cooperate.
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity.
This book identifies and examines the novel ways in which money is laundered internationally through illegal activities on the internet, focusing on sales, payments, social media, online gaming, and tax misapplication.
A definitive guide to cybersecurity law Expanding on the author s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.
As the power and sophistication of of 'big data' and predictive analytics has continued to expand, so too has policy and public concern about the use of algorithms in contemporary life.
This book explores the relationship between intellectual property law and competition law, proposing a harmonious equilibrium in the dynamic landscape of evolving technology.
This book identifies and examines the novel ways in which money is laundered internationally through illegal activities on the internet, focusing on sales, payments, social media, online gaming, and tax misapplication.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.