You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The research program Information Management and Market Engineering focuses on the analysis and the design of electronic markets. Taking a holistic view of the conceptualization and realization of solutions, the research integrates the disciplines business administration, economics, computer science, and law. Topics of interest range from the implementation, quality assurance, and further development of electronic markets to their integration into business processes, innovative business models, and legal frameworks.
This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised full papers and 4 revised short papers are presented together with 1 keynote paper and 7 trust management tool and systems demonstration reports. Besides technical issues in distributed computing and open systems, topics from law, social sciences, business, and philosophy are addressed.
This book examines central aspects of the new technologies and the legal questions raised by them from both an international and an inter-disciplinary perspective. The technology revolution and the global networking of IT systems pose enormous challenges for the law. Current areas of discussion relate to autonomous systems, big data and issues surrounding legal tech. Ensuring data protection and IT security as well as the creation of a legal framework for the new technology as a whole can only be achieved through international and inter-disciplinary co-operation. The team of authors is made up of experienced, internationally renowned experts as well as young researchers and professionals who give valuable insights from numerous different jurisdictions. This book is written for jurists and those responsible for technology in public authorities and companies as well as practising lawyers and researchers.
This book provides a comprehensive, interdisciplinary analysis of the Trade & Cooperation Agreement (TCA) between the European Union (EU) and the United Kingdom (UK). It unpacks the complex provisions of the agreement, identifies emerging security challenges, and examines the evolution of EU-UK trade relations as a result of the Windsor Framework.
The preservation of private data is a main concern of governments, organizations, and individuals alike. For individuals, a breach in personal information can mean dire consequences for an individual’s finances, medical information, and personal property. Identity Theft: Breakthroughs in Research and Practice highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one’s identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity theft, and outlooks for the future. This publication is an essential resource for information security professionals, researchers, and graduate-level students in the fields of criminal science, business, and computer science.
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For priv...
Technological advances related to legal information, knowledge representation, engineering, and processing have aroused growing interest within the research community and the legal industry in recent years. These advances relate to areas such as computational and formal models of legal reasoning, legal data analytics, legal information retrieval, the application of machine learning techniques to different legal tasks, and the experimental evaluation of these systems. This book presents the proceedings of JURIX 2023, the 36th International Conference on Legal Knowledge and Information Systems, held from 18–20 December 2023 in Maastricht, the Netherlands. This annual conference has become re...
The Internet is a remarkable catalyst for creativity, collaboration and innovation providing us with amazing possibilities that just two decades ago would have been impossible to imagine. This work includes a peer-reviewed collection of scientific papers addressing some of the challenges that shape the Internet of the future.
This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2009), which was held in Venice, Italy, during October 27-28, 2009. DSOM 2009 was the 20th event in a series of annual workshops. It followed in the footsteps of previous successful meetings, the most recent of which were held on Samos, Greece (DSOM 2008), San Jos ́ e, California, USA (DSOM 2007), Dublin, Ireland (DSOM 2006), Barcelona, Spain (DSOM 2005), and Davis, C- ifornia, USA (DSOM 2004). The goal of the DSOM workshops is to bring - gether researchersfromindustry andacademia workingin the areasofnetworks, systems, and service management, to discuss recent advances and foster future growth. In contrast to the larger management conferences, such as IM (Inter- tional Symposium on Integrated Network Management) and NOMS (Network OperationsandManagementSymposium),DSOMworkshopshaveasingle-track program in order to stimulate more intense interaction among participants.
Law and technology present humanity with challenges and opportunities. This international research volume is dedicated to three of their pillars: artificial intelligence, blockchain and digital platforms. The authors' contributions analyze these topics from different perspectives of public and private law in the German, Austrian, European, American, Japanese, and Latin American contexts.