In this book Konstantinos Komaitis identifies a tripartite problem - intellectual, institutional and ethical - inherent in the domain name regulation culture.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently.
The fifth edition of Information Technology Law continues to be dedicated to a detailed analysis of and commentary on the latest developments within this burgeoning field of law.
This book brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy, data protection and enforcing rights in a changing world.
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes.
This book examines the work of the public relations, technology, and legal professionals who provide online "e;reputation management"e; services, situating their work within contemporary debates about regulating speech on the internet.
This book includes detailed coverage of intellectual property, contract, encryption and liability issues, including allocation of domain names, use of metatags and other forms of search engine optimization, digital signatures and the position of ISPs and other intermediaries.
Government and Information: The Law Relating to Access, Disclosure and their Regulation is the leading text offering comprehensive and practical advice on the access, disclosure and retention of government records under UK, EU and ECHR requirements.
This book explores the use of the internet by (non-Islamic) extremist groups, drawing together research by scholars across the social sciences and humanities.
The Right to be Forgotten is one of the most publicised areas of the GDPR and has received massive worldwide publicity following judicial and legal developments in Europe.
The subjects of Privacy and Data Protection are more relevant than ever, and especially since 25 May 2018, when the European General Data Protection Regulation became enforceable.
This book critically evaluates the EU regulatory framework for the liability of host Internet Service Providers (ISPs) for copyright and trade mark infringements and provides a cluster of novel recommendations for its improvement.
Presenting an integrated approach to information exchange among law enforcement institutions within the EU, this book addresses the dilemma surrounding the need to balance the security of individuals and the need to protect their privacy and data.
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling technologies.
Cybersecurity is set to be one of the dominant themes in EU governance in the coming years, and EU law has begun to adapt to the challenges presented by security with the adoption of the Network and Information Security (NIS) Directive.
This book examines the risks to freedom of expression, particularly in relation to the internet, as a result of regulation introduced in response to terrorist threats.
The concept of a risk-based approach to data protection came to the fore during the overhaul process of the EU's General Data Protection Regulation (GDPR).
This book offers the first comprehensive analysis of the national and international legal issues surrounding digital assets in enforcement and insolvency.
The first work to examine data privacy laws across Asia, covering all 26 countries and separate jurisdictions, and with in-depth analysis of the 14 which have specialised data privacy laws.
This edited collection explores the disruptive effects of technology on law: in particular, the challenge presented to regulators as they strive to manage the transition from one technological state to another (such as the transition from analogue to digital or from fossil fuels to green renewables) and the opportunities (and challenges) presented as regulators transition from traditional rule-based legal governance to governance that relies on new technologies and tools.
This book presents a timely analysis of the psychological influences, underpinnings, and predictors of non-consensual image-based sexual offending (NCIBSO), such as revenge pornography, cyber-flashing, deepfake media production and upskirting.
The Government's use of algorithmic-based decision-making is rapidly expanding across policy areas, including immigration, social security, regulation, security and policing.
The Defamation Act constitutes a significant overhaul of UK defamation legislation, which follows years of concern about the detrimental effects that preceeding libel laws had on freedom of expression, and the extent to which the jurisdiction had become a magnet for libel claimants.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities.