Digital, IT and Communications law Books
Oxford University Press Information Technology Law
Book SynopsisInformation Technology Law takes a unique socio-legal approach to examining the interaction between the law and other elements of the information society. Murray discusses relevant issues such as governance, free expression, and crime with enthusiasm, and looks forward to future challenges presented by developing technologies.Trade ReviewNicely written, offering a well-structured and stimulating introduction into the topic. * Dr Jonida Milaj-Weishaar - University of Groningen *'It is the definitive UK text--useful for all media and digital technology students even if you're not specifically studying law. * William Merrin - Associate Professor, Swansea University *A clear, comprehensive and concise work on IT law. It explains not only the law, but also the technological backgrounds. * Dr Jan Oster, Leiden University (previous edition) *Table of ContentsPart I: The Information Society 1:: The world of bits 2:: The network of networks 3:: Net neutrality 4:: Regulating the information society Part II: Content and the Information Society 5:: Cyber-speech 6:: Social networking and antisocial conduct 7:: Defamation Part III: Digital Content and Intellectual Property Rights 8:: Intellectual property rights and the information society 9:: Software 10:: Digital creatives and copyright law 11:: Copyright in the digital environment 12:: Copyright infringement in the digital environment 13:: Databases 14:: Branding, trade marks and domain names 15:: Brand identities, search engines, and secondary ma rkets Part IV: E-Commerce 16:: Electronic contracts 17:: Electronic payments and cryptocurrency 18:: Consumer protection Part V: Criminal Activity in the Information Society 19:: Computer misuse 20:: Obscenity in the information society 21:: Crime and law enforcement in the information society Part VI: Data Privacy 22:: Data protection: the legal framework 23:: Data protection: rights and obligations 24:: The international trade in personal data 25:: State surveillance and data retention
£50.34
Edward Elgar Publishing Digital Policy in the EU
Book SynopsisThis thought-provoking book follows the EU's journey into the digital age, explaining how it uses legislation and policy to tackle challenges such as the abuse of market power by Big Tech companies and the spread of hate speech and disinformation.
£104.50
Globe Law and Business Ltd Negotiating Technology Contracts, Second Edition
Book SynopsisTechnology underpins everything we do, and the contracts which underpin the delivery of technology-related services are important from both an economic and social perspective. Negotiating technology-related contracts can, however, be challenging: for the uninitiated or uninformed, the significance of the points under discussion may be unclear, confusing and often at odds with the outcomes one might expect in more traditional ‘bricks and mortar’-style contracts. To avoid unnecessarily protracted negotiations, it is essential to have a clear understanding of: (i) what each part of a technology-related contract is designed to deal with; (ii) what the customer and service provider seek to protect; and (iii) what solutions or compromises are available. This second edition provides a practical, commercial guide to negotiations without a heavy focus on ‘black letter law’, and seeks to explain the perspectives of both sides of the negotiating table on a clause-by-clause basis, clearly setting out the key points they will want to protect – and why – while also offering suggestions as to what they may be willing to concede or compromise upon. It is written with the benefit of DLA Piper’s unparalleled view of the global market for technology sourcing and outsourcing projects, and from acting for customers and service providers in this space over many years and in many jurisdictions. Chapters cover the common negotiating ‘battlefields’, from service descriptions and service levels through to warranties, indemnities, liability provisions and termination rights. The authors also examine issues associated with particular technology-related engagements, such as those based on agile methodologies, those involving the use of AI-based solutions, or those operating within heavily regulated sectors. This edition will be of interest to anyone involved in technology-related contracts, whether acting for the buy side or sell side, and whether working within law firms or legal departments or more general commercial functions who have a need to understand the way in which such contracts work.Trade ReviewAs technology progresses ever faster and further into an era in which AI, for example, will increasingly dominate, this book provides the beleaguered negotiator with essential and much needed advice and guidance. No one involved in the complexities of this fraught and fast-moving area of law should be without it. -- Elizabeth Robson Taylor and Philip Taylor MBETable of ContentsIntroduction _________________ 7 1. Due diligence in outsourcing arrangements____________ 11 1. Introduction...............................................11 2. The customer perspective.....................................................17 3. The service provider perspective.....................................................21 4. Potential solutions .........................25 5. Conclusion...................................................27 2. Service provisions ______ 29 1. Introduction...............................................29 2. The customer perspective.....................................................30 3. The service provider perspective.....................................................34 4. Potential solutions .........................37 3. Compliance with laws and regulations_________ 41 1. Introduction...............................................41 2. The customer perspective.....................................................42 3. The service provider perspective.....................................................46 4. Potential compromises...........49 4. Service level agreements _____________ 55 1. Introduction...............................................55 2. Service level models...................................................................56 3. The customer perspective.....................................................58 4. The service provider perspective.....................................................63 5. Potential solutions .........................68 5. Use of agile methodologies __________ 73 1. Introduction...............................................73 2. The customer perspective.....................................................80 3. The service provider perspective.....................................................81 4. Potential solutions .........................81 6. Warranties ______________ 87 1. Introduction...............................................87 2. The customer perspective.....................................................88 3. The service provider perspective.....................................................92 4. Potential compromises.............................................97 7. Relief/excused events __________________ 103 1. Introduction..........................................103 2. The customer perspective................................................105 3. The service provider perspective................................................107 4. Potential solutions ....................108 8. Intellectual property provisions______________ 111 1. Introduction..........................................111 2. The customer perspective................................................113 3. The service provider perspective................................................116 4. Potential solutions ....................118 9. Data protection liabilities_______________ 123 1. Introduction..........................................123 2. The customer perspective................................................124 3. The service provider perspective................................................126 4. Potential solutions ....................128 10. Benchmarking in outsourcing transactions ___________ 133 1. Introduction..........................................133 2. The customer perspective................................................137 3. The service provider perspective................................................138 4. Potential solutions ....................139 11. Setting limits of liability ________________ 143 1. Introduction..........................................143 2. The customer perspective................................................148 3. The service provider perspective................................................150 4. Potential solutions ....................152 12. Excluded liabilities ____ 155 1. Introduction..........................................155 2. The customer perspective................................................156 3. The service provider perspective................................................157 4. Potential solutions ....................160 13. Unlimited liabilities_______________ 165 1. Introduction..........................................165 2. The customer perspective................................................165 3. The service provider perspective................................................170 4. Potential compromises........................................175 14. TUPE in outsourcing agreements ____________ 181 1. Introduction..........................................181 2. The customer perspective................................................186 3. The service provider perspective................................................189 4. Potential solutions ....................191 15. Termination rights ____ 197 1. Introduction..........................................197 2. The customer perspective................................................198 3. The service provider perspective................................................204 4. Potential solutions ....................206 16. Step-in provisions _____ 211 1. Introduction..........................................211 2. The customer perspective................................................212 3. The service provider perspective................................................215 4. Potential solutions ....................219 17. Audit rights____________ 221 1. Introduction..........................................221 2. The customer perspective................................................222 3. The service provider perspective................................................224 4. Potential solutions ....................227 18. Dispute resolution provisions______________ 233 1. Introduction..........................................233 2. The customer perspective................................................233 3. The service provider perspective................................................238 4. Potential solutions ....................240 19. Negotiation in practice ________________ 241 1. Background.............................................241 2. Initial considerations ...........242 3. The procurement process..............................................................243 4. Key contract aspirations of the parties.........................................246 5. Likely areas for key debate and potential solutions.......................................................249 20. Contracting for new and complex technology _____________ 255 1. Introduction..........................................255 2. The European approach......................................................257 3. The UK approach.........................259 4. The US approach..........................259 5. Common ground.........................260 6. Contractual provisions...................................................261 7. How does AI work?...................261 8. Description of functionality.........................................262 9. Intellectual property..............262 10.Bias..........................................................................264 11.Explainability......................................265 12.Service performance...............266 13.Liability..........................................................267 14.Termination...........................................268 15.Exit..........................................................................269 21. Types of technology contract________________ 271 1. Introduction..........................................271 2. Software licence..............................271 3. Software maintenance........272 4. Hardware provision.................273 5. Hardware maintenance.........................................273 6. Cloud services....................................274 7. Outsourced/managed service............................274 8. Website/online terms....................................................................275 9. Telco/network services.............................................................275 10.IP transfers and joint ventures.........................................................275 11.Technology-related consultancy services...............275 22. Cloud services__________ 277 1. Introduction..........................................277 2. The customer perspective................................................278 3. The service provider perspective................................................282 4. Potential solutions ....................284 23. Regulated procurement___________ 289 1. Regulated procurement in the public sector..................289 2. Regulated procurement in the financial services sector...................................................................296 24. Managing contract disputes ________________ 303 1. Introduction..........................................303 2. Causes of contract disputes...........................................................303 3. Managing disputes....................307 Conclusion ________________ 315 About the authors_________ 319 Index ______________________ 321 About Globe Law and Business ___________________ 329
£175.50
Edward Elgar Publishing Ltd Artificial Intelligence in Finance: Challenges,
Book SynopsisThis book provides a comprehensive analysis of the primary challenges, opportunities and regulatory developments associated with the use of artificial intelligence (AI) in the financial sector. It will show that, while AI has the potential to promote a more inclusive and competitive financial system, the increasing use of AI may bring certain risks and regulatory challenges that need to be addressed by regulators and policymakers.After analysing the technological foundations of AI, the book focuses on the use and regulatory challenges of AI in the banking, capital markets and insurance industries. It also analyses, compares and assesses the different strategies and international approaches that have been adopted to address the challenges raised by the use of AI. The book concludes by providing a holistic and cross-sectoral analysis of the use of AI in the financial sector.The comprehensive, interdisciplinary, and industry-relevant approach adopted in Artificial Intelligence in Finance will provide students, practitioners and academics interested in financial markets with a broad understanding of the challenges and opportunities of AI in the financial sector. Additionally, the comparative and policy-oriented approach also adopted in the book will provide regulators and policymakers with innovative ideas and regulatory solutions that will help them address some of the most critical challenges associated with a new data-driven financial system.Table of ContentsContents: Introduction xvii PART I FOUNDATIONS OF AI AND AI GOVERNANCE 1 Foundations of artificial intelligence and machine learning 2 Alfonso Delgado De Molina Rius 2 Explaining explainable AI 19 Richard Zuroff and Nicolas Chapados 3 Harmony in chaos 60 Yeong Zee Kin and Larissa Lim 4 Responsible AI 87 Marcus Bartley Johns, Joy Fuyuno and Dennae Smith PART II OPPORTUNITIES AND REGULATORY CHALLENGES OF AI IN THE BANKING INDUSTRY 5 AI governance frameworks for the banking sector 114 Virginia Torrie and Dominique Payette 6 Machine learning, alternative data, and the regulation of consumer credit markets 142 Nikita Aggarwal 7 AI-based consumer credit underwriting 151 Maayan Perel and Ruth Plato-Shinar PART III OPPORTUNITIES AND REGULATORY CHALLENGES OF AI IN CAPITAL MARKETS 8 The promises and perils of robo-advisers 178 Aurelio Gurrea-Martinez and Wai Yee Wan 9 Regulating AI trading from an AI lifecycle perspective 198 Alessio Azzutti, Wolf-Georg Ringe and H. Siegfried Stiehl PART IV OPPORTUNITIES AND REGULATORY CHALLENGES OF AI IN THE INSURANCE INDUSTRY 10 Opportunities and use cases of AI in the insurance industry 244 Magdalene Loh and Terence Soo 11 Regulation of the use of artificial intelligence for investment in the insurance industry 271 Christopher Chao-hung Chen PART V CROSS-SECTORAL ISSUES ON THE USE OF AI IN THE FINANCIAL SECTOR 12 Regulating artificial intelligence in finance and other regulated industries 294 Douglas W. Arner, Ross P. Buckley, Dirk A. Zetzsche, Brian W. Tang and Lucien J. van Romburg 13 Bias and discrimination in the use of AI in the financial sector 320 Minesh Tanna and William Dunning 14 Interconnectedness and financial stability in the era of artificial intelligence 350 Nydia Remolina Index 368
£123.50
Bloomsbury Publishing PLC Regulating the Synthetic Society
Book SynopsisExperts predict that in 5 years' time, more than 90% of all digital content will be wholly or partially AI generated. In a synthetic society, it may no longer be possible to establish what is real and what is not. Central to this open access book are 4 technologies on the frontline of this trend: humanoid robots, deepfakes, augmented reality, and virtual reality. Although they are only in their relative infancy, these technologies can already produce content that is indistinguishable from authentic material. The impact of this new reality on democracy, the judicial system, the functioning of the press, as well as on personal relationships will be unprecedented. Van der Sloot describes the technological fundaments of each of those technologies and maps their positive uses for educational purposes as well as for the treatment of patients, for the entertainment and creative industries, and the retail and financial sectors. The book also conceptualises their neg
£25.10
Cambridge University Press Unwired
Book SynopsisOur society has a technology problem. Many want to disconnect from screens but can''t help themselves. These days we spend more time online than ever. Some turn to self-help-measures to limit their usage, yet repeatedly fail, while parents feel particularly powerless to help their children. Unwired: Gaining Control over Addictive Technologies shows us a way out. Rather than blaming users, the book shatters the illusion that we autonomously choose how to spend our time online. It shifts the moral responsibility and accountability for solutions to corporations. Drawing lessons from the tobacco and food industries, the book demonstrates why government regulation is necessary to curb technology addiction. It describes a grassroots movement already in action across courts and legislative halls. Groundbreaking and urgent, Unwired provides a blueprint to develop this movement for change, to one that will allow us to finally gain control.Trade Review'Gaia Bernstein's Unwired offers a compelling roadmap for tackling one of our most pressing problems: the irresistible pull of technology. Over the course of our lives, we and our children will spend between fifteen and twenty years glued to our screens. As Bernstein shows, though, there are regulatory remedies at hand to help us retain our time and our wellbeing.' Adam Alter, Professor of Marketing and Psychology, NYU Stern School of Business, author of Irresistible and Drunk Tank Pink'In this important and powerful book, Gaia Bernstein shows us how to reclaim our power and our humanity from the Big Tech cartel that have intentionally addicted us to their devices and platforms.' Nicholas Kardaras, Ph.D., Author of 'Glow Kids' and 'Digital Madness", former Clinical Professor, Stony Brook Medicine'Unwired is a compelling, accessible, and vital intervention into the overuse of technology. Instead of offering overly simplistic self-help strategies that are doomed to fail, Professor Bernstein rightly targets the manipulative design of technologies and the need for us to work together to hold the tech industry accountable. This book vividly blends personal stories with the latest research and lessons from history to paint a clear picture of our struggle with screens and what it's going to take to improve things. Everyone should read this book.' Woodrow Hartzog, Professor of Law at Boston University and author of Privacy's Blueprint: The Battle to Control the Design of New Technologies'Inviting and intelligent, Gaia Bernstein's extraordinary book masterfully combines honest personal reflections about her experiences with the creep of digital tech together with a sobering academic account of our collective public struggles to deal with technologies designed to addict, manipulate, and even control our behavior. Throughout, Bernstein maintains a can-do attitude that inspires change.' Brett Frischmann, The Charles Widger Endowed University Professor in Law, Business and Economics, Villanova University School of Law'Unwired is a powerful rejoinder to voices that would seek to minimize the threat technological manipulation poses to human freedom. But Gaia Bernstein goes beyond a mere accounting of the harms and proposes systemic changes that can help us take back control. Comprehensive in its scope and clear-eyed in its analysis, Unwired is an indispensable guide to the landscape of digital technology reform. Anyone who cares about the future of technology should read this book.' James Williams, author of Stand Out of Our Light'This trenchant clarion call rings loud and clear.' Publishers Weekly'Mixing expertise and passion, the author sets an agenda to rein in the tech behemoths that have run rampant for years.' Kirkus Reviews'Bernstein is shrewd about the political maneuvers and public relations options available to industries challenged for doing harm to the general welfare. At the same time, she shows that imposing some control or countermeasures … has been possible in the past, and might be in the future.' Scott McLemee, Inside Higher Ed'Unwired exists to be used: an agenda for social change through legal action. It is a knife, not a brush. But it'll be of much more than academic value to those of us whose parenting years were overshadowed by feelings of guilt, frustration and anxiety, as we fought our hopeless battles, and lost our children to TikTok and Fortnite.' Simon Ings, New Statesman'Bernstein … doubts that addicted users … can will themselves out of their habits. Instead, she argues, regulatory intervention of the supplying corporations will be necessary.' Harvard Magazine, Off the ShelfTable of ContentsPrologue; Part I. The Price of the Illusion of Control; 1. Becoming the Choice-Makers; 2. Addiction, Our Children, Our Bonds; 3. Invisible Chains; Part II. Who Are the Choice Makers? 4. Clouds of Smoke; 5. The Food Wars; 6. The Privacy Phoenix; 7. Lessons from Battling Titans; Part III. Fighting for Choice; 8. The Art of Redesign; 9. The Tools of Awareness; 10. The Ground is Burning; 11. The Achilles Heel; 12. Acupuncture for Change; Epilogue.
£19.00
Workman Publishing The Genome Defense: Inside the Epic Legal Battle
Book SynopsisIn this riveting, behind-the-scenes courtroom drama, a brilliant legal team battles corporate greed and government overreach for our fundamental right to control our genes. When attorney Chris Hansen learned that the U.S. government was issuing patents for human genes to biotech companies, his first thought was, How can a corporation own what makes us who we are? Then he discovered that women were being charged exorbitant fees to test for hereditary breast and ovarian cancers, tests they desperately needed—all because Myriad Genetics had patented the famous BRCA genes. So he sued them. Jorge L. Contreras, one of the nation’s foremost authorities on human genetics law, has devoted years to investigating the groundbreaking civil rights case known as AMP v. Myriad. In The Genome Defense Contreras gives us the view from inside as Hansen and his team of ACLU lawyers, along with a committed group of activists, scientists, and physicians, take their one-in-a-million case all the way to the U.S. Supreme Court. Contreras interviewed more than a hundred key players involved in all aspects of the case—from judges and policy makers to ethicists and genetic counselors, as well as cancer survivors and those whose lives would be impacted by the decision—expertly weaving together their stories into a fascinating narrative of this pivotal moment in history. The Genome Defense is a powerful and compelling story about how society must balance scientific discovery with corporate profits and the rights of all people.Trade Review“A compelling and thoroughly researched narrative history of a seminal lawsuit.” —The Wall Street Journal “Ably and affectingly detailed . . . This story stands as a guide to the forces that shape an increasingly important industry—and to the vexed influence of patents.” —Nature “The Genome Defense provides an incomparable perspective on a landmark Supreme Court case, and it is a testament to the importance of intellectual property law to humanity’s prosperity.” —Jessica Silbey, author of The Eureka Myth: Creators, Innovators, and Everyday Intellectual Property "Jorge L. Contreras, a law professor at the University of Utah, interviewed nearly 100 lawyers, patients, scientists and policymakers in this behind-the-scenes history of Molecular Pathology vs. Myriad Genetics, a long-shot lawsuit that culminated in a landmark 2013 Supreme Court decision that opened the human genome to the benefit of researchers, cancer patients and everyday Americans." —The New York Times Book Review ("11 New Works of Nonfiction to Read This Season") “Remarkable. Contreras manages to make a book about the lawsuit that ended gene patenting in America read like a thriller. This book will not only inform you and stir your moral outrage, it will keep you on the edge of your seat.”—Ayelet Waldman, author of A Really Good Day “Fascinating . . . Contreras goes behind the scenes with many of the key participants, offering an inside look at the legal strategy and the potential consequences on either side of the final decision.”—Salt Lake City Weekly “Masterfully written.”—Neo.Life “An unflinching critique of the biotech industry's business practices . . . Contreras never presumes that his readers can't keep up, until suddenly a lay reader can likely understand the fundamentals of patent eligibility. That mix makes the book an incredibly accessible and engaging read, which . . . keeps readers from putting it down.” —Law360 “Eye-opening . . . Contreras brings the large cast of case participants to life with vivid prose, and the exciting final spectacle before the Supreme Court is heart-pumping . . . a thorough page-turner.” —Publishers Weekly, starred review “A superb lesson on patents in general and the grotesque American patent system in particular . . . Contreras assembles a large cast of lawyers, judges, activists, scientists, and patients and engagingly describes four years of tortuous legal action that saw victory in federal court, reversal on appeal, and a final triumph in the Supreme Court . . . Fascinating.” —Kirkus Reviews, starred review “A gripping and important tale of how corporations were patenting our own genes and selling them back to us. Contreras give us front-row-seat access, deft character sketches and crystal-clear explanations of law and science.” —Jordan Fisher Smith, author of Engineering Eden “A remarkable, fast-paced read. Contreras tells the behind-the-scenes story of how the Supreme Court stopped the patenting of the human genome. He does it in such an engaging style that it’s almost like reading a legal thriller.” —Professor Mark A. Lemley, Director, Stanford Program in Law, Science, and Technology “Both a page-turner full of colorful characters and a profound commentary about how corporate giants use the law to monopolize knowledge—and what we can do about it.”—Orly Lobel, author of You Don't Own Me: The Court Battles that Exposed Barbie's Dark Side “A compelling and thoroughly researched narrative history of a seminal lawsuit.” —The Wall Street Journal “Ably and affectingly detailed . . . This story stands as a guide to the forces that shape an increasingly important industry—and to the vexed influence of patents.” —Nature “The Genome Defense provides an incomparable perspective on a landmark Supreme Court case, and it is a testament to the importance of intellectual property law to humanity’s prosperity.” —Jessica Silbey, author of The Eureka Myth: Creators, Innovators, and Everyday Intellectual Property "Jorge L. Contreras, a law professor at the University of Utah, interviewed nearly 100 lawyers, patients, scientists and policymakers in this behind-the-scenes history of Molecular Pathology vs. Myriad Genetics, a long-shot lawsuit that culminated in a landmark 2013 Supreme Court decision that opened the human genome to the benefit of researchers, cancer patients and everyday Americans." —The New York Times Book Review ("11 New Works of Nonfiction to Read This Season") "In this engaging legal history, Contreras chronicles how an unlikely lawsuit against private companies that have patented human genes led to a Supreme Court decision to open the human genome to researchers and everyday Americans." —The New York Times Book Review (Paperback Row) “Remarkable. Contreras manages to make a book about the lawsuit that ended gene patenting in America read like a thriller. This book will not only inform you and stir your moral outrage, it will keep you on the edge of your seat.”—Ayelet Waldman, author of A Really Good Day “Fascinating . . . Contreras goes behind the scenes with many of the key participants, offering an inside look at the legal strategy and the potential consequences on either side of the final decision.”—Salt Lake City Weekly “Masterfully written.”—Neo.Life “An unflinching critique of the biotech industry's business practices . . . Contreras never presumes that his readers can't keep up, until suddenly a lay reader can likely understand the fundamentals of patent eligibility. That mix makes the book an incredibly accessible and engaging read, which . . . keeps readers from putting it down.” —Law360 “Eye-opening . . . Contreras brings the large cast of case participants to life with vivid prose, and the exciting final spectacle before the Supreme Court is heart-pumping . . . a thorough page-turner.” —Publishers Weekly, starred review “A superb lesson on patents in general and the grotesque American patent system in particular . . . Contreras assembles a large cast of lawyers, judges, activists, scientists, and patients and engagingly describes four years of tortuous legal action that saw victory in federal court, reversal on appeal, and a final triumph in the Supreme Court . . . Fascinating.” —Kirkus Reviews, starred review “A gripping and important tale of how corporations were patenting our own genes and selling them back to us. Contreras give us front-row-seat access, deft character sketches and crystal-clear explanations of law and science.” —Jordan Fisher Smith, author of Engineering Eden “A remarkable, fast-paced read. Contreras tells the behind-the-scenes story of how the Supreme Court stopped the patenting of the human genome. He does it in such an engaging style that it’s almost like reading a legal thriller.” —Professor Mark A. Lemley, Director, Stanford Program in Law, Science, and Technology “Both a page-turner full of colorful characters and a profound commentary about how corporate giants use the law to monopolize knowledge—and what we can do about it.”—Orly Lobel, author of You Don't Own Me: The Court Battles that Exposed Barbie's Dark Side
£13.29
Elsevier Science Internet Law in China
Book SynopsisTable of ContentsDedication List of cases List of abbreviations Preface Acknowledgments About the author Chapter 1: The Chinese legal system Abstract: The sources of law The court system The legal procedure Finding the law Chapter 2: Regulating the Internet Abstract: Internet basics Legal regulation Administrative licensing Other regulatory issues Chapter 3: Internet speech Abstract: Freedom of speech Risks to national security Threats to social order Damage to reputation Chapter 4: Privacy interests Abstract: Introduction to privacy law Invasion of privacy claims Specific online privacy issues Chapter 5: Proprietary interests Abstract: Copyright Trademarks Patents Appendix: Constitution of the People’s Republic of China Index
£87.50
Elsevier Science Digital Evidence and Computer Crime
Book SynopsisProvides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. This title teaches how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. It includes chapters dedicated to networked Windows, and Unix, and Macintosh computers.Trade Review"Throughout the book there are a number of good case studies used to illustrate points which enlivens the text. There are also details of legal cases from various legislative areas and examples of relevant situations that demonstrate the points being made. There are also a number of references to other literature and links to website URLs and tools available to assist the practitioner." --Best Digital Forensics Book in InfoSecReviews Book Awards "Just finished ‘Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet’ by Eoghan Casey and featuring other contributing authors, and it’s quite good. I bought this book because I wanted an all-encompassing book that provided insight on the various aspects of an investigation, especially the legal portion. And in this aspect the book does an excellent job, and is in-depth in area’s I have yet to see in other books. The book is divided into five portions digital forensics, digital investigations, apprehending offenders, computers and network forensics. For me the book was worth it for the first three portions; however, the computers and network portions, while a good start, there are more in-depth books that provide better insight… Overall, the book was enjoyable from start to finish and I would recommend it to anyone looking for a great overview of digital forensic investigation process from start to finish. I am happy to add this book to my growing reference library." --Student of Security "This hefty book on forensic evidence obtained from computers dispels the myths propagated by popular television series. It states from the premise that very few people are well versed in the technical, evidential, and legal issues concerning digital evidence. Oftentimes, the useful evidence that may be found in various digital media is overlooked, collected incorrectly, or analyzed ineffectively. It is the goal of the team of contributors to equip readers with the necessary knowledge and skills to be able to make use of digital evidence correctly and effectively…. It is quite obvious that the various authors draw from several fields, such as forensic science, computer science, political science, criminal justice, the law, and behavioral analysis; as such, it is multi- and interdisciplinary. More specifically, the authors tackle the specific crimes of cyber bullying, cyber stalking, identity theft, online sex offenders, fraudsters, and cyber threats. There is extensive use of boxed stories, legal cases, practitioner’s tips, tables, the discussion of legislation, flow charts, treaties and journals, as well as figures, diagrams, pictures, and computer screen shots. The book is comparative in nature: it covers not only cyber law in the US, but also case law in the UK, Ireland, and the Netherlands. Given the ubiquity of the computer and the crimes that it can generate, learning about how other nations handle these issues helps in the formation of our own methods for dealing with crimes domestically, as well as those that cross national boundaries." --ACM’s Computing Reviews.com "A better title for Digital Evidence and Computer Crime might be the Comprehensive Guide to Everything You Need to Know About Digital Forensics. One is hard pressed to find another book overflowing with so many valuable details and real-world examples." --Ben Rothke on Slashdot.org (Sept 2011) "The third edition of this comprehensive textbook on forensic science and the Internet is thoroughly updated to reflect the great leaps forward in technology in the six years since the previous printing. The work is divided into five sections covering digital forensics, digital investigations, apprehending offenders, computers and network forensics, and chapters provide practical instruction, case studies and discussions of the theoretical basis for all aspects of digital investigation and the use of computer evidence in forensics and law enforcement. The volume is intended for police, lawyers and forensic analysts and provides a comprehensive look at contemporary methodologies computer crime and crime prevention. Contributors include legal academics as well as computer, networking and forensics professional from around the world." --Book News, Reference & Research "A better title for Digital Evidence and Computer Crime might be the Comprehensive Guide to Everything You Need to Know About Digital Forensics. One is hard pressed to find another book overflowing with so many valuable details and real-world examples. The book is also relevant for those who are new to the field, as it provides a significant amount of introductory material that delivers a broad overview to the core areas of digital forensics. The book progresses to more advanced and cutting-edge topics, including sections on various operating systems, from Windows and Unix to Macintosh. This is the third edition of the book and completely updated and reedited. When it comes to digital forensics, this is the reference guide that all books on the topic will be measured against. With a list price of $70.00, this book is an incredible bargain given the depth and breadth of topics discussed, with each chapter written by an expert in the field. For those truly serious about digital forensics, Digital Evidence and Computer Crime is an equally serious book." --Slashdot.comTable of ContentsPART 1: Digital Forensics 1. Foundations of Digital Forensics 2. Language of Computer Crime Investigation 3. Digital Evidence in the Courtroom 4. Cybercrime Law: A United States Perspective 5. Cybercrime Law: European Perspective PART 2: Digital Investigations 6. Conducting Digital Investigations 7. Handling a Digital Crime Scene 8. Investigative Reconstruction with Digital Evidence 9. Modus Operandi, Motive, and Technology PART 3: Apprehending Offenders 10. Violent Crime and Digital Evidence 11. Digital Evidence as Alibi 12. Sex Offenders on the Internet 13. Investigating Computer Intrusions 14. Cyberstalking PART 4: Computers 15. Computer Basics for Digital Investigators 16. Applying Forensic Science to Computers 17. Forensic Examination of Windows Systems 18. Forensic Examination of UNIX Systems 19. Forensic Examination of Macintosh Systems 20. Forensic Examination of Mobile Devices (online only) PART 5: Network Forensics 21. Network Basics for Digital Investigators 22. Applying Forensic Science to Networks 23. Digital Evidence on the Internet 24. Digital Evidence on Physical and Data-Link Layers 25. Digital Evidence at the Network and Transport Layers
£52.24
Oxford University Press Inc Personal but Not Private Queer Women Sexuality
Book SynopsisInterweaving personal interviews with empirical research, Personal but Not Private examines how queer women mediate their digital identities across Tinder, Vine, and Instagram to form relationships, increase their social and economic participation, and counter intersecting forms of oppression.Trade ReviewDuguay's compelling and original framework of identity modulation brings a critical lens to the everyday creative choices that LGBTQ+ women make as they assert their rights to visibility, safety, and playfulness on digital platforms. Her incisive analyses are supported by careful and generous empirical investigation. This book will be welcomed by undergraduate and postgraduate scholars interested in gender and sexualities, media studies, contemporary queer cultures, and digital intimacies. * Kath Albury, Swinburne University of Technology *Focusing specifically on queer women, Personal but not Private fills an important gap in the literature on LGBTQ+ issues in the media. It expertly addresses the ways technologies facilitate self-making and the complicated relationship queer women have with self-disclosure and social media. Rooted in the lived experiences of her study participants, Duguay offers a timely, lively, and intimate portrait of queer media experiences. * Andre Cavalcante, University of Virginia *Digital platforms can quickly shift from de facto public squares to places for intimate exchange. Duguay's narratively powerful and analytically rigorous book breaks new ground by showing us what this kaleidoscopic jumble of private, public, and self-identity feels like. By drawing on the lived experiences of queer women coming out and connecting online, Personal but Not Private lays out what is at stake when digital platforms further rupture the possibility of crafting a sense of self 'in private.' In doing so, Duguay makes one of the strongest cases yet that determining where and how our personal identities 'travel' is foundational to creating who we are and connecting with others. * Mary L. Gray, Microsoft Research and Indiana University *Personal but not Private is essential reading for anyone invested in discussions at the intersection of technology, gender, and sexuality. Duguay offers a nuanced analysis of the contemporary digital lives of queer women with an approachable and engaging style that belies the depth of research and critical thinking behind this book. * Sharif Mowlabocus, Fordham University *Table of ContentsAcknowledgments Prologue 1. Digital Mediations of Sexual Identity and Personal Disclosure 2. Queering Tinderella: Personal Identifiability in Platform-Generated Identities 3. #Lesbehonest: Reach through Self-Branding 4. Beyond the Gated Community: Salience in Publics and Counterpublics 5. Conclusion: Identity Modulation as Integral to Digital Citizenship Appendix: Methods of the Study
£34.56
Oxford University Press China and Cybersecurity Espionage Strategy and Politics in the Digital Domain
Book SynopsisA comprehensive analysis of China's cyberspace threats and policies, emphasizing the vantage points of China and U.S. on cyber exploitation and the possibilities for more positive coordination.Trade Review"Given the high stakes and enormous gaps between Chinese and American understandings and agendas on cybersecurity, and with the above two chapters as examples, Lindsay and Reveron are certainly justified in concluding that the book "exemplifies" cooperation to improve understanding. It will be worthwhile reading not only for China scholars and cyber-security experts, but also for international relations and communications scholars." --Pacific Affairs "This book's contributors argue that China is not the electronic supervillain it is often thought to be. Despite the regime's hefty investment in digital espionage and cyberwar capabilities, its networks are less secure than those in the United States, the Chinese agencies that make cybersecurity policy are more fragmented than their U.S. counterparts, and the country suffers losses worth close to $1 billion a year because of weak policing of online theft and fraud. China conducts a great deal of industrial espionage, but its enterprises have a hard time filtering and applying the vast amount of data their hackers steal. Looking only at the Chinese side of the relationship, the book does not detail the digital threats that the United States poses to China. But Chinese thinkers believe they are significant, and given China's strategic doctrine of striking first and massively, this creates the risk that in a crisis, Beijing might launch a preemptive cyberattack. The fact that Chinese and Western experts cooperated in this pathbreaking book shows that there is a potential for working together. But there are many obstacles, including the inherent secrecy of the field." -- Foreign Affairs "The US-China relationship is probably the most important in determining the future of cyberspace. Yet despite all the media reporting about Chinese hacking and cyber espionage, we lack a comprehensive picture of what it is China hopes to accomplish in cyberspace and how it copes with its own vulnerability. This is an extremely useful study not only because it brings international relations, intelligence, military, computer science, and China experts together, but also is one of the rare works that includes the contributions of Chinese academics, analysts, and practioners. This book should be read by all who want a greater understanding of China's cybersecurity situation." -- Adam Segal, Maurice R. Greenberg Senior Fellow for China Studies and Director of the Digital and Cyberspace Policy Program, Council on Foreign Relations "The 13 articles by 18 Canadian, US, and Chinese specialists ponder much... Every form of contestation, from crime to espionage, is instantly modernized with the preface cyber... Recommended." -- CHOICETable of ContentsIntroduction ; China and Cybersecurity: Controversy and Context ; Jon R. Lindsay ; I. ESPIONAGE AND CYBERCRIME ; 1. The Chinese Intelligence Services: Evolution and Empowerment in Cyberspace ; Nigel Inkster ; 2. From Exploitation to Innovation: Acquisition, Absorption, and Application ; Jon R. Lindsay and Tai Ming Cheung ; 3. Investigating the Chinese Online Underground Economy ; Zhuge Jianwei, Gu Lion, Duan Haixin, and Taylor Roberts ; II. MILITARY STRATEGY AND INSTITUTIONS ; 4. From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond ; Ye Zheng ; 5. Chinese Writings on Cyber Warfare and Coercion ; Kevin Pollpeter ; 6. The Chinese People's Liberation Army Computer Network Operations Infrastructure ; Mark A. Stokes ; 7. Civil-Military Integration in Cybersecurity: A Study of Chinese Information Warfare Militias ; Robert Sheldon and Joe McReynolds ; III. NATIONAL CYBERSECURITY POLICY ; 8. China's Cybersecurity Situation and the Potential for International Cooperation ; Li Yuxiao and Xu Lu ; 9. Evolving Legal Frameworks for Protecting Internet Privacy in China ; Xu Jinghong ; 10. <"Foreign Hostile Forces>": The Human Rights Dimension of China's Cyber Campaigns ; Sarah McKune ; IV. PRACTICAL AND THEORETICAL IMPLICATIONS ; 11. China and Information Security Threats: Policy Responses in the United States ; Fred H. Cate ; Conclusion ; The Rise of China and the Future of Cybersecurity ; Jon R. Lindsay and Derek S. Reveron ; Index
£42.74
Oxford University Press Online Courts and the Future of Justice
Book SynopsisIn this book Richard Susskind, a pioneer of rethinking law for the digital age confronts the challenges facing our legal system and the potential for technology to bring much needed change. Drawing on years of experience leading the discussion on conceiving and delivering online justice, Susskind here charts and develops the public debate.Trade ReviewIn summary, Susskind's latest book is another extraordinary contribution to justice reform. It is an engaging work that will hopefully spark debate and reform. It is written with a lively tone and provides much food for thought about what our justice systems could look like now and into the future. * Tania Sourdin, University of Newcastle, Australia, Journal of Law and Society *... remains the most necessary and pressing legal text for every court user given the current climate... is not just for those with the power to effect change, it is for every single user who works in our court system... We have been given a miraculous opportunity to make a hundred years-worth of progress in less than a generation. We all have the duty to make this opportunity count, not just to turn up to work, make our money, and go home. Online Courts must be the foundation for all conversations, immediate and long term, about the future of our justice system. * Joseff Morgan, Counsel *Table of ContentsPART ONE - CONTEXT 1: The case for change 2: Advances in technology 3: Thinking strategically 4: Legal theory of courts 5: Physical, virtual, online hearings 6: Access to justice revisited PART TWO - ARCHITECTURE 7: The vision 8: Online guidance 9: Assisted argument 10: Containment 11: Online resolution by judges 12: Civil, criminal, family disputes 13: Case studies PART THREE - THE CASE AGAINST 14: Economy-class justice 15: Adversarial v investigatory 16: Open justice and fair trial 17: Face-to-face justice 18: Digital exclusion 19: Loss of majesty 20: Public sector technology PART FOUR - THE FUTURE 21: Machine learning and prediction 22: Technology-mediated negotiation 23: Artificial intelligence 24: Telepresence, augmented reality and virtual reality 25: The role for human beings Further Reading
£14.12
Oxford University Press Privacy and the Role of International Law in the
Book SynopsisThis book examines the role of international law in securing privacy and data protection in the digital age. Driven mainly by the transnational nature of privacy threats involving private actors as well as States, calls are increasingly made for an international privacy framework to meet these challenges. Mapped against a flurry of global privacy initiatives, the book provides the first comprehensive analysis of the extent to which and whether international law attends to the complexities of upholding digital privacy. The book starts by exploring boundaries of international privacy law in upholding privacy and data protection in the digital ecosystem where threats to privacy are increasingly transnational, sophisticated and privatized. It then explores the potential of global privacy initiatives, namely Internet bills of rights, universalization of regional systems of data privacy protection, and the multi-level privacy discourse at the United Nations, in reimagining the normative contours of international privacy law. Having shown limitations of global privacy initiatives, the book proposes a pragmatic approach that could make international privacy law better-equipped in the digital age.Trade ReviewThis book is a great think piece about drafting international law on digital privacy. * Choice *Table of Contents1: The 'Privacy Problem' in the Digital Age 2: The Reach of Human Rights Law 3: Boundaries of International Data Privacy Law 4: Internet Bills of Rights 5: Emergent Privacy Standards 6: Transnational Privacy Standards 7: Virtues of Soft Legalization 8: Virtues of a Dialogical Approach Summary and Conclusion
£127.50
Oxford University Press Inc Regulating Big Tech
Book SynopsisSelected chapters from this book are published open access and free to read or download from Oxford Scholarship Online, https://oxford.universitypressscholarship.com/.Since Digital Dominance was published in 2018, a global consensus has emerged that technology platforms should be regulated. Governments from the United States to Australia have sought to reduce the power of these platforms and curtail the dominance of a few, yet regulatory responses remain fragmented, with some focused solely on competition while others seek to address issues around harm, privacy, and freedom of expression.Regulating Big Tech condenses the vibrant tech policy debate into a toolkit for the policy maker, legal expert, and academic seeking to address one of the key issues facing democracies today: platform dominance and its impact on society. Contributors explore elements of the toolkit through comprehensive coverage of existing and future policy on data, antitrust, competition, freedom of expression, jurisTrade ReviewSocieties have finally woken up to the threat to democracy posed by the dominance of a small number of tech companies. But to date, the legal and legislative responses to the threat have been disjointed, unimaginative, and in some cases almost incoherent. The shortage of good ideas for bringing digital technology under effective democratic control is palpable and worrying. By assembling a formidable group of thinkers on these questions, Tambini and Moore have not only created the kind of brain trust liberal democracies need at this critical time, but also a primer for policymakers everywhere. * John Naughton, Cambridge University and Observer columnist *The threat to democracy posed by the concentration of power in digital media markets is one of the great challenges of our time. Regulating Big Tech has assembled ideas for change from some of the best thinkers in the world. It is essential reading for anyone wrestling with the topic. * Ben Scott, Executive Director, Reset *Table of ContentsIntroduction Damian Tambini and Martin Moore PART I: Enhancing Competition 1. Reshaping Platform-Driven Digital Markets Mariana Mazzucato, Josh Entsminger, and Rainer Kattel 2. Reforming Competition and Media Law--The German Approach Bernd Holznagel and Sarah Hartmann 3. Overcoming Market Power in Online Video Platforms Eli M. Noam 4. Enabling Community-Owned Platforms--A Proposal for a Tech New Deal Nathan Schneider PART II: Increasing Accountability 5. Obliging Platforms to Accept a Duty of Care Lorna Woods and Will Perrin 6. Minimizing Data-Driven Targeting and Providing a Public Search Alternative Angela Phillips and Eleonora Maria Mazzoli 7. Accelerating Adoption of a Digital Intermediary Tax Elda Brogi and Roberta Maria Carlini PART III: Safeguarding Privacy 8. Treating Dominant Digital Platforms as Public Trustees Philip M. Napoli 9. Establishing Auditing Intermediaries to Verify Platform Data Ben Wagner and Lubos Kuklis 10. Promoting Data for Well-Being While Minimizing Stigma Frank Pasquale Part IV: Protecting Democracy 11. Responding to Disinformation: Ten Recommendations for Regulatory Action and Forbearance Chris Marsden, Ian Brown, and Michael Veale 12. Creating New Electoral Public Spheres Martin Moore 13. Transposing Public Service Media Obligations to Dominant Platforms Jacob Rowbottom PART V: Reforming Governance 14. A Model for Global Governance of Platforms Robert Fay 15. Determining Our Technological and Democratic Future: A Wish List Paul Nemitz and Matthias Pfeffer 16. Reconceptualizing Media Freedom Damian Tambini 17. A New Social Contract for Platforms Victor Pickard Conclusion: Without a Holistic Vision, Democratic Media Reforms May Fail Martin Moore and Damian Tambini
£24.49
Oxford University Press Inc Social Media Freedom of Speech and the Future of
Book SynopsisTrade ReviewThis book is strongly recommended for those interested in the intersection of social media and politics and for instructors looking for readily comprehensible articles for their upper-division courses. * J. McQuiston, CHOICE *In this elegant volume, equally valuable to specialists and lay readers, two lifelong scholars of First Amendment jurisprudence gather an array of experts to explore the problems presented by digital technology and their possible solutions. * Jessica T. Mathews, Foreign Affairs *Lee Bollinger and Geoffrey Stone have done a great public service by assembling this extraordinary group of contributors to think through the risks to democracy posed by social media and the internet. Protecting our constitutional traditions, in the face of seismic technological change, and the unmooring of democratic foundations is one of the greatest challenges of our times. Yet, what emerges from this volume's thoughtfully constructed collection of essays, and the hard choices made by a commission tasked with synthesizing the many perspectives presented here, is invaluable guidance for what must be done now if we are to preserve meaningful public discourse and our democracy. The fact that so many distinguished leaders from government, academia, the tech industry, and journalism devoted their time to this project underscores the urgent need to chart a new course. * Valerie Jarrett, Former Senior Advisor to the President of the United States *I can think of no better introduction to the highly consequential question of regulating speech on social media. Bollinger and Stone have assembled an outstanding array of authors who, with clarity, felicity, and deep knowledge, cover the many facets of this pressing problem. * Robert Post, , Sterling Professor of Law, Yale Law School *Events in recent years have made plain the challenges that social media platforms present to our democracy-harmful speech, divisive speech, misinformation, foreign interference, and more. The First Amendment stands as both an ideal and a potential obstacle in addressing these challenges. Bollinger and Stone have enlisted an extraordinary array of leading experts to tackle these issues from all angles. This volume is invaluable for understanding and charting the future of American democracy. * Jack Goldsmith, Learned Hand Professor of Law, Harvard University *Table of ContentsAcknowledgments List of Contributors Opening Statement Lee C. Bollinger and Geoffrey R. Stone Regulating Harmful Speech on Social Media: The Current Legal Landscape and Policy Proposals Andrew J. Ceresney, Jeffrey P. Cunard, Courtney M. Dankworth, and David A. O'Neil Part One: An Overview of the Problem 1 Social Media and First Amendment Fault Lines David A. Strauss: 2 A Deliberate Leap in the Opposite Direction: The Need to Rethink Free Speech Larry Kramer: 3 The Disinformation Dilemma Emily Bazelon: 4 A Framework for Regulating Falsehoods Cass R. Sunstein: Part Two: Reforming Section 5 The Free Speech Industry Mary Anne Franks: 6 The Golden Era of Free Speech Erwin Chemerinsky and Alex Chemerinsky: 7 Section 230 Reforms Sheldon Whitehouse: Part Three: Content Moderation and the Problem of Algorithms 8 Algorithms, Affordances, and Agency Renée DiResta: 9 The Siren Call of Content Moderation Formalism evelyn douek: 10 Free Speech on Public Platforms Jamal Greene: 11 The Limits of Antidiscrimination Law in the Digital Public Sphere Genevieve Lakier: 12 Platform Power, Online Speech, and the Search for New Constitutional Categories Nathaniel Persily: 13 Strategy and Structure: Understanding Online Disinformation and How Commitments to "Free Speech" Complicate Mitigation Approaches Kate Starbird: Part Four: Other Possible Reforms 14 To Reform Social Media, Reform Informational Capitalism Jack M. Balkin: 15 Follow the Money, Back to Front Yochai Benkler: 16 The First Amendment Does Not Protect Replicants Lawrence Lessig: 17 Social Media, Distrust, and Regulation: A Conversation Newton N. Minow, Nell Minow, Martha Minow, and Mary Minow: 18 Profit Over People: How to Make Big Tech Work for Americans Amy Klobuchar: Report of the Commission Katherine Adams, Martin Baron, Lee C. Bollinger, Hillary Clinton, Jelani Cobb, Russ Feingold, Christina Paxson, Geoffrey R. Stone Concluding Statement Lee C. Bollinger and Geoffrey R. Stone Notes Index
£23.49
Oxford University Press Inc Driverless Finance Fintechs Impact on Financial
Book SynopsisEveryone is talking about fintech, and they''re usually saying good things. Driverless Finance provides a balance to that conversation, exploring the threats that different fintech innovations pose for our financial system. With in-depth and accessible descriptions of new financial technologies and business models - ranging from distributed ledgers to machine learning, cryptoassets to robo-investing - this book allows readers to think more critically about fintech, and about how the law should respond to it.This book highlights the increased speed, complexity, and coordination inherent in new fintech innovations, and illustrates how these features could come together in a massive financial system failure. It makes the case for a precautionary approach to regulating fintech, erring on the side of caution to avoid a financial crisis that could have irreversible and catastrophic effects for our society. Because neither longstanding regulatory approaches nor experimental new approaches like regulatory sandboxes were designed to address fintech''s systemic risks, this book makes several bold new proposals for regulation designed to make fintech-inspired financial crises less likely. These proposals include new forms of disclosure and supervision, new forms of technological tools (known as suptech), and a new licensing regime for financial technologies. This book finishes by situating its discussion of fintech and financial stability in the context of important debates about innovation, expertise, cybersecurity, privacy, competition, and other pressing issues.Table of ContentsPrologue Introduction Part I: The Case for Precaution Chapter 1: The Case for Precaution Part II: Fintech Threats to Financial Stability Chapter 2: Fintech and Risk Management Chapter 3: Fintech and Capital Intermediation Chapter 4: Fintech and Payments Part III: Regulating Fintech and Financial Stability Chapter 5: Current Approaches to Fintech and Financial Stability Regulation Chapter 6: Precautionary Regulation of Fintech Innovation Chapter 7: The Bigger Picture Conclusion
£51.00
Oxford University Press Inc Help
Book SynopsisLike many other areas of life, humanitarian practice and thinking are being transformed by information and communications technology. Despite this, the growing digitization of humanitarianism has been a relatively unnoticed dimension of global order. Based on more than seven years of data collection and interdisciplinary research, #Help presents a ground-breaking study of digital humanitarianism and its ramifications for international law and politics.Global problems and policies are being reconfigured, regulated, and addressed through digital interfaces developed for humanitarian ends. #Help analyses how populations, maps, and emergencies take shape on the global plane when given digital form and explores the reorientation of nation states'' priorities and practices of governing around digital data collection imperatives. This book also illuminates how the growing prominence of digital interfaces in international humanitarian work is sustained and shaped by law and policy.#Help revealTrade ReviewWhat happens when the objectives, beneficiaries, and participants of humanitarian activism are framed by digital technologies? When the door to humanitarian relief is opened or closed by algorithms? #Help lays out the distributive effects of recourse to digital interfaces by humanitarian actors: the re-ordering of powers and vulnerabilities between human groups, the routinization of emergencies, and the redirection of political action. This is a hugely interesting, politically relevant, and altogether new analysis of the transformations of the humanitarian imaginary resulting from its integration in the global digital revolution. * Martti Koskenniemi, Emeritus Professor of International Law at the University of Helsinki and Director of the Erik Castrén Institute of International Law and Human Rights *How does the diffusion of digital interfaces transform the practice, philosophy, and politics of humanitarian work? This essential and richly documented book discusses the normalization of binary thinking and datafication, the rise of new actionable objects and relations, and shifting temporalities and governance models. #Help offers an invaluable perspective that challenges what we thought we knew about how people today ask for help, and how others respond. * Marion Fourcade, Professor of Sociology and Director of Social Science Matrix at the University of California, Berkeley *Philosophically grounded, historically rich, and analytically sharp, this book brings much needed clarity to the complex field of digital humanitarianism. Johns shows how humanitarianism is changing in relation to computational practices, and why this matters for law and politics on a global scale. * Kate Crawford, Research Professor at USC Annenberg and Senior Principal Researcher at MSR New York *As humanitarianism has become a global language meant to represent and alleviate the suffering of the world, Fleur Johns critically explores its latest avatar: digital humanitarianism. Through fascinating case studies of recent tools claiming to characterize populations, map needs, and organize responses, #Help offers an original, rigorous and much-needed analysis of the ambiguous promise of this technological turn in the politics of compassion. * Didier Fassin, Professor at the Collège de France and the Institute for Advanced Study *Johns's work helps us appreciate those transformations with incisive theoretical exploration. * Wendy H. Wong, The American Journal Of International Law *#Help: Digital Humanitarianism and the Remaking of International Order is a characteristically rich, intricate, thoughtful and insightful intervention from one of international lawâs most consistently enlightening contemporary scholars, Fleur Johns. It is a thoroughly enjoyable read and, on its face, a succinct descriptive account, infused throughout with sharp analytical observation,...A good analogy is, perhaps, bindweed: global digital bindweed. * Stephen Humphreys, London Review of International Law *The book is interspersed with 'prospects for doing otherwise',...It is a crucial contribution of the book that it hones its analytical apparatus to pay attention to dissensus and divergence and to keep questions of digital humanitarian futures open. * Claudia Aradau, London Review of International Law *The theoretical offerings of the book can be mobilised and adapted in research attuned to the modes of freedom and safety people create collectively among themselves and against social sorting, detention, violence, policing and its technologies. * Margie Cheesman, London Review of International Law *Table of ContentsChapter 1: Interfaces: New media of humanitarian relation Chapter 2: Maps: Historical snapshots and digital rewriting Chapter 3: Populations: From statistics to data science Chapter 4: Emergencies: Waiting and watching in the palliative present Chapter 5: States: Analogue and digital Chapter 6: Law and policy: Infrastructures of interface Chapter 7: Uses: Using, disusing and misusing digital humanitarian interfaces
£84.91
Oxford University Press Cloud Computing Law
Book SynopsisCloud computing continues to expand dramatically and the ''as a Service'' model is now both mainstream and ubiquitous. Cloud now encompasses everything from the remote provision of essential computer processing and storage resources, through to delivery of complex business and government services, logistics, healthcare, education, and entertainment. The Covid-19 pandemic provided a striking demonstration of cloud computing''s global scalability and resilience, as billions of workers and students switched in a matter of weeks to working and studying ''from home''. This book delivers an accessible analysis of the key legal and regulatory issues that surround cloud computing. Topics covered include contracts for cloud services, information ownership and licensing, privacy and data protection, standards and competition law, law enforcement access to data, and international tax models for cloud and other digital services. The book is organised in four parts. Part I explains what cloud computing is, why it matters, and what non-technical readers need to know about how it works. Part II includes a detailed review of standard contracts for 40 cloud services and highlights key legal and commercial issues that arise in negotiated transactions for cloud services. Ownership of, and access to, ''digital assets'' are also explored. Part III focusses on the application of data protection and cybersecurity rules, including an in-depth assessment of the impact of the EU''s General Data Protection Regulation (GDPR) on providers and users of cloud services. Finally, Part IV addresses governance issues relating to public sector use of cloud, access to cloud data by law enforcement authorities, competition rules and standards, and the disruption to global taxation models caused by the rapid shift to cloud services.Trade ReviewCloud Computing Law is the most comprehensive book I have come across on cloud law, well worth its price. * Darren Grayson Chng, Law Gazette *Table of ContentsPart 1 1: W Kuan Hon, Christopher Millard, and Jatinder Singh: Cloud Technologies and Services 2: W Kuan Hon, Christopher Millard, and Jatinder Singh: Control, Security, and Risk in the Cloud Part 2 3: Johan David Michels, Christopher Millard, and Felicity Turton: Standard Contracts for Cloud Services 4: W Kuan Hon, Christopher Millard, Ian Walden, and Conor Ward: Negotiated Contracts for Cloud Services 5: Chris Reed: Information Ownership in the Cloud 6: Johan David Michels and Christopher Millard: Digital Assets in Clouds Part 3 7: Chris Reed and Laura Edgar: Consumer Protection in the Cloud 8: Dimitra Kamarinou, Christopher Millard and Felicity Turton: Protection of Personal Data in Clouds and Rights of Individuals 9: Dimitra Kamarinou, Christopher Millard, and Felicity Turton: Responsibilities of Controllers and Processors of Personal Data in Clouds 10: Ulrich Wuermeling and Isabella Oldani: Regulation of International Data Transfers in Clouds Part 4 11: Johan David Michels and Ian Walden: Cybersecurity, Cloud, and Critical Infrastructure 12: Niamh Gleeson and Ian Walden: Placing the State in the Cloud: Issues of Data Governance and Public Procurement 13: Ian Walden: Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent 14: Niamh Gleeson and Ian Walden: Facilitating Competition in the Cloud 15: Niamh Gleeson and Ian Walden: Cloud Computing, Standards, and the Law 16: Vasiliki Koukoulioti and Chris Reed: International Tax Implications of Cloud Computing
£42.74
Oxford University Press Defences to Copyright Infringement Creativity
Book SynopsisThis volume analyses how available copyright defences accommodate modern uses of copyright works, and how EU copyright defences might be framed to promote creativity, technological innovation, and the development of new services and business models on the internet.Trade ReviewPractitioners and scholars of intellectual property law, and in particular those studying the nuances of copyright law, need look no further than Professor Stavroula Karapapa's Defences to Copyright Infringement for an in-depth and unique insight into the world of copyright defences. * Jennifer Graham, Liverpool John Moores University, Liverpool, UK, International Journal of Law and Information Technology *exceedingly well-organized and laid out ... this book will likely prove to be a useful guide for policymakers seeking to update European copyright law so that it can keep pace with technological change. * Michael A. Crystal, Commonwealth Law Bulletin *exceedingly well-organized and laid out ... this book will likely prove to be a useful guide for policymakers seeking to update European copyright law so that it can keep pace with technological change. * Michael A. Crystal, Commonwealth Law Bulletin *this book remains relevant, offering the reader with a spherical and realistic break-down of the adaptability of copyright law to technological change, through the exploration of EU copyright defences, while determining how well those sit within the current copyright framework. * Ioanna Lapatoura, European Intellectual Proprety Review *Table of Contents1: Introduction A. Denials of the elements of infringement 2: Subsistence negating claims 3: Scope limitations 4: Transient and incidental copying 5: Implicitly authorized uses B. Rationale-based defences to infringement 6: Speech entitlements 7: Public policy privileges 8: Remunerated exceptions 9: External defences 10: Conclusion
£120.00
Oxford University Press Information Technology Law
Book SynopsisInformation technology affects all aspects of modern life. From the information shared on social media such as Facebook, Twitter, and Instagram to online shopping and mobile devices, it is rare that a person is not touched by some form of IT every day.Information Technology Law examines the legal dimensions of these everyday interactions with technology and the impact on privacy and data protection, as well as their relationship to other areas of substantive law, including intellectual property and criminal proceedings. Focusing primarily on developments within the UK and EU, this book provides a broad-ranging introduction and analysis of the increasingly complex relationship between the law and IT.Information Technology Law is essential reading for students of IT law and also appropriate for business and management students, as well as IT and legal professionals.Digital formats and resourcesThis edition is available for students and institutions to purchase in a variety of formats, and is supported by online resources.- The e-book offers a mobile experience and convenient access along with functionality tools, navigation features, and links that offer extra learning support: www.oxfordtextbooks.co.uk/ebooks- The online resources include a catalogue of web links to key readings and updates to the law since publication.Trade ReviewReview from previous edition It's a leading book on Information Technology Law offering a detailed account and authoritative insights on fascinating topical issues in easily accessible narrative * Dr Mark Leiser, University of Leiden *Table of ContentsPrivacy, Anonymity, and Data Protection 1: The dead of privacy and the growth of surveillance 2: The emergence of data protection 3: The scope of data protection 4: Supervisory agencies 5: The data protection principles 6: Individual rights and remedies 7: Sectoral aspects of data protection 8: Transborder data flows Part II - Computer-Related Crime 9: National and international responses to computer-related crime 10: Substantive criminal law provisions 11: Virtual criminality 12: Detecting and prosecuting computer crime Part III - Intellectual Property Issues 13: The emergence and forms of intellectual property law 14: Key elements of the patent system 15: Software patents 16: Copyright protection 17: Enforcement issues 18: Protection of databases 19: Design rights 20: Trademark issues 21: Internet domain names Part IV - E-Commerce 22: International and european initiatives in e-commerce 23: Electronic money 24: Contractual issues
£50.34
Oxford University Press Online Courts and the Future of Justice
Book SynopsisOur court system is struggling. It is too costly to deliver justice for all but the few, too slow to satisfy those who can access it. Yet the values implicit in disputes being resolved in person, and in public, are fundamental to how we have imagined the fair resolution of disputes for centuries. Could justice be delivered online? The idea has excited and appalled in equal measure, promising to bring justice to all, threatening to strike at the heart of what we mean by justice. With online courts now moving from idea to reality, we are looking at the most fundamental change to our justice system for centuries, but the public understanding of and debate about the revolution is only just beginning.In Online Courts and the Future of Justice Richard Susskind, a pioneer of rethinking law for the digital age, confronts the challenges facing our legal system and the potential for technology to bring much needed change. Drawing on years of experience leading the discussion on conceiving and delivering online justice, Susskind here charts and develops the public debate.Against a background of austerity politics and cuts to legal aid, the public case for online courts has too often been framed as a business case by both sides of the debate. Are online courts preserving the public bottom line by finding efficiencies? Or sacrificing the interests of the many to deliver cut price justice? Susskind broadens the debate by making the moral case (whether online courts are required by principles of justice) and the jurisprudential case (whether online courts are compatible with our understanding of judicial process and constitutional rights) for delivering justice online.Trade ReviewIn summary, Susskind's latest book is another extraordinary contribution to justice reform. It is an engaging work that will hopefully spark debate and reform. It is written with a lively tone and provides much food for thought about what our justice systems could look like now and into the future. * Tania Sourdin, University of Newcastle, Australia, Journal of Law and Society *Table of ContentsPART ONE - CONTEXT 1: The case for change 2: Advances in technology 3: Thinking strategically 4: Legal theory of courts 5: Physical, virtual, online hearings 6: Access to justice revisited PART TWO - ARCHITECTURE 7: The vision 8: Online guidance 9: Assisted argument 10: Containment 11: Online resolution by judges 12: Civil, criminal, family disputes 13: Case studies PART THREE - THE CASE AGAINST 14: Economy-class justice 15: Adversarial v investigatory 16: Open justice and fair trial 17: Face-to-face justice 18: Digital exclusion 19: Loss of majesty 20: Public sector technology PART FOUR - THE FUTURE 21: Machine learning and prediction 22: Technology-mediated negotiation 23: Artificial intelligence 24: Telepresence, augmented reality and virtual reality 25: The role for human beings Further Reading
£24.69
Oxford University Press Regulating Blockchain C
Book SynopsisLess than a decade after the Financial Crisis, we are witnessing the fast emergence of a new financial order driven by three different, yet interconnected, dynamics: first, the rapid application of technology - such as big data, machine learning, and distributed computing - to banking, lending, and investing, in particular with the emergence of virtual currencies and digital finance; second, a disintermediation fuelled by the rise of peer-to-peer lending platforms and crowd investment which challenge the traditional banking model and may, over time, lead to a transformation of the way both retail and corporate customers bank; and, third, a tendency of de-bureaucratisation under which new platforms and technologies challenge established organisational patterns that regulate finance and manage the money supply.These changes are to a significant degree driven by the development of blockchain technology. The aim of this book is to understand the technological and business potential of the Trade ReviewThe book provides an excellent survey of the legal implications of blockchain, and of the legal challenges FinTech entrepreneurs are facing when they want to develop blockchain applications. It shows that blockchain clearly is not the answer to everything, but that it can make a difference in many aspects of FinTech and beyond. * Dr. Robert Kilian, General Counsel and Chief Representative, N26 Group *Regulating Blockchain is an impressively rich and interdisciplinary collection of essays on all aspects of blockchain development, including cryptocurrencies and other forms of decentralized financial technology. Essential reading for anyone interested in the interaction of law and technology in the financial sector and the possible futures of money, banking, and credit in a globalizing world. * David Singh Grewal, Professor of Law, University of California, Berkeley. Author of 'Network Power: The Social Dynamics of Globalization' *Table of ContentsPhilipp Hacker, Ioannis Lianos, Georgios Dimitropoulos and Stefan Eich: Regulating Blockchain: Techno-Social and Legal Challenges - An Introduction Part I: Technological and Business Challenges of Blockchain Technology 1: Paolo Tasca and Riccardo Piselli: The Blockchain Paradox 2: Aaron Wright and Jonathan Rohr: Blockchains, Private Ordering and The Future of Governance 3: Angela Walch: In Code(rs) We Trust: Software Developers as Fiduciaries in Public Blockchains Part II: Blockchain and the Future of Money 4: Stefan Eich: Old Utopias, New Tax Havens: The Politics of Bitcoin in Historical Perspective 5: Claus D. Zimmermann: Monetary Policy in the Digital Age 6: Georgios Dimitropoulos: Global Currencies and Domestic Regulation: Embedding through Enabling? 7: Philipp Hacker: Corporate Governance for Complex Cryptocurrencies? A Framework for Stability and Decision Making in Blockchain-Based Organizations Part III: Blockchain and the Future of Banking, Finance, Insurance and Securities Regulation 8: Rohan Grey: Banking in a Digital Fiat Currency Regime 9: Jonathan Greenacre: Regulating the Shadow Payment System: Bitcoin, Mobile Money and Beyond 10: Michael Abramowicz: Blockchain-Based Insurance 11: Alexandros Seretakis: Blockchain, Securities Markets and Central Banking 12: Philipp Hacker and Chris Thomale: The Crypto-Security: Initial Coin Offerings and EU Securities Regulation 13: Houman Shadab: Regulation of Blockchain Token Sales in the United States Part IV: Beyond Finance: Blockchain as a legal and regulatory challenge 14: Agnieszka Janczuk-Gorywoda: Blockchain and Payment Systems: A Tale about Re-Intermediation 15: Florian Möslein: Conflicts of Laws and Codes: Defining the Boundaries of Digital Jurisdictions 16: Pietro Ortolani: The Judicialisation of Blockchain 17: Roger Brownsword: Smart Contracts: Coding the Transaction, Decoding the Legal Debates Part V: Connecting the Dots: Competitive Advantage and Regulation in the Era of Blockchain 18: Ioannis Lianos: Blockchain Competition. Gaining Competitive Advantage in the Digital Economy: Competition Law Implications
£112.50
Oxford University Press Law for Computer Scientists and Other Folk
Book SynopsisThis is the first textbook introducing law to computer scientists. The book covers privacy and data protection law, cybercrime, intellectual property, private law liability and legal personhood and legal agency, next to introductions to private law, public law, criminal law and international and supranational law. It provides an overview of the practical implications of law, their theoretical underpinnings and how they affect the study and construction of computational architectures. In a constitutional democracy everyone is under the Rule of Law, including those who develop code and systems, and those who put applications on the market. It is pivotal that computer scientists and developers get to know what law and the Rule of Law require. Before talking about ethics, we need to make sure that the checks and balances of law and the Rule of Law are in place and complied with. Though it is focused on European law, it also refers to US law and aims to provide insights into what makes law, law, rather than brute force or morality, demonstrating the operations of law in a way that has global relevance. This book is geared to those who have no wish to become lawyers but are nevertheless forced to consider the salience of legal rights and obligations with regard to the construction, maintenance and protection of computational artefacts.This is an open access title available under the terms of a CC BY-NC-ND 4.0 International licence. It is offered as a free PDF download from OUP and selected open access locations.Trade ReviewIt provides an overview of the practical implications of law, their theoretical underpinnings and how they affect the study and construction of computational architectures. * H. W. Micklitz, Journal of Consumer Policy *Table of ContentsAcknowledgements Reading Guide Abbreviations Table of Contents 1: Introduction: Textbook and Essay 1.1: Middle ground: architecture 1.2: Law in 'speakerspace' 1.3: Law in 'manuscriptspace' 1.4: Law in 'bookspace' 1.5: Law in cyberspace: a new 'onlife world' 1.6: Outline PART I WHAT LAW DOES 2: Law, Democracy, and the Rule of Law 2.1: What is Law? 2.2: What is law in a constitutional democracy? 3: Domains of Law: Private, Public, and Criminal Law 3.1: Private, public and criminal law: conceptual distinctions 3.2: Private law 3.3: Public law and criminal law 4: International and Supranational Law 4.1: Jurisdiction in Western legal systems 4.2: International law 4.3: Supranational law 4.4: International rule of law PART II DOMAINS OF CYBERLAW 5: Privacy and Data Protection 5.1: Human rights law 5.2: The concept of privacy 5.3: The right to privacy 5.4: Privacy and Data Protection 5.5: Data protection law 5.6: Privacy and data protection revisited 6: Cybercrime 6.1: The problem of cybercrime 6.2: Cybercrime and public law 6.3: The EU cybercrime and cybersecurity directives 7: Copyright in Cyberspace 7.1: IP law as private law 7.2: Overview of IP rights 7.3: History, objectives and scope of copyright protection 7.4: EU copyright law 7.5: Open source and free access 8: Private Law Liability for Faulty ICT 8.1: Back to basics 8.2: Tort law in Europe 8.3: Third-party liability for unlawful processing and other cyber torts PART III FRONTIERS OF LAW IN AN ONLIFE WORLD 9: Legal Personhood for AI? 9.1: Legal subjectivity 9.2: Legal agency 9.3: Artificial agents 9.4: Private law liability 10: 'Legal by Design' or 'Legal Protection by Design'? 10.1: Machine learning (ML) 10.2: Distributed Ledger Technologies (DLTs), smart contracts and smart regulation 10.3: 'Legal by Design' or 'Legal Protection by Design'? FINALS 11: Closure: on ethics, code and law 11.1: Distinctions between law, code and ethics 11.2: The conceptual relationship between law, code and ethics 11.3: The interaction between law, code and ethics 11.4: Closure: the force of technology and the force of law
£55.28
Yale University Press Fiber
Book SynopsisAn illuminating vision of the next information revolution, centered on fiber optic infrastructureTrade Review“A timely and urgent look at how America is sacrificing its digital future, productivity, connectivity, social mobility, entrepreneurial growth, education, and every other public good, thanks to rapacious telcos, scumbag lobbyists, and negligent, cash-hungry politicians. . . . You should be reading this.”—Cory Doctorow, Boing Boing“I thoroughly enjoyed this volume from start to finish and recommend it as an excellent addition to any bookshelf.” —Courteney J. O’Connor, LSE Review of Books “If we can just finish the last mile for fiber to reach into households, Susan Crawford shows, we can unleash a revolution of economic growth, education, and health, and address inequality in a whole new way. Crawford shifts effortlessly from the heights of policy to the literal ground level and shows us the way.”—Anthony Marx, President, New York Public Library "By vividly describing a world filled with fiber-enabled technology as well as the perils and possibilities for achieving it, Susan Crawford has written a playbook for a fairer and more prosperous United States."—Andy Berke, Mayor, Chattanooga, Tennessee“Engaging and accessible … An indictment of national regulatory politics and crony capitalism and a love story about the plucky local governments overcoming the odds to bring their own communities into the twenty-first century. A microcosm of what ails America—and what nonetheless can give us hope.”—Yochai Benkler, Harvard Law School
£16.14
Taylor & Francis Ltd (Sales) Young People Social Media and the Law
Book SynopsisThis book critically confronts perceptions that social media has become a âwastelandâ for young people. Law has become preoccupied with privacy, intellectual property, defamation and criminal behaviour in and through social media. In the case of children and youth, this book argues, these preoccupations â whilst important â have disguised and distracted public debate away from a much broader, and more positive, consideration of the nature of social media. In particular, the legal tendency to consider social media as âdangerousâ for young people â to focus exclusively on the need to protect and control their online presence and privacy, whilst tending to suspect, or to criminalise, their use of it â has obscured the potential of social media to help young people to participate more fully as citizens in society. Drawing on sociological work on the construction of childhood, and engaging a wide range of national and international legal material, this book argues that social media may yet offer the possibility of an entirely different â and more progressive âconceptualisation of children and youth.Table of Contents1. Moral panics, childhood, social media and the law 2. Recreating families in social media 3. Social media, young people and political accountability 4. Schools, young people and social media: surveillance and the role model void 5. Working in the online society: social media and young people in new workplace 6. Crime, Identity and Gender: how social media opens new worlds of hope and exploitation 7. ‘Don’t mention the porn’: social media and the rise of the sexual child 8. The New Wasteland: Law, Many Publics and the Loss of Interest
£39.99
Taylor & Francis Routledge Handbook of Financial Technology and
Book SynopsisFinancial technology is rapidly changing and shaping financial services and markets. These changes are considered making the future of finance a digital one.This Handbook analyses developments in the financial services, products and markets that are being reshaped by technologically driven changes with a view to their policy, regulatory, supervisory and other legal implications. The Handbook aims to illustrate the crucial role the law has to play in tackling the revolutionary developments in the financial sector by offering a framework of legally enforceable principles and values in which such innovations might take place without threatening the acquis of financial markets law and more generally the rule of law and basic human rights.With contributions from international leading experts, topics will include: Policy, High-level Principles, Trends and Perspectives Fintech and Lending Fintech and Payment Services Fintech, Investment and InTable of ContentsPart I Policy, High-level Principles, Trends and Perspectives 1. Artificial Intelligence and Machine Learning in the Financial Sector – Legal-Methodological Challenges of Steering towards a Regulatory ‘Whitebox’ 2. Smart Contracts and Civil Law Challenges: Does Legal Origins Theory Apply? 3. Fintech and the Limits of Financial Regulation: A Systemic Perspective 4. A Regulatory Roadmap for Financial Innovation 5. FinTech and The Law & Economics of Disintermediation 6. Financial Technologies and Systemic Risk – Some General Economic Observations Part II Fintech and Lending 7. Fintech Credit Firms: Prospects and Uncertainties 8. Fintech Credit and Consumer Financial Protection Part III Fintech and Payment Services 9. EU Payment Services Regulation and International Developments 10. Current and Future Liability Concepts in European Financial Market Regulation Part IV Fintech, Investment and Insurance Services 11. Robo Advice: Legal and Regulatory Challenges 12. Insurance and the Legal Challenges of Automated Decisions - an EU Perspective 13. Exchange-traded funds (ETFs) and FinTech: Market Efficiency and Systemic Risk Part V Fintech, Financial Inclusion and Sustainable Finance 14. FinTech, Financial Inclusion and the UN Sustainable Development Goals 15. Digital Transformation and Financial Inclusion 16. Disintermediation in Fund-raising: Marketplace Investing Platforms and EU Financial Regulation Part VI Cryptocurrencies and Cryptoassets 17. Cryptoassets in Private Law 18. Cryptocurrencies: Development and Perspectives 19. Distributed Ledger Technology and Sovereign Financing 20. Law and Regulation for a Crypto-Market: Perpetuation or Innovation? Part VII Markets and Trading 21. High-Frequency Trading: Regulatory and Supervisory Challenges in the Pursuit of Orderly Markets 22. ‘Trustless’ Distributed Ledgers and Custodial Services Part VIII Regtech and Suptech 23. "Computer Says No": Benefits and Challenges of RegTech 24. Fintech, Regtech and Suptech: Institutional Challenges to the Supervisory Architecture of the Financial Markets
£37.99
WW Norton & Co The Fight for Privacy Protecting Dignity
Book SynopsisAn internationally recognised legal expert provides a road map for understanding—and defending—privacy in the twenty-first centuryTrade Review"When your wristwatch monitors your location and your health status and your window-shopping and purchases generate information sold and combined with other information about you, the accumulation of ‘little assents’ produces constant surveillance, risks of manipulation, and the elimination of privacy. Danielle Keats Citron’s expert and engaging treatment of ‘technology-enabled privacy violations’ shows why victims, digital platforms, and legislators alike turn to her for advice and for fights to reclaim privacy morally, legally, and practically." -- Martha Minow, former Dean, Harvard Law School
£21.59
University of California Press Why Hackers Win Power and Disruption in the
Book Synopsis
£21.25
Harvard University Press PrivacyS Blueprint
Book SynopsisWoodrow Hartzog develops the underpinning of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. Rather than permit exploitation, it would demand encryption, prohibit malicious interfaces that deceive users and leave them vulnerable, and require safeguards against abuses of biometric surveillance.Trade Review[A] smart new book… [W]ill repay the attention of designers, privacy professionals, and anyone who wants to learn how design guided by strengthened laws and regulations might help us emerge from today’s swirl of privacy problems. -- James Barszcz * The Privacy Advisor (International Association of Privacy Professionals website) *Deceptive design nudges, tricks, and goads you into sharing more than you might intend to online, Hartzog argues in his new book… And when you think you’re in control of your own data, you rarely are. -- Ariel Bogle * ABC News (Australia) *Privacy’s Blueprint is a real tour de force, introducing a rigorous structure for multiple dimensions of privacy protections. -- Frank Pasquale, author of The Black Box Society: The Secret Algorithms That Control Money and InformationFilled with fascinating examples and written in a lively and accessible way, Privacy’s Blueprint is the definitive chronicle of Privacy by Design. This is one of the most important books about privacy in our times. -- Daniel J. Solove, author of Understanding PrivacyA bold and innovative privacy agenda and a beautifully written book. Hartzog demonstrates how and why privacy design is about power and politics. -- Paul M. Schwartz, author of Information Privacy LawWith deep insight, passion, and humor, Woodrow Hartzog demands that we see what has been in front us all along yet never meaningfully reckoned with. As Hartzog makes clear, we can design apps, social media, and networked clothing (underwear!) with privacy in mind but we need a plan and this book provides it in spades. This is a defining book for our information age and a must read. -- Danielle Keats Citron, author of Hate Crimes in Cyberspace
£28.86
Harvard University Press Industry of Anonymity
Book SynopsisJonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.Trade ReviewIndustry of Anonymity is an accessible and important work on the organization of cybercrime. No other study provides the depth, breadth, and rigor on this difficult-to-reach community. -- David Skarbek, Brown UniversityWith convincing and compelling arguments, impressive empirical work, balanced explanations, and effective writing, Industry of Anonymity is a remarkable contribution to the literature on cybercrime. Criminology and sociology audiences have been waiting for this kind of book. -- Benoît Dupont, University of MontrealIndustry of Anonymity is without doubt the best exploration of the evolution of cybercrime today. Even as someone who has worked in this field for over a decade, I found new insights in every chapter. An absolute must read for any cybercrime investigator. -- Robert McArdle, Trend Micro Forward-Looking Threat Research TeamBased on more than two hundred interviews and numerous field trips to the world's cybercrime hotspots, this is a masterful account of how cybercrime has matured into a large, profit-driven industry. Offering a wealth of data on the informal arrangements that underpin cooperation among anonymous criminals, Lusthaus puts a face to people who normally hide in the shadows. Industry of Anonymity will be the standard reference for years to come. -- Federico Varese, author of Mafia LifeA timely contribution to a classic sociological problem: the one of social order, expressed in the chance of trusted relationships, cooperation, and governance…A substantial contribution to this conversation in a field that is anything but easy to investigate. -- Matías Dewey * American Journal of Sociology *
£28.86
Princeton University Press Delete
Book SynopsisLooks at the phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget. This title traces the important role that forgetting has played throughout human history, from the ability to make sound decisions unencumbered by the past to the possibility of second chances.Trade ReviewWinner of the 2010 Marshall McLuhan Award for Outstanding Book in Media ecology, Media Ecology Association Winner of the 2010 Don K. Price Award, Science, Technology, and Environmental Politics Section of the American Political Science Association "Mayer-Schonberger deserves to be applauded and Delete deserves to be read for making us aware of the timelessness of what we created and for getting us to consider what endless accumulation might portend."--Paul Duguid, Times Literary Supplement "In Delete, Viktor Mayer-Schonberger argues that we should be less troubled by the fleetingness of our digital records than by the way they can linger."--Adam Keiper, Wall Street Journal "Mayer-Schonberger raises questions about the power of technology and how it affects our interpretation of time... He draws on a rich body of contemporary psychological theory to argue that both individuals and societies are obliged to rewrite or eliminate elements of the past that would render action in the present impossible."--Fred Turner, Nature "There is no better source for fostering an informed debate on this issue."--Science "A fascinating book."--Clive Thompson, WIRED Magazine "As its title suggests, Delete is about forgetting, more specifically about the demise of forgetting and the resulting perils... [Mayer-Schonberger] comes up with an interesting solution: expiration dates in electronic files. This would stop the files from existing forever and flooding us and the next generations with gigantic piles of mostly useless or even potentially harmful details. This proposal should not be forgotten as we navigate between the urge to record and immortalise our lives and the need to stay productive and sane."--Yadin Dudai, New Scientist "Delete is a useful recap of the various methods that are--or could be--applied to dealing with the consequences of information abundance. It also adds a thought-provoking new twist to the literature."--Richard Waters, Financial Times "Unlike so many books about the internet, which like to hit the panic button then run, Mayer-Schonberger stays around to offer a solution... Mayer-Schonberger deserves to be applauded and Delete deserves to be read for making us aware of the timelessness of what we create and for getting us to consider what endless accumulation might portend."--Paul Duguid, Times Higher Education "This book ... is laid out like an invitation to such a sparring session. There you find the detailed arguments, spread out one by one. Get ready to highlight where you agree, note contradictions and arguments not carried through to their consequential end, and make annotations where you feel a new punch. The session will be worth the effort."--Herbert Burkert, Cyberlaw "A lively, accessible argument ... that all that stored and shared data is a serious threat to life as we know it."--Jim Willse, Newark Star Ledger "A fascinating work of social and technological criticism... The book explores the ways various technologies has altered the human relationship with memory, shifting us from a society where the default was to forget (and consequently forgive) to one where it is impossible to avoid the ramifications of a permanent record."--Philip Martin, Arkansas Democrat Gazette "Mayer-Schonberger convincingly claims that our new status quo, the impossibility of forgetting, is severely misaligned to how the human brain works, and to how individuals and societies function... Can anything be done? Delete is an accessible, thoughtful and alarming attempt to start debate."--Karlin Lillington, Irish Times "To argue for more forgetting is counter-intuitive to those who value information, history and transparency, but the writer pursues it systematically and thoroughly."--Richard Thwaites, Canberra Times "Surprising and fascinating... Delete opens a highly useful debate."--Robert Fulford, National Post "Delete offers many scary examples of how the control of personal information stored in e-memory can fall into the wrong hands... Lucid, eminently readable."--Winifred Gallagher, Globe and Mail "Delete is one of a number of smart recent books that gently and eruditely warn us of the rising costs and risks of mindlessly diving into new digital environments--without, however, raising apocalyptic fears of the entire project... [Mayer-Schonberger] is a digital enthusiast with a realistic sense of how we might go very wrong by embracing powerful tools before we understand them."--Siva Vaidhyanathan, Chronicle of Higher Education "In this brief book, Mayer-Schonberger focuses on a unique feature of the digital age: contemporaries have lost the capacity to forget. Many books on privacy frequently mention, but never address in detail, the implications of an almost perfect memory system that digital technology and global networks have brought about... An interesting book, well within the reach of the intelligent reader."--Choice "Clearly the conversation has begun, and Delete is well placed to contribute."--Matthew L. Smith, Identity in the Information SocietyTable of ContentsAcknowledgments ix Chapter I: Failing to Forget the "Drunken Pirate" 1 Chapter II: The Role of Remembering and the Importance of Forgetting 16 Chapter III: The Demise of Forgetting--and Its Drivers 50 Chapter IV: Of Power and Time--Consequences of the Demise of Forgetting 92 Chapter V: Potential Responses 128 Chapter VI: Reintroducing Forgetting 169 Chapter VII: Conclusions 196 Afterword to the Paperback Edition 201 Notes 211 Bibliography 231 Index 245
£16.19
Lexington Books The Intellectual Commons Toward an Ecology of
Book SynopsisThe rapid emergence of digital media has created both new economic opportunities and new risks for authors, publishers, and users in regards to intellectual property. There is a theoretical conflict raging between those who believe information should be free and those attempting to protect intellectual property through surveillance and control of access. The Intellectual Commons works to develop a theory of intellectual property that is based on a theory of natural rights that assumes the existence of a natural world of intellectual resources. Chett Mitchell develops a moral framework that makes cooperation among the groups involved rather than conflict central to understanding intellectual property rights. Drawing on early modern theorists such as Grotius, Pufendorf, and Locke as well as the intellectual theory of copyright put forth by L. Ray Patterson, Mark Rose, and Michel Foucault, Intellectual Commons presents a way to bring IP theory and practice together. This book is an important addition to the intellectual property debate and a must for law students, communication theorists, and any person interested in the future of digital media rights.Table of ContentsChapter 1 Preface Chapter 2 Introduction Chapter 3 Authors and Commons: Two Visions of Intellectual Property Rights Chapter 4 An Overview of Intellectual Property Chapter 5 Two Moments in the History of Copyright Chapter 6 The Natural History of Intellectual Property Chapter 7 Commons: The Third Form of Property Chapter 8 The Intellectual Commons Chapter 9 The Commons in History Chapter 10 Social Utility and the Rise of the Imperial Author Chapter 11 The Author Metaphor Chapter 12 Ethical Issues of Patent Law: Equity and the Intellectual Commons Chapter 13 Conclusions and Critique Chapter 14 Appendix A - Economics: Some Definitions Chapter 15 Appendix B - Property, Ownership, and Rights: A Framework Chapter 16 Appendix C - The Statute of Anne
£81.00
Lexington Books The Intellectual Commons Toward an Ecology of
Book SynopsisThe rapid emergence of digital media has created both new economic opportunities and new risks for authors, publishers, and users in regards to intellectual property. There is a theoretical conflict raging between those who believe ''information should be free'' and those attempting to protect intellectual property through surveillance and control of access. The Intellectual Commons works to develop a theory of intellectual property that is based on a theory of natural rights that assumes the existence of a ''natural world'' of intellectual resources. Chett Mitchell develops a moral framework that makes cooperation among the groups involved rather than conflict central to understanding intellectual property rights. Drawing on early modern theorists such as Grotius, Pufendorf, and Locke as well as the intellectual theory of copyright put forth by L. Ray Patterson, Mark Rose, and Michel Foucault, Intellectual Commons presents a way to bring IP theory and practice together. This book is an important addition to the intellectual property debate and a must for law students, communication theorists, and any person interested in the future of digital media rights.Table of ContentsChapter 1 Preface Chapter 2 Introduction Chapter 3 Authors and Commons: Two Visions of Intellectual Property Rights Chapter 4 An Overview of Intellectual Property Chapter 5 Two Moments in the History of Copyright Chapter 6 The Natural History of Intellectual Property Chapter 7 Commons: The Third Form of Property Chapter 8 The Intellectual Commons Chapter 9 The Commons in History Chapter 10 Social Utility and the Rise of the Imperial Author Chapter 11 The Author Metaphor Chapter 12 Ethical Issues of Patent Law: Equity and the Intellectual Commons Chapter 13 Conclusions and Critique Chapter 14 Appendix A - Economics: Some Definitions Chapter 15 Appendix B - Property, Ownership, and Rights: A Framework Chapter 16 Appendix C - The Statute of Anne
£36.00
Lexington Books New Media Old Regimes Case Studies in Comparative
Book SynopsisTrade ReviewNew Media, Old Regimes is one of the most interesting and innovative studies of comparative communications law available. Eko's use of a case-study approach to reveal the tensions between different political and cultural systems and their differing concepts of freedom of expression is extremely effective and enlightening. -- Eric Easton, University of BaltimoreThis book offers both a contribution to the theoretical foundations of comparative communication law and policy and thought-provoking case studies that illustrate clashes between culturally specific interpretations of communication rights and obligations. -- Manuel Puppis, Univeristy of Zurich, SwitzerlandThis is a fine book by an able media law scholar, whose research has informed me over the years, especially when I wanted to expand my "reverse perspective" on American law on freedom of speech and the press." -- Kyu Ho Youm, Association for Education in Journalism and Mass CommunicationTable of ContentsChapter 1. Mapping the Terrain of Comparative Communication Law Part 1. Theoretical Approaches Chapter 2. Systemic Approaches to Comparative Communication Law and Policy: Regulatory Regimes and Policy Transfer Chapter 3. Politico-Cultural Approaches to Comparative Communication Law and Policy: Exceptionalism, Mentalities, and Asymmetries Chapter 4. The European Supranational Communication Law and Policy Regime Chapter 5. Multilateral Resolution of Communication Problems: The International Communications Regulatory Regime Part 2. Comparative Case Studies in International Communication Law and Policy Chapter 6. New Media, Old Authoritarian Regimes: Instrumentalization of the Internet and Networked Social Media in the "Arab Spring" of 2011 in North Africa Chapter 7. Old Religions, Old Mentalities: The Mohammad Cartoons Affair as a Clash of Religious "Establishmentalities" Chapter 8. New Technologies, Old Mentalities: The Internet, the Minitel, and Exceptionalist Information and Communication Technology Policy Chapter 9. New Technologies, Old Big Brother: Internet Surveillance and "Governmentality" in the United States and the Russian Federation Chapter 10. American Exceptionalism, the French Exception, and Harmonization of Intellectual Property Law by the United States and France Chapter 11. New Media Old Images: Re-presentation of the Problem of Online Child Pornography Under International, European, and American Law Chapter 12. New Realities, Old Ideologies: Communication Policy Transfers and "Developmentality" in Africa Chapter 13. New Media, Ancient Animosities: "Propaganda of the Deed" and the Laws of War in the NATO/Yugoslav War of 1999 Epilogue
£123.30
Lexington Books New Media Old Regimes
Book SynopsisNew Media, Old Regimes: Case Studies in Comparative Communication Law and Policy, by Lyombe S. Eko, is a collection of novel theoretical perspectives and case studies which illustrate how different communication law regimes conceptualize and apply universal ideals of human rights and freedom of expression to media controversies in real space and cyberspace. Eko's investigation includes such controversial communication policy topics as North African regimes' failed use of telecommunications to suppress the social change of the Arab Spring, the Mohammad cartoon controversy in Denmark and France, French and American policy of development and diffusion of the Minitel and the Internet, American and Russian regulation of internet surveillance, the problem of managing pedopornography in cyberspace and real space, and other current communication policy cases. This study will aid readers not only to understand different national and cultural perspectives of thorny communication issues, but also show that though freedom of expression is a pluralistic concept, the actions of all political regimes at the national, transnational, and international levels must be held up to the universal standards of freedom of expression set forth in the Universal Declaration of Human Rights. New Media, Old Regimes provides essential scholarship on comparative communication law and policy in a world of new media.Trade ReviewNew Media, Old Regimes is one of the most interesting and innovative studies of comparative communications law available. Eko's use of a case-study approach to reveal the tensions between different political and cultural systems and their differing concepts of freedom of expression is extremely effective and enlightening. -- Eric Easton, University of BaltimoreThis book offers both a contribution to the theoretical foundations of comparative communication law and policy and thought-provoking case studies that illustrate clashes between culturally specific interpretations of communication rights and obligations. -- Manuel Puppis, Univeristy of Zurich, SwitzerlandThis is a fine book by an able media law scholar, whose research has informed me over the years, especially when I wanted to expand my "reverse perspective" on American law on freedom of speech and the press." -- Kyu Ho Youm, Association for Education in Journalism and Mass CommunicationTable of ContentsChapter 1. Mapping the Terrain of Comparative Communication Law Part 1. Theoretical Approaches Chapter 2. Systemic Approaches to Comparative Communication Law and Policy: Regulatory Regimes and Policy Transfer Chapter 3. Politico-Cultural Approaches to Comparative Communication Law and Policy: Exceptionalism, Mentalities, and Asymmetries Chapter 4. The European Supranational Communication Law and Policy Regime Chapter 5. Multilateral Resolution of Communication Problems: The International Communications Regulatory Regime Part 2. Comparative Case Studies in International Communication Law and Policy Chapter 6. New Media, Old Authoritarian Regimes: Instrumentalization of the Internet and Networked Social Media in the "Arab Spring" of 2011 in North Africa Chapter 7. Old Religions, Old Mentalities: The Mohammad Cartoons Affair as a Clash of Religious "Establishmentalities" Chapter 8. New Technologies, Old Mentalities: The Internet, the Minitel, and Exceptionalist Information and Communication Technology Policy Chapter 9. New Technologies, Old Big Brother: Internet Surveillance and "Governmentality" in the United States and the Russian Federation Chapter 10. American Exceptionalism, the French Exception, and Harmonization of Intellectual Property Law by the United States and France Chapter 11. New Media Old Images: Re-presentation of the Problem of Online Child Pornography Under International, European, and American Law Chapter 12. New Realities, Old Ideologies: Communication Policy Transfers and "Developmentality" in Africa Chapter 13. New Media, Ancient Animosities: "Propaganda of the Deed" and the Laws of War in the NATO/Yugoslav War of 1999 Epilogue
£53.10
Rowman & Littlefield Publishers Privacy and the Information Age Critical Media
Book SynopsisLooking beyond the protection of personal data in the new technological age, Serge Gutwirth advances the thesis that privacy is the safeguard of personal freedom - the safeguard of the individual's freedom to decide who she or he is, what she or he does, and who knows about it.Trade ReviewSerge Gutwirth impressively draws on Dutch, German, French, and English language sources to develop a strong argument regarding the centrality of privacy to personal freedom and the challenges to that sacred connection posed by new, and increasingly omniscient, information technologies. A most welcome addition to the comparative literature on privacy and technology. -- Gary T. Marx, Massachusetts Institute of Technology; author of Windows Into the Soul: Surveillance and Society in an Age of High TechnologyTable of ContentsChapter 1 Introduction Chapter 2 Privacy's Complexities Chapter 3 The Law on Privacy Chapter 4 Ambiguous Privacy Chapter 5 Privacy Endangered Chapter 6 Privacy and the Processing of Personal Data Chapter 7 Conclusion Chapter 8 Appendix: The European Community Directive on Personal Data Chapter 9 Bibliography Chapter 10 Index
£36.90
Rowman & Littlefield A Students Guide to Mass Communication Law
Book SynopsisA unique learning tool for students in journalism and mass communication, A Student''s Guide to Mass Communication Law is written for students by a top student. Amber Nieto and her professor John F. Schmittwho also brings his experience as a lawyer and a journalisthave created an easy-to-read study guide to be used alongside any main textbook on media law or communication law. An outline format allows for quick reference and for instructors to choose material useful to their courses. Including a glossary and the text of the U.S. Constitution, this concise guide covers key areas such as free speech, freedom of the press, censorship, the student press, defamation and libel, privacy, intellectual property, fair trial issues, shield laws, freedom of information, obscenity, electronic media regulation, media ownership, and advertising. A Student''s Guide helps students understand textbook material and serves as an ongoing refresher course on the basics of mass communication law and media law.Table of ContentsChapter 1 Preface Chapter 2 1 Sources of the Law Chapter 3 2 Origin of American Free Speech and Free Press Chapter 4 3 Censorship or "Prior Restraint" Chapter 5 4 The Student Press in America Chapter 6 5 Injury to Reputation: Defamation Chapter 7 6 The Right of Privacy Chapter 8 7 Intellectual Property Chapter 9 8 Prejudicial Publicity and Fair Trial Issues Chapter 10 9 Reporters, Shield Laws, and Other Protections Chapter 11 10 Transparency and Freedom of Information Chapter 12 11 Obscenity and America Chapter 13 12 Regulation of Electronic Media Chapter 14 13 Issues Affecting Media Ownership Chapter 15 14 The Law of Advertising Chapter 16 Glossary Chapter 17 Constitution of the United States of America
£37.52
Edinburgh University Press Law on the Electronic Frontier
Book SynopsisThis is an issue of our quarterly journal Hume Papers on Public Policy - the journal of the David Hume Institute.Trade ReviewProvides some useful insights into computers and the law over a broad area. -- E Susan Singleton Provides some useful insights into computers and the law over a broad area.Table of ContentsRacing Forms and the Exhibition(ist) (Mis)Match: Second Thoughts on the Anxiety of Production
£25.64
Rlpg/Galleys Communication Law
Book SynopsisDo courts adequately balance the rights of a free press? Under what conditions may the government refuse to release information to the news media? How can society protect itself from deceptive advertising? First Amendment questions like these are the focus of Communication Law. This introductory textbook addresses First Amendment issues that affect the general public, academics, business people, journalists, government officials, and broadcasters. This newly revised edition contains descriptions and analyses of recent and precedent-setting judicial decisions and is a valuable text for communication law courses in journalism, communication, and political science departments.Table of ContentsChapter 1 1. Foundations Chapter 2 2. Dissent Chapter 3 3. Association Chapter 4 4. Academic Freedom Chapter 5 5. Obscenity Chapter 6 6. Silence Chapter 7 7. Defamation Chapter 8 8. Privacy Chapter 9 9. Copyright Chapter 10 10. News Chapter 11 11. Fair Trial Chapter 12 12. Electronic Media Chapter 13 13. Advertising Chapter 14 14. Epilogue Chapter 15 Index of Cases
£45.90
University of British Columbia Press Media Divides
Book SynopsisMedia Divides offers the first comprehensive, up-to-date account of the democratic deficits in Canada’s communications law and policy.Table of ContentsPrefacePart 1: Communication Rights and the Right to Communicate – The State of the ArtIntroduction / Marc Raboy and Jeremy Shtern1 Histories, Contexts, and Controversies / Marc Raboy and Jeremy Shtern2 Implementing Communication Rights / Seán Ó SiochrúPart 2: Communication Rights in Canada – An Assessment3 The Horizontal View / Marc Raboy and Jeremy Shtern4 Media / Marc Raboy5 Access / Leslie Regan Shade6 Internet / William J. McIver Jr.7 Privacy / Leslie Regan Shade8 Copyright / Laura J. MurrayPart 3: Policy Recommendations and Alternative Frameworks9 Fixing Communication Rights in Canada / Marc Raboy and Jeremy Shtern10 Toward a Canadian Right to Communicate / Marc Raboy and Jeremy ShternAppendicesNotesWorks CitedIndex
£73.95
McFarland & Company The Beginning of Broadcast Regulation in the
Book Synopsis The Radio Act of August 13, 1912, provided for the licensing of radio operators and transmitting stations for nearly 15 years until Congress passed the Radio Act of 1927. From 1921 to 1927, there were continual revisions and developments and these still serve as the basis for current broadcast regulation. This book chronicles that crucial six-year period using primary documents. The administrative structure of the Department of Commerce and the personnel involved in the regulation of broadcasting are detailed. The book is arranged chronologically in three sections: Broadcast Regulation and Policy from 1921 to 1925; Congestion and the Beginning of Regulatory Breakdown in 1924 and 1925; and Regulatory Breakdown and the Passage of the Act of 1927. There is also discussion of the Department of Commerce divisions and their involvement until they were absorbed by the Federal Communication Commission. A bibliography and an index conclude the work.Trade Reviewa useful addition to academic journalism collections"—Library Journal"valuable reference...useful"—ISIS"the most important study of this formative period of policy development"—Communication Booknotes Quarterly"a very good job...clear, concise, extensively documented and well written"—North American Shortwave Association"focuses on the years 1921 to 1927 which culminated in the Radio Act of 1927...full of interesting stories and anecdotes that illustrate and give insight into what was happening in radio during those early broadcast years"—North American Radio Archives"the administration structure of the Department of Commerce and the personnel involved in the regulation of broadcasting are detailed"—Critical Studies in Media Communication"important in the study of the early years of the medium"—Classic Images"highly useful"—Journal of Radio Studies.
£27.54
Black Cat Exploding Data
Book Synopsis
£11.39
Rowman & Littlefield Publishers Government Policy toward Open Source Software
Book Synopsis
£14.24
Edward Elgar Publishing Ltd Cybercrime in the Greater China Region
Book SynopsisCybercrime is a worldwide problem of rapidly increasing magnitude and, of the countries in the Asia Pacific region, Taiwan and China are suffering most. To prevent the spread of cybercrime, the book argues the case for a `wiki’ approach to cybercrime and a feasible pre-warning system.Trade ReviewProfessor Chang's very thoughtful and impressively researched study of cybercrime in the greater China region is an invaluable contribution to the information and analyses available in this area. It not only provides important, and heretofore unavailable data, about the incidence and nature of cybercrime in this region, it also offers insightful suggestions into how this problem can most effectively be controlled. It belongs in the library of anyone interested in this area.'- Susan Brenner, University of Dayton, US'East Asia is a heartland of the variegated scams of the cybercrime problem. Yao Chung Chang's book is an innovative application of routine activity theory and regulatory theory to cybercrime prevention across the cybergulf between China and Taiwan. The long march through the scams and across the Taiwan Strait is fascinating. Chang leads us to ponder a wiki cybercrime prevention strategy that might work in such treacherous waters.'- John Braithwaite, Australian National UniversityTable of ContentsContents: Foreword Preface Part I: Setting the Scene 1. Introduction 2. Risk, Routine Activity and Cybercrime Part II: New Crime in a New Field: Cybercrime in Taiwan and China 3. Cybercrime Across the Taiwan Strait Part III: Regulatory Responses Against Cybercrime Across the Taiwan Strait 4. Think Global, Act Glocal — ‘Glocal’ Responses to Cybercrime 5. Cooperation between Taiwan and China Part IV: Preventable Measures: Cybercrime as the Infectious Disease in the Virtual World 6. ‘Wiki’ Crime Prevention — Establishing a Pre-Warning System 7. Conclusion References Index
£98.80
Cambridge University Press AI Development and the Fuzzy Logic of Chinese
Book SynopsisThis book explains the rapid rise of China's innovation system and provides a roadmap for the prospects of China's AI development, within the bounds of China's data laws. It will appeal to lawyers, policymakers, venture capitalists, entrepreneurs, the global technology industry as well as those interested in China's entrepreneurial ecosystem.Trade Review'In examining 'fuzzy logic' in China's Cyber Security Law, this book provides invaluable insights into how China can be a powerful force in AI and tech innovation. It will have a significant impact on the way in which we conceive of technology regulation in China and elsewhere.' Andrew Godwin, Melbourne Law School, The University of Melbourne'As China navigates tensions between state control and the imperatives of innovation in internet technology, this book offers timely insights. It digs deeply into the 'fuzzy logic' of rules on data localisation, and frames a compelling argument that will help shape scholarly and policy debates in coming years.' Adam K Webb, Co-Director and Professor of Political Science, Hopkins-Nanjing Center'The Chinese tech scene presents us with a bewildering picture of deeply intertwined technological, political and commercial questions and interests. This complexity equally affects Chinese policymaking, particularly in fields related to data and artificial intelligence. This volume aims to enlighten the way by which China gropes its way forward carefully, but decisively.' Rogier Creemers, Assistant Professor, Leiden University'Parasol brings ground-up observations of how China's tech ecosystem really works, and skillfully integrates those with important insights from academia and beyond. He cuts right through the tired debates about whether China can innovate, and deftly illustrates how the 'fuzzy logic' of Chinese tech policy is enabling local experimentation that drives the ecosystem forward. Parasol's book provides excellent intellectual scaffolding for those of us trying to make sense of how Chinese tech got where it is today, and where it's going next.' Matt Sheehan, Fellow, The Paulson Institute'a timely, insightful and well-researched contribution to the literature on China and technology … Parasol's fascinating book is likely to find its way onto postgraduate reading lists and presents ideas and hypotheses that can be tested and expanded in future scholarship.' Tim Stevens, The China QuarterlyTable of ContentsPart I. Historical and Doctrinal Background: 1. Innovating in china's entrepreneurial ecosystem; 2. The extent of fuzzy logic: the tech giants and their 'illegal' legal structure; 3. China's cyber policies: conflict between innovation and restriction; 4. China's data security policies leading to the cyber security law; 5. The cyber security law: fuzzy logic in a touchstone law; Part II. Impact on Artificial Intelligence: 6. the impacts of data localisation on globalised ecosystems and Chinese tech development; 7. How fuzzy provisions in the cyber security law protect data but not data privacy: 'data protection shall not hinder AI'; 8. Why the current state of AI research is perfectly suited to China's fuzzy logic system; 9. Open-source Ai platforms and the cyber security law; Conclusion — effect of data localisation on Chinese AI innovation.
£25.19
Cambridge University Press The Cambridge Handbook of Responsible Artificial
Book SynopsisThere is an urgent need for responsible governance of Artificial Intelligence systems. This Handbook maps important features of responsible AI governance and demonstrates how to achieve and implement them at the regional, national and international level.Trade Review'… an indispensable and thought-provoking resource for shaping the future of AI and its societal impact.' Matija Franklin, PrometheusTable of ContentsIntroduction; Part I. Foundations of Responsible AI: 1. Artificial Intelligence – Key Technologies and Opportunities Wolfram Burgard; 2. Automating Supervision of AI Delegates Jaan Tallinn and Richard Ngo; 3. Artificial Moral Agents – Conceptual Issues and Ethical Controversy Catrin Misselhorn;4. Risk Imposition by Artificial Agents – The Moral Proxy Problem Johanna Thoma; 5. Artificial Intelligence and its Integration into the Human Lifeworld Christoph Durt; Part II. Current and Future Approaches to AI Governance: 6. Artificial Intelligence and the Past, Present and Future of Democracy Mathias Risse; 7. The New Regulation of the European Union on Artificial Intelligence – Fuzzy Ethics Diffuse into Domestic Law and Sideline International Law Thomas Burri; 8. Fostering the Common Good – An Adaptive Approach Regulating High-Risk AI-Driven Products and Services Thorsten Schmidt and Silja Voeneky; 9. China's Normative Systems for Responsible AI – From Soft Law to Hard Law Weixing Shen and Yun Liu; 10. Towards a Global Artificial Intelligence Charter Thomas Metzinger; 11. Intellectual Debt – With Great Power Comes Great Ignorance Jonathan Zittrain; Part III. Responsible AI Liability Schemes: 12. Liability for Artificial Intelligence – The Need to Address both Safety Risks and Fundamental Rights Risks Christiane Wendehorst; 13. Forward to the Past – A Critical Evaluation of the European Approach to Artificial Intelligence in Private International Law Jan von Hein; Part IV. Fairness and Non-Discrimination in AI Systems: 14. Differences that Make a Difference – Computational Profiling and Fairness to Individuals Wilfried Hinsch; 15. Discriminatory AI and the Law – Legal Standards for Algorithmic Profiling Antje von Ungern-Sternberg; Part V. Responsible Data Governance: 16. Artificial Intelligence and the Right to Data Protection Ralf Poscher; 17. Artificial Intelligence as a Challenge for Data Protection Law – And Vice Versa Boris Paal; 18. Data Governance and Trust – Lessons from South Korean Experiences Coping with COVID-19 Haksoo Ko, Sangchul Park and Yong Lim; Part VI. Responsible Corporate Governance of AI Systems: 19. From Corporate Governance to Algorithm Governance – Artificial Intelligence as a Challenge for Corporations and their Executives Jan Lieder; 20. Autonomization and Antitrust – On the Construal of the Cartel Prohibition in the Light of Algorithmic Collusion Stefan Thomas; 21. Artificial Intelligence in Financial Services – New Risks and the Need for More Regulation? Matthias Paul; Part VII. Responsible AI Healthcare and Neurotechnology Governance: 22. Medical AI – Key Elements at the International Level Fruzsina Molnár-Gábor and Johanne Giesecke; 23. 'Hey Siri, How Am I Doing?' – Legal Challenges for Artificial Intelligence Alter Egos in Healthcare Christoph Kroenke; 24. Neurorights – A Human-Rights Based Approach for Governing Neurotechnologies Philipp Kellmeyer; 25. AI-Supported Brain-Computer Interfaces and the Emergence of 'Cyberbilities' Boris Essmann and Oliver Mueller; Part VIII. Responsible AI for Security Applications and in Armed Conflict: 26. Artificial Intelligence, Law and National Security Ebrahim Afsah; 27. Morally Repugnant Weaponry? Ethical Responses to the Prospect of Autonomous Weapons Alex Leveringhaus; 28. On 'Responsible AI' in War – Exploring Preconditions for Respecting International Law in Armed Conflict Dustin A. Lewis.
£142.50
Cambridge University Press Smart Court
£99.75
Cambridge University Press Killing the Messenger
£22.79