This book explores the manifold actual, possible and probable interconnections between gambling and crime in the context of the increased availability of wagering activities across many regions of the world.
In this book, Yuko Suda examines the Safe Harbor debate, the passenger name record (PNR) dispute, and the Society for Worldwide Interbank Financial Transactions (SWIFT) affair to understand the transfer of personal data from the European Union (EU) to the United States.
To better understand the heterogeneity of the international online intermediary liability regime, The Oxford Handbook of Intermediary Liability Online is designed to provide a comprehensive, authoritative and 'state-of-the-art' discussion of by highlighting emerging trends.
This book discusses contemporary standards of legal safeguards in the area of bulk electronic surveillance from the perspective of the European legal model.
This book explores the intersection of cybersecurity and psychology, examining the motivations and behaviours of cybersecurity professionals, employees, hackers, and cybercriminals.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities.
Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.
Implementing appropriate security measures will be an advantage when protecting organisations from regulatory action and litigation in cyber security law: can you provide a defensive shield?
Since the entry into force of the Lisbon Treaty, data protection has been elevated to the status of a fundamental right in the European Union and is now enshrined in the EU Charter of Fundamental Rights alongside the right to privacy.
Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered.
Exploring potential scenarios of artificial intelligence regulation which prevent automated reality harming individual human rights or social values, this book reviews current debates surrounding AI regulation in the context of the emerging risks and accountabilities.
Less than a decade after the Financial Crisis, we are witnessing the fast emergence of a new financial order driven by three different, yet interconnected, dynamics: first, the rapid application of technology - such as big data, machine learning, and distributed computing - to banking, lending, and investing, in particular with the emergence of virtual currencies and digital finance; second, a disintermediation fuelled by the rise of peer-to-peer lending platforms and crowd investment which challenge the traditional banking model and may, over time, lead to a transformation of the way both retail and corporate customers bank; and, third, a tendency of de-bureaucratisation under which new platforms and technologies challenge established organisational patterns that regulate finance and manage the money supply.
As the threats posed by organised crime and terrorism persist, law enforcement authorities remain under pressure to suppress the movement, or flows, of people and objects that are deemed dangerous.
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks.
With cyberspace becoming a domain of inter-state conflict and confrontation, this book is one of the first studies of the ways in which international law can facilitate the peaceful settlement of inter-state cyber disputes.
This study examines a key aspect of regulatory policy in the field of data protection, namely the frameworks governing the sharing of data for law enforcement purposes, both within the EU and between the EU and the US and other third party countries.
The COVID-19 pandemic not only ravaged human bodies but also had profound and possibly enduring effects on the health of political and legal systems, economies and societies.
The Government's use of algorithmic-based decision-making is rapidly expanding across policy areas, including immigration, social security, regulation, security and policing.
Current advancements in civil rights and environmental activism emphasize the crucial importance of making environmental information widely available to the public, regardless of whether it is in the hands of the government or of corporations, especially when the information is needed to understand and prevent risks for human health and the environment.
Communication in Legal Advocacy integrates work in legal theory, communication theory, social science research, and strategic planning to provide a comprehensive anaysis of the communication processes in trials.
The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018.
Understand your GDPR obligations and prioritise the steps you need to take to complyThe GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection.
The only book of its kind to look at how our legal system needs to change to accommodate a world in which machines, in addition to people, make decisions.
Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public.
This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy.
This monograph examines how European Union law and regulation address concentrations of private economic power which impede free information flows on the Internet to the detriment of Internet users' autonomy.