Current advancements in civil rights and environmental activism emphasize the crucial importance of making environmental information widely available to the public, regardless of whether it is in the hands of the government or of corporations, especially when the information is needed to understand and prevent risks for human health and the environment.
Truly international in scope, this Handbook focuses on approaches to discipline, surveillance and social control from around the world, critically examining the strategies and practices schools employ to monitor students and control their behavior.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book presents a timely analysis of the psychological influences, underpinnings, and predictors of non-consensual image-based sexual offending (NCIBSO), such as revenge pornography, cyber-flashing, deepfake media production and upskirting.
IT-Sicherheitsrecht und unbestimmte Rechtsnormen: Diese Arbeit untersucht die NIS-Richtlinien, das BSIG und ihre unbestimmten Rechtsnormen, die Unternehmen vor erhebliche Herausforderungen stellen.
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets.
This book presents a timely and innovative exploration of one of the first human rights articles about data production and processing: the Convention on the Rights of Persons with Disabilities article 31, 'Statistics and data collection'.
Communication in Legal Advocacy integrates work in legal theory, communication theory, social science research, and strategic planning to provide a comprehensive anaysis of the communication processes in trials.
Resisting State Surveillance in the Digital Age provides an in-depth examination of the complexity and diversity of organised opposition to increasing state surveillance powers in the UK.
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
This book explores the manifold actual, possible and probable interconnections between gambling and crime in the context of the increased availability of wagering activities across many regions of the world.
This comprehensive textbook identifies the emerging legal, policy, and ethical considerations associated with the collection, analysis, storage, and distribution of data that can be tied to location on Earth - otherwise known as "e;geospatial information.
Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 coursesIn this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins:Discuss the ISO 27001/27002:2022 updates;Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002;Highlight why data protection and information security are vital in our ever-changing online and physical environments;Reflect on changes to international legislation, e.
Esta publicación pretende reforzar la necesidad de definir estrategias para preservar los sistemas propios de los países (especialmente los datos), dada la dificultad de prevenir ataques cibernéticos e identificar sus fuentes.
This book addresses current issues regarding the ethical use of information technology in a holistic vision, by combining the perspectives of education specialists and those in the field of computer science at the level of higher education.
This book provides a comparison and practical guide of the data protection laws of Canada, China (Hong Kong, Macau, Taiwan), Laos, Philippines, South Korea, United States and Vietnam.
This volume discusses the phenomenon of internet infidelity by looking at the psychological, social, legal, and technological aspects involved in such behaviour.
This book centres on Webcam Child Sex Tourism and the Sweetie Project initiated by the children's rights organization Terre des Hommes in 2013 in response to the exponential increase of online child abuse.
Las iniciativas regulatorias de protección a los usuarios adoptadas por países con mercados en ambiente convergente se basan entre otras en el establecimiento de comités consultivos para el consumidor y foros para promover su participación en la formación de políticas imposición de la obligación de servicio universal desarrollo de agendas específicas sobre los objetivos prioritarios de la política introducción de iniciativas regulatorias específicas para mejorar opciones del consumidor como la preselección y portabilidad numérica el desarrollo de estándares y códigos de asuntos relacionados con consumidores por parte de la industria el desarrollo y funcionamiento de programas de educación del consumidor que incluyen difusión de información sobre la calidad el establecimiento de nuevos indicadores de calidad y la creación de programas específicos para aspectos relacionados con Internet y el comercio electrónico tales como la privacidad el fraude y leyes cibernéticas.
Alrededor de las firmas electrónicas y digitales, se han formado múltiples conceptos intrínsecos y extrínsecos, que son abordados en este libro, a partir de inquietudes como las siguientes, ¿qué diferencia hay entre firma digital y certificado digital?
Este es el quinto libro publicado por el Grupo de Estudios en Comercio Electrónico, Telecomunicaciones e Informñatica (GECTI) de la Facutlad de Derecho de la Universidad de los Andes.
This book brings together contributions from leading scholars in law and technology, analysing the privacy issues raised by new data-driven technologies.
With a foreword by Major-General Nico Geerts, Commander Netherlands Defence Academy, Breda, The NetherlandsInternational conflict resolution increasingly involves the use of non-military power and non-kinetic capabilities alongside military capabilities in the face of hybrid threats.
This book centres on Webcam Child Sex Tourism and the Sweetie Project initiated by the children's rights organization Terre des Hommes in 2013 in response to the exponential increase of online child abuse.
With a foreword by Major-General Nico Geerts, Commander Netherlands Defence Academy, Breda, The NetherlandsInternational conflict resolution increasingly involves the use of non-military power and non-kinetic capabilities alongside military capabilities in the face of hybrid threats.
Este libro surge de la necesidad de hacer que el consumidor comprenda la naturaleza, el contenido y el alcance (juridico) de la publicidad digital que le comunica la empresa mercantil (comercial).
Este libro es una introducción al complejo mundo del derecho y la regulación de las telecomunicaciones o comunicaciones electrónicas, como actualmente se les denomina.