This book introduces undergraduates and computing industry professionals to basic legal principles and the peculiarities of legal issues in cyberspace.
Using real-life applications, this graduate-level textbook introduces different mathematical methods of scientific computation to solve minimization problems.
This book introduces undergraduates and computing industry professionals to basic legal principles and the peculiarities of legal issues in cyberspace.
Utilising Lon Fuller's conception of legality, this book argues that current legal provisions often used to control online abuse aided by social media do not conform to the basic principles of legality in the criminal law, in turn, threatening freedom of expression.
The Routledge Handbook of Social Media, Law and Society provides an international survey of social media and the law in society, blending academic, non-academic and non-governmental expertise to provide a thematic overview of social media and the law across a number of jurisdictions.
Invaluable guidance on the most important legal issues facing nonprofits today Internet communication is the lifeblood of countless nonprofit organizations, yet there exists no specific law to provide for its regulation.
Standards, technologies, and requirements for computer validation have changed dramatically in recent years, and so have the interpretation of the standards and the understanding of the processes involved.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently.
In the months after the Federal Communications Commission's (FCC) 2017 decision to repeal network neutrality as US policy, it is easy to forget the decades of public, organizational, media and governmental struggle to control digital policy and open access to the internet.
In the months after the Federal Communications Commission's (FCC) 2017 decision to repeal network neutrality as US policy, it is easy to forget the decades of public, organizational, media and governmental struggle to control digital policy and open access to the internet.
This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age.
This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age.
This book provides an analysis of the legal and policy dimensions of open access to research, education and public sector information with a focus on Nigeria.
This book provides an analysis of the legal and policy dimensions of open access to research, education and public sector information with a focus on Nigeria.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age.
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal.
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal.
The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities.
The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities.
The rise and spread of the Internet has accelerated the global flows of money,technology and information that are increasingly perceived as a challenge to thetraditional regulatory powers of nation states and the effectiveness of their constitutions.
The rise and spread of the Internet has accelerated the global flows of money,technology and information that are increasingly perceived as a challenge to thetraditional regulatory powers of nation states and the effectiveness of their constitutions.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful.
In 2014, Conrad Roy committed suicide following encouragement from his long-distance girlfriend, Michelle Carter, in what has become known as the Texting Suicide case.
In 2014, Conrad Roy committed suicide following encouragement from his long-distance girlfriend, Michelle Carter, in what has become known as the Texting Suicide case.
This book provides a comprehensive and synthetic analysis of the legal acts of the Council of Europe and the European Union affecting regulation of cybercrime in EU countries.
This is a research and reference guide to the telecommunications industry in the United States, providing an account of legislative and policy changes up until the publication of the work.