You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Virtually all organisations collect, use, process and share personal data from their employees, customers and/or citizens. In doing so, they may be exposing themselves to risks, from threats and vulnerabilities, of that data being breached or compromised by negligent or wayward employees, hackers, the police, intelligence agencies or third-party service providers. A recent study by the Ponemon Institute found that 70 per cent of organisations surveyed had suffered a data breach in the previous year. Privacy impact assessment is a tool, a process, a methodology to identify, assess, mitigate or avoid privacy risks and, in collaboration with stakeholders, to identify solutions. Contributors to ...
This book explores the objectives pursued in donor programs, the methods used to advance them, and the underlying assumptions and strategies. It emphasizes the unexpected and sometimes unpleasant consequences of ignoring not only political and societal constraints but also advances in our technical approaches to performance improvement, the one area where the First World has a comparative advantage. The geographic scope of the work is broad, incorporating examples from Eastern and Central Europe, Latin America, Africa, and the Asia-Pacific region as well as from several First World nations. Justice Reform and Development examines First World assistance to justice or "rule of law" reforms in ...
This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare. The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the development and deployment of robots in various circumstances, including warfare.
We are delighted to introduce the proceedings of The International Conference on Environment and Technology of Law, Business and Education on Post Covid 19 – 2020 (ICETLAWBE 2020). This conference is organized by Faculty of Law Universitas Lampung, Coorporation With Universiti Teknologi MARA Cawangan Pulau Pinang Malaysia, STEBI Lampung Indonesia, Asia e University Malaysia, Rostov State University Russia, University of Diponegoro Indonesia, IAIN Palu Indonesia, Universitas Dian Nusantara Jakarta Indonesia, Universitas Islam Indonesia Yogyakarta Indonesia, Universitas Trunojoyo Madura Indonesia, STEBIS IGM Palembang Indonesia, Universitas Katolik Parahyangan Bandung Indonesia, Universitas ...
The report presents the proceedings of a conference held in May 2000 to discuss the main developments in information technology and law in Europe. It contains a number of national reports submitted by member states which consider the use of modern communication techniques in the European legal sector. Individual contributions also provide an overview of the rapid IT developments over recent decades, as well as an outlook into the technological future. Emphasis is laid on the importance for member states to provide access to legal data in such a way as to facilitate easy use by all citizens.
This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may need to be not only updated, but also supplemented and complemented by new conceptual solutions. Neither a conservative attitude (“more of the same”) nor a revolutionary zeal (“never seen before”) is likely to lead to satisfactory solutions. Instead, more reflection and better conceptual design are needed, not least to harmonise different perspectives and legal frameworks intern...
This book studies how technological solutions can be used to alleviate the current state of legal systems, with their clogged up courtrooms and inefficient conflict resolution methods. It reviews the shortcomings and disadvantages of traditional and alternative conflict resolution methods and turns to Artificial Intelligence for problem-solving techniques and solutions. The book is divided into four parts. The first part presents a general and systematic analysis of the current state of the legal systems, identifying the main problems and their causes. It then moves on to present UM Court: a framework for testing and prototyping conflict resolution services. This framework was developed with...
This book explores how the design, construction, and use of robotics technology may affect today’s legal systems and, more particularly, matters of responsibility and agency in criminal law, contractual obligations, and torts. By distinguishing between the behaviour of robots as tools of human interaction, and robots as proper agents in the legal arena, jurists will have to address a new generation of “hard cases.” General disagreement may concern immunity in criminal law (e.g., the employment of robot soldiers in battle), personal accountability for certain robots in contracts (e.g., robo-traders), much as clauses of strict liability and negligence-based responsibility in extra-contractual obligations (e.g., service robots in tort law). Since robots are here to stay, the aim of the law should be to wisely govern our mutual relationships.
This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference between hacking and computer crimes, the book explains concepts of hacktivism, the information war between states, a new form of politics (such as open data movements, radical transparency, crowd sourcing and “Twitter Revolutions”), and the hacking of political systems and of state technologies. The book focuses on the protection of human rights in countries with oppressive regimes.
This book explores the coming into being in European Union (EU) law of the fundamental right to personal data protection. Approaching legal evolution through the lens of law as text, it unearths the steps that led to the emergence of this new right. It throws light on the right’s significance, and reveals the intricacies of its relationship with privacy. The right to personal data protection is now officially recognised as an EU fundamental right. As such, it is expected to play a critical role in the future European personal data protection legal landscape, seemingly displacing the right to privacy. This volume is based on the premise that an accurate understanding of the right’s emerge...