As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets.
A riveting account of espionage for the digital age, from one of America's leading intelligence expertsSpying has never been more ubiquitous-or less understood.
A riveting account of espionage for the digital age, from one of America's leading intelligence expertsSpying has never been more ubiquitous-or less understood.
This book offers a radically different introduction to law, one that reflects the challenges and opportunities presented by the rapid technological developments of our time.
This book examines the discourse and developments surrounding privacy and data protection in the digital realm, featuring papers and discussions from the 2024 CPDP.
This book introduces undergraduates and computing industry professionals to basic legal principles and the peculiarities of legal issues in cyberspace.
Using real-life applications, this graduate-level textbook introduces different mathematical methods of scientific computation to solve minimization problems.
This book introduces undergraduates and computing industry professionals to basic legal principles and the peculiarities of legal issues in cyberspace.
Utilising Lon Fuller's conception of legality, this book argues that current legal provisions often used to control online abuse aided by social media do not conform to the basic principles of legality in the criminal law, in turn, threatening freedom of expression.
The Routledge Handbook of Social Media, Law and Society provides an international survey of social media and the law in society, blending academic, non-academic and non-governmental expertise to provide a thematic overview of social media and the law across a number of jurisdictions.
Invaluable guidance on the most important legal issues facing nonprofits today Internet communication is the lifeblood of countless nonprofit organizations, yet there exists no specific law to provide for its regulation.
Standards, technologies, and requirements for computer validation have changed dramatically in recent years, and so have the interpretation of the standards and the understanding of the processes involved.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently.
In the months after the Federal Communications Commission's (FCC) 2017 decision to repeal network neutrality as US policy, it is easy to forget the decades of public, organizational, media and governmental struggle to control digital policy and open access to the internet.
In the months after the Federal Communications Commission's (FCC) 2017 decision to repeal network neutrality as US policy, it is easy to forget the decades of public, organizational, media and governmental struggle to control digital policy and open access to the internet.
This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age.
This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age.
This book provides an analysis of the legal and policy dimensions of open access to research, education and public sector information with a focus on Nigeria.
This book provides an analysis of the legal and policy dimensions of open access to research, education and public sector information with a focus on Nigeria.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age.
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal.