This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
This Major Reference Work synthesizes the global knowledge on cybercrime from the leading international criminologists and scholars across the social sciences.
Digital Earth - Cyber threats, privacy and ethics in an age of paranoiaWhether it s the next big ransomware attack or cyber terrorism, digital threats have evolved drastically in recent years.
Bei Datenschutzverstößen in einem Unternehmen können nach der DSGVO nicht nur die Datenschutzbehörden Bußgeldverfahren einleiten, sie bietet auch den Betroffenen selbst sowie Verbraucherschutz- und Wettbewerbsverbänden ebenso wie Mitbewerbern die Möglichkeit, zivilrechtlich Unterlassungs- und Schadensersatzansprüche geltend zu machen.
The digital media environment is characterized by an abundance and diversity of content, a multiplicity of platforms, new modes of content production, distribution and access, and changed patterns of consumer and business behaviour.
Drawing on two empirical studies and influential theoretical frameworks, this book provides a critical overview of the key regulatory challenges concerning cyberbullying and sexting behaviours among young people (persons under 18 years).
This book brings together leading experts in the fields of insurance and the law of obligations to consider how insurance law is attempting to deal with emerging risks.
Modern Intellectual Property Law combines coverage of each intellectual property right granted for creations of the mind into a thoughtful, unified textbook.
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT).
This book offers a radically different introduction to law, one that reflects the challenges and opportunities presented by the rapid technological developments of our time.
Can open source software software that is usually available without charge and that individuals are free to modify survive against the fierce competition of proprietary software, such as Microsoft Windows?
Media literacy educators rely on the ability to make use of copyrighted materials from mass media, digital media and popular culture for both analysis and production activities.
This book argues that the European Court of Human Rights (ECtHR) should reconsider its approach to hate speech cases and develop a robust protection of freedom of expression as set out in the benchmark case of Handyside v the United Kingdom.
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
Invaluable guidance on the most important legal issues facing nonprofits today Internet communication is the lifeblood of countless nonprofit organizations, yet there exists no specific law to provide for its regulation.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford's law for biometrics and network traffic analysis.
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physical world.
The COVID-19 pandemic not only ravaged human bodies but also had profound and possibly enduring effects on the health of political and legal systems, economies and societies.
This book responds to the claim that criminology is becoming socially and politically irrelevant despite its exponential expansion as an academic sub-discipline.
The Right to be Forgotten is one of the most publicised areas of the GDPR and has received massive worldwide publicity following judicial and legal developments in Europe.
This book discusses contemporary standards of legal safeguards in the area of bulk electronic surveillance from the perspective of the European legal model.
The first work to examine data privacy laws across Asia, covering all 26 countries and separate jurisdictions, and with in-depth analysis of the 14 which have specialised data privacy laws.
Examines how privacy, confidentiality, consent, identifiability, safeguards and data sharing affect the pursuit of health research for the common good.
Francis Gurry's renowned work, Breach of Confidence, published in 1984, was groundbreaking and invaluable in the field of intellectual property as the first text to synthesise the then burgeoning case law on breach of confidence into a systematic form.
This book addresses current issues regarding the ethical use of information technology in a holistic vision, by combining the perspectives of education specialists and those in the field of computer science at the level of higher education.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age.
This book brings together an international group of experts to present the latest psychosocial and developmental criminological research on cyberbullying, cybervictimization and intervention.