Description

Book Synopsis
Security and law against the backdrop of technological development.Few people doubt the importance of the security of a state, its society and its organizations, institutions and individuals, as an unconditional basis for personal and societal flourishing. Equally, few people would deny being concerned by the often occurring conflicts between security and other values and fundamental freedoms and rights, such as individual autonomy or privacy for example. While the search for a balance between these public values is far from new, ICT and data-driven technologies have undoubtedly given it a new impulse. These technologies have a complicated and multifarious relationship with security.This book combines theoretical discussions of the concepts at stake and case studies following the relevant developments of ICT and data-driven technologies. Part I sets the scene by considering definitions of security. Part II questions whether and, if so, to what extent the law has been able to regulate the use of ICT and datadriven technologies as a means to maintain, protect or raise security, in search of a balance between security and other public values, such as privacy and equality. Part III investigates the regulatory means that can be leveraged by the law-maker in attempts to secure products, organizations or entities in a technological and multiactor environment. Lastly, Part IV, discusses typical international and national aspects of ICT, security and the law.

Table of Contents
Chapter 1. Introduction: Security and Law in a Digitizing World (p. 1) Chapter 2. Safety, Security and Ethics (p. 11) Chapter 3. National and Public Security within and beyond the Police Directive (p. 27) Chapter 4. Criminal Profiling and Non-Discrimination: On Firm Grounds for the Digital Era? (p. 63) Chapter 5. Operationalization of Information Security through Compliance with Directive 2016/680 in Law Enforcement Technology and Practice (p. 97) Chapter 6. Protecting Human Rights through a Global Encryption Provision (p. 129) Chapter 7. Identity Management and Security (p. 161) Chapter 8. Towards an Obligation to Secure Connected and Automated Vehicles by Design? (p. 183) Chapter 9. The Cybersecurity Requirements for Operators of Essential Services under the NIS Directive An Analysis of Potential Liability Issues from an EU, German and UK Perspective (p. 215) Chapter 10. The 'by Design' Turn in EU Cybersecurity Law: Emergence, Challenges and Ways Forward (p. 239) Chapter 11. Promoting Coherence in the EU Cybersecurity Strategy (p. 253) Chapter 12. Challenges of the Cyber Sanctions Regime under the Common Foreign and Security Policy (CFSP) (p. 277) Chapter 13. International (Cyber)security of the Global Aviation Critical Infrastructure as a Community Interest (p. 299) Cumulative Bibliography (p. 343)

Security and Law: Legal and Ethical Aspects of

Product form

£90.25

Includes FREE delivery

RRP £95.00 – you save £4.75 (5%)

Order before 4pm today for delivery by Wed 1 Apr 2026.

A Hardback by Anton Vedder, Jessica Schroers, Charlotte Ducuing

Out of stock


    View other formats and editions of Security and Law: Legal and Ethical Aspects of by Anton Vedder

    Publisher: Intersentia Ltd
    Publication Date: 01/10/2019
    ISBN13: 9781780688893, 978-1780688893
    ISBN10: 178068889X

    Description

    Book Synopsis
    Security and law against the backdrop of technological development.Few people doubt the importance of the security of a state, its society and its organizations, institutions and individuals, as an unconditional basis for personal and societal flourishing. Equally, few people would deny being concerned by the often occurring conflicts between security and other values and fundamental freedoms and rights, such as individual autonomy or privacy for example. While the search for a balance between these public values is far from new, ICT and data-driven technologies have undoubtedly given it a new impulse. These technologies have a complicated and multifarious relationship with security.This book combines theoretical discussions of the concepts at stake and case studies following the relevant developments of ICT and data-driven technologies. Part I sets the scene by considering definitions of security. Part II questions whether and, if so, to what extent the law has been able to regulate the use of ICT and datadriven technologies as a means to maintain, protect or raise security, in search of a balance between security and other public values, such as privacy and equality. Part III investigates the regulatory means that can be leveraged by the law-maker in attempts to secure products, organizations or entities in a technological and multiactor environment. Lastly, Part IV, discusses typical international and national aspects of ICT, security and the law.

    Table of Contents
    Chapter 1. Introduction: Security and Law in a Digitizing World (p. 1) Chapter 2. Safety, Security and Ethics (p. 11) Chapter 3. National and Public Security within and beyond the Police Directive (p. 27) Chapter 4. Criminal Profiling and Non-Discrimination: On Firm Grounds for the Digital Era? (p. 63) Chapter 5. Operationalization of Information Security through Compliance with Directive 2016/680 in Law Enforcement Technology and Practice (p. 97) Chapter 6. Protecting Human Rights through a Global Encryption Provision (p. 129) Chapter 7. Identity Management and Security (p. 161) Chapter 8. Towards an Obligation to Secure Connected and Automated Vehicles by Design? (p. 183) Chapter 9. The Cybersecurity Requirements for Operators of Essential Services under the NIS Directive An Analysis of Potential Liability Issues from an EU, German and UK Perspective (p. 215) Chapter 10. The 'by Design' Turn in EU Cybersecurity Law: Emergence, Challenges and Ways Forward (p. 239) Chapter 11. Promoting Coherence in the EU Cybersecurity Strategy (p. 253) Chapter 12. Challenges of the Cyber Sanctions Regime under the Common Foreign and Security Policy (CFSP) (p. 277) Chapter 13. International (Cyber)security of the Global Aviation Critical Infrastructure as a Community Interest (p. 299) Cumulative Bibliography (p. 343)

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account