International law: communications, telecommunications Books

16 products


  • Unwired

    Cambridge University Press Unwired

    1 in stock

    Book SynopsisOur society has a technology problem. Many want to disconnect from screens but can''t help themselves. These days we spend more time online than ever. Some turn to self-help-measures to limit their usage, yet repeatedly fail, while parents feel particularly powerless to help their children. Unwired: Gaining Control over Addictive Technologies shows us a way out. Rather than blaming users, the book shatters the illusion that we autonomously choose how to spend our time online. It shifts the moral responsibility and accountability for solutions to corporations. Drawing lessons from the tobacco and food industries, the book demonstrates why government regulation is necessary to curb technology addiction. It describes a grassroots movement already in action across courts and legislative halls. Groundbreaking and urgent, Unwired provides a blueprint to develop this movement for change, to one that will allow us to finally gain control.Trade Review'Gaia Bernstein's Unwired offers a compelling roadmap for tackling one of our most pressing problems: the irresistible pull of technology. Over the course of our lives, we and our children will spend between fifteen and twenty years glued to our screens. As Bernstein shows, though, there are regulatory remedies at hand to help us retain our time and our wellbeing.' Adam Alter, Professor of Marketing and Psychology, NYU Stern School of Business, author of Irresistible and Drunk Tank Pink'In this important and powerful book, Gaia Bernstein shows us how to reclaim our power and our humanity from the Big Tech cartel that have intentionally addicted us to their devices and platforms.' Nicholas Kardaras, Ph.D., Author of 'Glow Kids' and 'Digital Madness", former Clinical Professor, Stony Brook Medicine'Unwired is a compelling, accessible, and vital intervention into the overuse of technology. Instead of offering overly simplistic self-help strategies that are doomed to fail, Professor Bernstein rightly targets the manipulative design of technologies and the need for us to work together to hold the tech industry accountable. This book vividly blends personal stories with the latest research and lessons from history to paint a clear picture of our struggle with screens and what it's going to take to improve things. Everyone should read this book.' Woodrow Hartzog, Professor of Law at Boston University and author of Privacy's Blueprint: The Battle to Control the Design of New Technologies'Inviting and intelligent, Gaia Bernstein's extraordinary book masterfully combines honest personal reflections about her experiences with the creep of digital tech together with a sobering academic account of our collective public struggles to deal with technologies designed to addict, manipulate, and even control our behavior. Throughout, Bernstein maintains a can-do attitude that inspires change.' Brett Frischmann, The Charles Widger Endowed University Professor in Law, Business and Economics, Villanova University School of Law'Unwired is a powerful rejoinder to voices that would seek to minimize the threat technological manipulation poses to human freedom. But Gaia Bernstein goes beyond a mere accounting of the harms and proposes systemic changes that can help us take back control. Comprehensive in its scope and clear-eyed in its analysis, Unwired is an indispensable guide to the landscape of digital technology reform. Anyone who cares about the future of technology should read this book.' James Williams, author of Stand Out of Our Light'This trenchant clarion call rings loud and clear.' Publishers Weekly'Mixing expertise and passion, the author sets an agenda to rein in the tech behemoths that have run rampant for years.' Kirkus Reviews'Bernstein is shrewd about the political maneuvers and public relations options available to industries challenged for doing harm to the general welfare. At the same time, she shows that imposing some control or countermeasures … has been possible in the past, and might be in the future.' Scott McLemee, Inside Higher Ed'Unwired exists to be used: an agenda for social change through legal action. It is a knife, not a brush. But it'll be of much more than academic value to those of us whose parenting years were overshadowed by feelings of guilt, frustration and anxiety, as we fought our hopeless battles, and lost our children to TikTok and Fortnite.' Simon Ings, New Statesman'Bernstein … doubts that addicted users … can will themselves out of their habits. Instead, she argues, regulatory intervention of the supplying corporations will be necessary.' Harvard Magazine, Off the ShelfTable of ContentsPrologue; Part I. The Price of the Illusion of Control; 1. Becoming the Choice-Makers; 2. Addiction, Our Children, Our Bonds; 3. Invisible Chains; Part II. Who Are the Choice Makers? 4. Clouds of Smoke; 5. The Food Wars; 6. The Privacy Phoenix; 7. Lessons from Battling Titans; Part III. Fighting for Choice; 8. The Art of Redesign; 9. The Tools of Awareness; 10. The Ground is Burning; 11. The Achilles Heel; 12. Acupuncture for Change; Epilogue.

    1 in stock

    £19.00

  • The Autonomous Legal Concept of Communication to

    Edward Elgar Publishing Ltd The Autonomous Legal Concept of Communication to

    15 in stock

    Book SynopsisTrade Review‘This book offers a fresh perspective regarding the interpretation of the right of communication to the public in EU copyright law by looking into the constitutional blocks of EU law – autonomous legal concepts, and their role in shaping the scope of this right. It clearly determines what type of authorisation is required for widening of the audience in digital realities, by use of different communication models.The result, an excellent and very practical operational model.’ -- Jan Gunnar Rosén, Stockholm University, SwedenTable of ContentsContents: PART I CONTEXTUAL FRAMEWORK 1. Introduction to The Autonomous Legal Concept of Communication to the Public 2. The right of communication to the public, including the right of making available to the public, in a copyright context PART II HARMONISATION 3. The concept of harmonisation 4. Legislative harmonisation on an international level through multilateral international agreements 5. Legislative harmonisation on the EU level 6. Interpretive harmonisation through the use of autonomous legal concepts: autonomy in form 7. Interpretive harmonisation through the use of autonomous legal concepts: autonomy in substance PART III COMMUNICATION MODELS 8. Application of communication models 9. Concluding remarks Index

    15 in stock

    £90.00

  • The The Electronic Communications Code A Guide

    Bloomsbury Publishing (UK) The The Electronic Communications Code A Guide

    15 in stock

    Book SynopsisJon Wills is a barrister at Landmark Chambers, practising in all areas of property law and specialising in the Electronic Communications Code.

    15 in stock

    £116.50

  • Telecommunications Act: Competition, Innovation &

    Nova Science Publishers Inc Telecommunications Act: Competition, Innovation &

    1 in stock

    Book Synopsis

    1 in stock

    £50.24

  • Net Neutrality & the FCC: Legal Issues & Matters

    Nova Science Publishers Inc Net Neutrality & the FCC: Legal Issues & Matters

    1 in stock

    Book Synopsis

    1 in stock

    £67.99

  • The Power of Digital Policy: A practical guide to

    Nativetrust Consulting, LLC The Power of Digital Policy: A practical guide to

    1 in stock

    Book Synopsis

    1 in stock

    £34.20

  • EU Telecommunications Law

    Edward Elgar Publishing Ltd EU Telecommunications Law

    15 in stock

    Book SynopsisEU Telecommunications Law provides a comprehensive overview of the current European regulatory framework as it applies to telecommunications and examines the challenges facing regulators in this sector. Key chapters focus on the selection of appropriate regulatory models that serve to encourage effective investment in next-generation networks and ensure their successful deployment.Andrej Savin provides an up to date overview of all the relevant sources, guiding the reader through these disparate materials in a simple and systematized way. In particular, the book provides analysis of the 2016 proposal for a European Electronic Communications Code (EECC). Using the 2009 Regulatory Framework on electronic communications as a basis the author analyses each of the 2009 framework’s five main directives, comparing them with the changes proposed in the EECC.Providing a comprehensive introduction to the main areas of EU telecoms regulation, this book will be of great value to telecoms and IT lawyers. It will also appeal to academics carrying out research in IT law or competition law as it relates to IT and telecoms.Trade Review'This book's content and coverage provide for a thorough interpretation of the legal structure of telecommunications regulation in the EU. Its accessibility is demonstrable and the quality of the presentation assures the readership of the book's didactic and informative value. It is very topical, extremely well produced and offers a one-shop stop in EU telecommunications taw to academics, researchers and practitioners.' --Christopher Bovis, University of Hull, UKTable of ContentsContents: Preface 1. Regulating Telecommunications in the EU 2. The Development of EU Telecommunications Policy 3. The Legal Framework for Telecommunications Regulation in the EU 4. Competition and Telecommunications 5. Regulation of Market Entry - Authorisation and Spectrum Policy 6. Access and Interconnection 7. Universal Service 8. Consumer Protection 9. Regulating Television 10. Policy Controversies 11. Data Protection and Cybersecurity 12. Concluding Remarks

    15 in stock

    £111.00

  • EU Telecommunications Law

    Edward Elgar Publishing Ltd EU Telecommunications Law

    15 in stock

    Book SynopsisEU Telecommunications Law provides a comprehensive overview of the current European regulatory framework as it applies to telecommunications and examines the challenges facing regulators in this sector. Key chapters focus on the selection of appropriate regulatory models that serve to encourage effective investment in next-generation networks and ensure their successful deployment.Andrej Savin provides an up to date overview of all the relevant sources, guiding the reader through these disparate materials in a simple and systematized way. In particular, the book provides analysis of the 2016 proposal for a European Electronic Communications Code (EECC). Using the 2009 Regulatory Framework on electronic communications as a basis the author analyses each of the 2009 framework’s five main directives, comparing them with the changes proposed in the EECC.Providing a comprehensive introduction to the main areas of EU telecoms regulation, this book will be of great value to telecoms and IT lawyers. It will also appeal to academics carrying out research in IT law or competition law as it relates to IT and telecoms.Trade Review'This book's content and coverage provide for a thorough interpretation of the legal structure of telecommunications regulation in the EU. Its accessibility is demonstrable and the quality of the presentation assures the readership of the book's didactic and informative value. It is very topical, extremely well produced and offers a one-shop stop in EU telecommunications taw to academics, researchers and practitioners.' --Christopher Bovis, University of Hull, UKTable of ContentsContents: Preface 1. Regulating Telecommunications in the EU 2. The Development of EU Telecommunications Policy 3. The Legal Framework for Telecommunications Regulation in the EU 4. Competition and Telecommunications 5. Regulation of Market Entry - Authorisation and Spectrum Policy 6. Access and Interconnection 7. Universal Service 8. Consumer Protection 9. Regulating Television 10. Policy Controversies 11. Data Protection and Cybersecurity 12. Concluding Remarks

    15 in stock

    £38.90

  • Advanced Introduction to Cybersecurity Law

    Edward Elgar Publishing Ltd Advanced Introduction to Cybersecurity Law

    15 in stock

    Book SynopsisElgar Advanced Introductions are stimulating and thoughtful introductions to major fields in the social sciences, business, and law, expertly written by the world’s leading scholars. Designed to be accessible yet rigorous, they offer concise and lucid surveys of the substantive and policy issues associated with discrete subject areas. This succinct Advanced Introduction delivers insights into the pressing technological, political, and legal challenges of cybersecurity. Exploring cybersecurity threats on both a national and global scale, it provides guidance on how countries use domestic and international law to counter crime, terrorism, espionage, and armed conflict in cyberspace. Key features: Centres cybersecurity law within the internet as a technology, cyberspace as a political and governance space, and transformations in international relations over the past twenty years Tracks how the development of policies on responding to different cyber threats, improving cyber defences, and increasing cyber deterrence affects the use and effectiveness of cybersecurity law Analyses whether the ongoing evolution of cyber threats changes, or should change, how countries apply domestic and international law to counter cybersecurity challenges concerning crime, terrorism, espionage, and armed conflict This Advanced Introduction is an invaluable resource for researchers and students of law, public policy, and international relations focusing on how digital technologies, the internet, and cyberspace affect world affairs. It also serves as an accessible entry point for government, corporate, and NGO staff concerned with cybersecurity law.Trade Review‘David Fidler’s review of the contemporary complexities of cybersecurity law and its application comes at a critical time. He has hit the nail on the head in writing that “. . . governments extensively use policy and law in responding to cybersecurity threats” - while also underlining the limitations of both in today’s rapidly-evolving international system.’ BR> -- Deborah Housen-Couriel, Hebrew University of Jerusalem, Israel‘True to its title, Advanced Introduction to Cybersecurity Law offers both an excellent entry point for readers unfamiliar with the domestic and international legal issues raised by a rising number of cybersecurity threats (and capacities) alongside a sophisticated survey of the extant geopolitical, ideological, and technical contexts that will benefit existing experts. With careful and concise assessments of the regime complexes that address cyber manifestations of four security threats - crime, terrorism, espionage, and armed conflict - Fidler’s work offers a clear-eyed view of present challenges alongside a critical analysis of the law’s capacity to redress them in the coming years.’ -- Duncan B. Hollis, Temple University, School of Law, USTable of ContentsContents: Foreword PART I BACKGROUND FOR CYBERSECURITY LAW 1. Introduction: Cybersecurity and cybersecurity law 2. Cyberspace, security, and law PART II CYBERSECURITY AND NON-STATE ACTORS: CRIME AND TERRORISM IN CYBERSPACE 3. Cybercrime 4. Cyber terrorism PART III CYBERSECURITY AND STATE ACTORS: ESPIONAGE AND WAR IN CYBERSPACE 5. Cyber espionage 6. Cyber war 7. Conclusion: Cybersecurity law in a divided world Index

    15 in stock

    £84.55

  • Advanced Introduction to Cybersecurity Law

    Edward Elgar Publishing Ltd Advanced Introduction to Cybersecurity Law

    15 in stock

    Book SynopsisElgar Advanced Introductions are stimulating and thoughtful introductions to major fields in the social sciences, business, and law, expertly written by the world’s leading scholars. Designed to be accessible yet rigorous, they offer concise and lucid surveys of the substantive and policy issues associated with discrete subject areas. This succinct Advanced Introduction delivers insights into the pressing technological, political, and legal challenges of cybersecurity. Exploring cybersecurity threats on both a national and global scale, it provides guidance on how countries use domestic and international law to counter crime, terrorism, espionage, and armed conflict in cyberspace. Key features: Centres cybersecurity law within the internet as a technology, cyberspace as a political and governance space, and transformations in international relations over the past twenty years Tracks how the development of policies on responding to different cyber threats, improving cyber defences, and increasing cyber deterrence affects the use and effectiveness of cybersecurity law Analyses whether the ongoing evolution of cyber threats changes, or should change, how countries apply domestic and international law to counter cybersecurity challenges concerning crime, terrorism, espionage, and armed conflict This Advanced Introduction is an invaluable resource for researchers and students of law, public policy, and international relations focusing on how digital technologies, the internet, and cyberspace affect world affairs. It also serves as an accessible entry point for government, corporate, and NGO staff concerned with cybersecurity law.Trade Review‘David Fidler’s review of the contemporary complexities of cybersecurity law and its application comes at a critical time. He has hit the nail on the head in writing that “. . . governments extensively use policy and law in responding to cybersecurity threats” - while also underlining the limitations of both in today’s rapidly-evolving international system.’ BR> -- Deborah Housen-Couriel, Hebrew University of Jerusalem, Israel‘True to its title, Advanced Introduction to Cybersecurity Law offers both an excellent entry point for readers unfamiliar with the domestic and international legal issues raised by a rising number of cybersecurity threats (and capacities) alongside a sophisticated survey of the extant geopolitical, ideological, and technical contexts that will benefit existing experts. With careful and concise assessments of the regime complexes that address cyber manifestations of four security threats - crime, terrorism, espionage, and armed conflict - Fidler’s work offers a clear-eyed view of present challenges alongside a critical analysis of the law’s capacity to redress them in the coming years.’ -- Duncan B. Hollis, Temple University, School of Law, USTable of ContentsContents: Foreword PART I BACKGROUND FOR CYBERSECURITY LAW 1. Introduction: Cybersecurity and cybersecurity law 2. Cyberspace, security, and law PART II CYBERSECURITY AND NON-STATE ACTORS: CRIME AND TERRORISM IN CYBERSPACE 3. Cybercrime 4. Cyber terrorism PART III CYBERSECURITY AND STATE ACTORS: ESPIONAGE AND WAR IN CYBERSPACE 5. Cyber espionage 6. Cyber war 7. Conclusion: Cybersecurity law in a divided world Index

    15 in stock

    £18.00

  • Regulating Cross-Border Data Flows: Issues,

    Anthem Press Regulating Cross-Border Data Flows: Issues,

    Out of stock

    Book SynopsisData is now one of the world’s most valuable resources. The adoption of data-driven applications across economic sectors has made data and the flow of data so pervasive that it has become integral to everything we as members of society do – from conducting our finances to operating businesses to powering the apps we use every day. For this reason, governing cross-border data flows is inherently difficult given the ubiquity and value of data, and the impact government policies can have on national competitiveness, business attractiveness and personal rights. The challenge for governments is to address in a coherent manner the broad range of data-related issues in the context of a global data-driven economy. This book engages with the unexplored topic of why and how governments should develop a coherent and consistent strategic framework regulating cross-border data flows. The objective is to fill a very significant gap in the legal and policy setting by considering multiple perspectives in order to assist in the development of a jurisdiction’s coherent and strategic policy framework.Trade Review“This book paints a rich picture of the issues policymakers should address when regulating cross-border data flows. A must-read for all those interested in governance processes in a global data-driven economy.” – Enrico Bonadio, Reader in Intellectual Property Law – City, University of London, UK.“The book by Mercurio and Yu provides invaluable insights into the dynamics of the data- driven economy. Building upon a deep understanding of the existing regulatory frameworks and the geopolitical powerplays, the authors charter the way forward for a coherent regulation of cross-border data flows as the lifeblood of our societies.” – PROF. DR.IUR. MIRA BURRI, Chair for International Economic and Internet Law, Managing Director Internationalization, Principal Investigator ERC Consolidator Grant: TRADE LAW 4.0 (2021- 2026), University of Lucerne, Switzerland.“The professional and diverse academic backgrounds of the two authors have ensured not only the quality of the output but also the unique perspectives of the discussion throughout. The book aims to provide an answer to the challenges of the new economy, it took a holistic approach in examining the pros and cons of the current framework and proposes an interest- based solution.”– Dr. TianxiangHe, School of Law at the City University of Hong, China.“This book distinguishes itself from the existing one in at least two aspects. For one, it is written by Hong Kong legal academics--HK is a global hub for various data-driven applications, and the HK government has been on the frontline of rolling out new regulatory approaches governing data-related issues. Hong Kong’s policies can inform other jurisdictions; moreover, its unique status as related to the Greater China Area, too, makes Hong Kong experience as a & quot; smart city " an attractive case study. For another, the authors have strong backgrounds in patents/IPRs; this is a very important yet less explored angle in the context of data governance. This book should be read by all scholars, policymakers and lawyers who are keen to capture the dynamics of law and data-driven technologies in Hong Kong, the hub of the most dynamic markets in Asia.”– Dr. Han-Wei Liu, Senior Lecturer, Monash University, Australia.Table of ContentsIntroduction; Key Considerations; Competing Models of Data Governance; A Case Study of Hong Kong; Considerations in Moving Forward.

    Out of stock

    £19.94

  • Artificial intelligence and foreign affairs

    Peter Lang AG, Internationaler Verlag der Wissenschaften Artificial intelligence and foreign affairs

    Out of stock

    Book SynopsisAI is one of the most disruptive technologies of our era, significantly transforming nearly every aspect of human life. This book examines the impact of AI on international affairs from interdisciplinary, cross-sectoral, and interregional perspectives, focusing on both the European Union and Latin America.It explores philosophical debates on concepts such as consciousness, ethics, and human uniqueness, offering a framework for assessing the risks and benefits of AI for humanity. The evolving landscape is also giving rise to new rights, including NeuroRights, which expand upon existing human rights. Additionally, the book analyses the EU AI Act and its implications for human rights in the digital age.This publication is a collaborative effort between university scholars and international experts, developed within the research group "EU & Ethics Governance of the Artificial Intelligence" led by the Institute of European Studies and Human Rights at the Pontifical University of Salamanca.

    Out of stock

    £30.40

  • De Gruyter Data Law

    2 in stock

    Book Synopsis

    2 in stock

    £147.05

  • Duncker & Humblot Die G 10-Kommission - Zur Kontrolle Der

    Out of stock

    Book Synopsis

    Out of stock

    £59.92

  • Auswirkungen des European Media Freedom Act EMFA

    Peter Lang AG Auswirkungen des European Media Freedom Act EMFA

    Out of stock

    Book Synopsis

    Out of stock

    £37.80

  • Lit Verlag Regulating Telecommunications in the EU and

    Out of stock

    Book Synopsis

    Out of stock

    £28.71

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account