You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Cyberspace has become the ultimate frontier and central issue of international conflict, geopolitical competition, and security. Emerging threats and technologies continuously challenge the prospect of an open, secure, and free cyberspace. Additionally, the rising influence of technology on society and culture increasingly pushes international diplomacy to establish responsible state behavior in cyberspace and internet governance against the backdrop of fragmentation and polarization. In this context, novel normative practices and actors are emerging both inside and outside the conventional sites of international diplomacy and global governance. In Hybridity, Conflict, and the Global Politic...
Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary boundaries, this timely book brings together researchers in fields ranging from international law, international relations, and political science to business studies and philosophy to explore the theme of responsible state behavior in cyberspace. . Divided into three parts, Governing Cyberspace first looks at current debates in and about international law and diplomacy in cyberspace. How does int...
This book offers a new look at international security management combining practical applications and theoretical foundations for new solutions to today’s complex security and safety challenges. The book’s focus on safety as a positive experience complements the traditional approach to safety as risks and threats. In addition, its multi-stakeholder, multi-disciplinary, international and evidence-based approach provides holistic and timely insights for the field. Topics raised in this book focus on the crucial questions of: Who is safety actually for? (and) How can sustainable safety solutions be jointly created? This book provides comprehensive insights into the latest research findings,...
The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Each communication exchange contains an identifier which may, or may not, be intended by the parties involved. What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked infonnation society? th th From the 6 to the 10 August 2007, IFIP (International Federation for Infonnation Processing) working groups 9. 2 (Social Accountability), 9. 6/11. 7 (IT rd Misuse and the Law) and 11. 6 (Identity Management) hold the...
The focus of this book is on the epistemological and hermeneutic implications of data science and artificial intelligence for democracy and the Rule of Law. How do the normative effects of automated decision systems or the interventions of robotic fellow ‘beings’ compare to the legal effect of written and unwritten law? To investigate these questions the book brings together two disciplinary perspectives rarely combined within the framework of one volume. One starts from the perspective of ‘code and law’ and the other develops from the domain of ‘law and literature’. Integrating original analyses of relevant novels or films, the authors discuss how computational technologies challenge traditional forms of legal thought and affect the regulation of human behavior. Thus, pertinent questions are raised about the theoretical assumptions underlying both scientific and legal practice.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Trento, Italy, in September 2011. The 20 revised papers were carefully selected from numerous submissions during two rounds of reviewing. The book also contains two invited talks. The papers are organized in topical sections on privacy metrics and comparison, policies, privacy transparency in the age of cloud computing, privacy for mobile applications, consumer privacy, privacy for online communities, privacy for eHealth and eID applications, privacy attacks and problems, and ethics.
This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.
Law, Human Agency and Autonomic Computing interrogates the legal implications of the notion and experience of human agency implied by the emerging paradigm of autonomic computing, and the socio-technical infrastructures it supports. The development of autonomic computing and ambient intelligence – self-governing systems – challenge traditional philosophical conceptions of human self-constitution and agency, with significant consequences for the theory and practice of constitutional self-government. Ideas of identity, subjectivity, agency, personhood, intentionality, and embodiment are all central to the functioning of modern legal systems. But once artificial entities become more autonom...
Human information and communication technology (ICT) implants have developed for many years in a medical context. Such applications have become increasingly advanced, in some cases modifying fundamental brain function. Today, comparatively low-tech implants are being increasingly employed in non-therapeutic contexts, with applications ranging from the use of ICT implants for VIP entry into nightclubs, automated payments for goods, access to secure facilities and for those with a high risk of being kidnapped. Commercialisation and growing potential of human ICT implants have generated debate over the ethical, legal and social aspects of the technology, its products and application. Despite stakeholders calling for greater policy and legal certainty within this area, gaps have already begun to emerge between the commercial reality of human ICT implants and the current legal frameworks designed to regulate these products. This book focuses on the latest technological developments and on the legal, social and ethical implications of the use and further application of these technologies.
None