This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables.
A comprehensive, structured, and up-to-date introduction to the law governing the dissemination of information in a computer-mediated world in China, Internet Law in China stresses the practical applications of the law that are encountered by all individuals and organizations in Chinese cyberspace, but always in the light of theoretical underpinnings.
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets.
This timely volume provides a comprehensive examination of how the proposed new European Health Data Space (EHDS) legislation will impact upon health and genetic data, individual privacy and providers of health services.
This book provides a comprehensive and synthetic analysis of the legal acts of the Council of Europe and the European Union affecting regulation of cybercrime in EU countries.
Examining the development and design of regulatory structures in the online environment, The Regulation of Cyberspace considers current practices and suggests a regulatory model that acknowledges its complexity and how it can be used by regulators to provide a more comprehensive regulatory structure for cyberspace.
Privacy, Due process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology engages with the rapidly developing computational aspects of our world including data mining, behavioural advertising, iGovernment, profiling for intelligence, customer relationship management, smart search engines, personalized news feeds, and so on in order to consider their implications for the assumptions on which our legal framework has been built.
In 1787, Thomas Jefferson, then the American Minister to France, had the "e;complete skeleton, skin & horns"e; of an American moose shipped to him in Paris and mounted in the lobby of his residence as a symbol of the vast possibilities contained in the strange and largely unexplored New World.
As the power and sophistication of of 'big data' and predictive analytics has continued to expand, so too has policy and public concern about the use of algorithms in contemporary life.
Now in its second edition, Communication Law: Practical Applications in the Digital Age is an engaging and accessible text that brings a fresh approach to the fundamentals of mass media law.
This book explores to what extent constitutional principles are put under strain in the social media environment, and how constitutional safeguards can be established for the actors and processes that govern this world: in other words, how to constitutionalise social media.
Private International Law Online is a dedicated analysis of the private international law framework in the European Union as it applies to online activities such as content publishing, selling and advertising goods through internet marketplaces, or offering services that are performed online.
Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation and offender management and treatment practice in the area of Internet child abuse.
This book introduces undergraduates and computing industry professionals to basic legal principles and the peculiarities of legal issues in cyberspace.
This is the first book-length treatment of the advancement of EU global data flows and digital trade through the framework of European institutionalisation.
Justice apps - mobile and web-based programmes that can assist individuals with legal tasks - are being produced, improved, and accessed at an unprecedented rate.
In this much anticipated sequel to the legal bestseller, The Future of Law, Susskind lays down a challenge to all lawyers to ask themselves, with their hands on their hearts, what elements of their current workload could be undertaken differently - more quickly, cheaply, efficiently, or to a higher quality - using alternative methods of working.
Presenting an integrated approach to information exchange among law enforcement institutions within the EU, this book addresses the dilemma surrounding the need to balance the security of individuals and the need to protect their privacy and data.
Digital Earth - Cyber threats, privacy and ethics in an age of paranoiaWhether it s the next big ransomware attack or cyber terrorism, digital threats have evolved drastically in recent years.
The digital media environment is characterized by an abundance and diversity of content, a multiplicity of platforms, new modes of content production, distribution and access, and changed patterns of consumer and business behaviour.