Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered.
Although the law on infringement is relatively straightforward in relation to thecopying of literal and textual elements of software, it is the copying of non-literaland functional elements that poses complex and topical questions in the contextof intellectual property (IP) protection.
Although the law on infringement is relatively straightforward in relation to thecopying of literal and textual elements of software, it is the copying of non-literaland functional elements that poses complex and topical questions in the contextof intellectual property (IP) protection.
The new edition of this acclaimed book gives a fully updated overview of European data protection law affecting companies, incorporating the important legal developments which have taken place since the last edition was published.
Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public.
Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public.
This edition is fully updated to reflect the Digital Economy Act 2010 and changes to consumer protection law at EU level including the Unfair Commercial Practices Directive.
The Defamation Act constitutes a significant overhaul of UK defamation legislation, which follows years of concern about the detrimental effects that preceeding libel laws had on freedom of expression, and the extent to which the jurisdiction had become a magnet for libel claimants.
The Defamation Act constitutes a significant overhaul of UK defamation legislation, which follows years of concern about the detrimental effects that preceeding libel laws had on freedom of expression, and the extent to which the jurisdiction had become a magnet for libel claimants.
A detailed argument of how our government has interfered in the direction of America's media landscape that traces major transformations in media since the printing press and charts a path for reform.
A detailed argument of how our government has interfered in the direction of America's media landscape that traces major transformations in media since the printing press and charts a path for reform.
Stefan Larsson's Conceptions in the Code makes a significant contribution to sociolegal analysis, representing a valuable contribution to conceptual metaphor theory.
Stefan Larsson's Conceptions in the Code makes a significant contribution to sociolegal analysis, representing a valuable contribution to conceptual metaphor theory.
Blockbuster lawsuits, artificial intelligence, backroom deals, millions in lobbying dollars and grand Silicon Valley idealism - the story of Google and copyright law is action-packed.
Blockbuster lawsuits, artificial intelligence, backroom deals, millions in lobbying dollars and grand Silicon Valley idealism - the story of Google and copyright law is action-packed.
This volume tackles a quickly-evolving field of inquiry, mapping the existing discourse as part of a general attempt to place current developments in historical context; at the same time, breaking new ground in taking on novel subjects and pursuing fresh approaches.
This volume tackles a quickly-evolving field of inquiry, mapping the existing discourse as part of a general attempt to place current developments in historical context; at the same time, breaking new ground in taking on novel subjects and pursuing fresh approaches.
Cybersecurity is set to be one of the dominant themes in EU governance in the coming years, and EU law has begun to adapt to the challenges presented by security with the adoption of the Network and Information Security (NIS) Directive.
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks.
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security.
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts.
This book assesses potential developments of terrorism and ways to prevent it-the growing threats as new technologies become available - and how the same new technologies may help trap those with potential mal-intent.
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country's cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate.
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks.
This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity.
This book explains Europol's online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, and online child sexual exploitation that Europol has already pushed private and public actors to cooperate.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers.
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling technologies.
Utilising Lon Fuller's conception of legality, this book argues that current legal provisions often used to control online abuse aided by social media do not conform to the basic principles of legality in the criminal law, in turn, threatening freedom of expression.