You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Besides generating wealth, globalization makes victims, including victims of new forms of crime. In this edited book of scholarly essays, international lawyers and criminologists reflect on the legal challenges posed by these dark sides of globalization. Examples include transnational organised crime, human trafficking and corruption, cyber crimes, international terrorism, global corporate crime and cross-border environmental crimes. The authors reflect on the limits of domestic systems of justice in providing protection, empowerment and redress to the victims of these emerging forms of global insecurity. They argue for the need of better international or supra-national institutional arrange...
In the eyes of many, one of the most challenging problems of the information society is that we are faced with an ever expanding mass of information. Based on the work done within the European Network of Excellence (NoE) on the Future of Identity in Information Society (FIDIS), a set of authors from different disciplinary backgrounds and jurisdictions share their understanding of profiling as a technology that may be preconditional for the future of our information society.
Governments radically change under the influence of technology. As a result, our lives in interaction with public sector bodies are easier. But the creation of an electronic government also makes us more vulnerable and dependent. Dependent not just on technology itself, but also on the organizations within government that apply technology, collect and use citizen-related information and often demand the citizens submit themselves to technological applications. This book analyzes the legal, ethical, policy and technological dimensions of innovating government. Authors from diverse backgrounds confront the reader with a variety of disciplinary perspectives on persistent themes, like privacy, b...
Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner. This includes the basic concepts, theories, and characteristic features of integrating/formulating different facets of biometric solutions for authentication, with recent developments and significant applications in an E-world. This book provides the reader with a basic concept of biometrics, an in-depth discussion exploring biometric technologies in various applications in an E-world. It also includes a detailed description of typical biometric-based security systems and up-to-date coverage of how these issues are developed. Experts from all over the world demonstrate the various ways this integration can be made to efficiently design methodologies, algorithms, architectures, and implementations for biometric-based applications in an E-world.
The use of data in society has seen an exponential growth in recent years. Data science, the field of research concerned with understanding and analyzing data, aims to find ways to operationalize data so that it can be beneficially used in society, for example in health applications, urban governance or smart household devices. The legal questions that accompany the rise of new, data-driven technologies however are underexplored. This book is the first volume that seeks to map the legal implications of the emergence of data science. It discusses the possibilities and limitations imposed by the current legal framework, considers whether regulation is needed to respond to problems raised by data science, and which ethical problems occur in relation to the use of data. It also considers the emergence of Data Science and Law as a new legal discipline.
Explores how and why European integration emerged, providing a deeper understanding of post-war Western Europe and today's European Union.
An important review of opinions about surveillance and privacy.
In the summer of 2012, the Supreme Court of Canada issued rulings on five copyright cases in a single day. The cases represent a seismic shift in Canadian copyright law, with the Court providing an unequivocal affirmation that copyright exceptions such as fair dealing should be treated as users’ rights, while emphasizing the need for a technology neutral approach to copyright law. The Court’s decisions, which were quickly dubbed the “copyright pentalogy,” included no fees for song previews on services such as iTunes, no additional payment for music included in downloaded video games, and that copying materials for instructional purposes may qualify as fair dealing. The Canadian copyr...
Internationally operating nongovernmental organisations, NGOs, are increasingly involved in international politics and policy making. In many respects their involvement resembles activities and policies that, until recently, were typical of traditional national authorities. This book is about the reasons for which NGOs can and the reasons for which NGOs cannot be considered as rightful participants in international governance. It tries to deliver rationally defensible starting points for the discussion and the assessment of claims for the legitimacy of their organizations and activities. The book focuses on the question: What conditions must ideally be met for an organization to be called truthfully legitimate, be it or be it not as a matter of fact perceived as legitimate by the public? This does not mean that empirically descriptive questions are left aside. Practical feasibility is important even to a thoroughly normative conception of legitimacy. For that reason and for heuristic purposes, large parts of this book are dedicated to the ways in which NGOs and stakeholders perceive NGO legitimacy.
This book presents the most interesting talks given at ISSE 2004 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2004.