You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A legal history of the First Amendment examines how it pertains to the Internet and minors and discusses the legal ramifications of limiting access in libraries.
Electronic information networks offer extraordinary advantages to business, government, and individuals in terms of power, capacity, speed, accessibility, and cost. But these same capabilities present substantial privacy issues. With an unprecedented amount of data available in digital format--which is easier and less expensive to access, manipulate, and store--others know more about you than ever before. Consider this: data routinely collected about you includes your health, credit, marital, educational, and employment histories; the times and telephone numbers of every call you make and receive; the magazines you subscribe to and the books your borrow from the library; your cash withdrawal...
When Edward Snowden began leaking NSA documents in June 2013, his actions sparked impassioned debates about electronic surveillance, national security, and privacy in the digital age. The Snowden Reader looks at Snowden's disclosures and their aftermath. Critical analyses by experts discuss the historical, political, legal, and ethical issues raised by the disclosures. Over forty key documents related to the case are included, with introductory notes explaining their significance: documents leaked by Snowden; responses from the NSA, the Obama administration, and Congress; statements by foreign leaders, their governments, and international organizations; judicial rulings; findings of review committees; and Snowden's own statements. This book provides a valuable introduction and overview for anyone who wants to go beyond the headlines to understand this historic episode.
This text is the culmination of a nearly 6-year project to examine the systematic government access of private information from companies and other private-sector organisations. It provides 12 updated country reports to present both descriptive and normative frameworks for analysing national surveillance laws, and to focus on international law, human rights law and oversight mechanisms.
Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied...
As societies, governments, corporations and individuals become more dependent on the digital environment so they also become increasingly vulnerable to misuse of that environment. A considerable industry has developed to provide the means with which to make cyber space more secure, stable and predictable. Cyber security is concerned with the identification, avoidance, management and mitigation of risk in, or from, cyber space - the risk of harm and damage that might occur as the result of everything from individual carelessness, to organised criminality, to industrial and national security espionage and, at the extreme end of the scale, to disabling attacks against a country's critical natio...
This volume considers the impact of technological innovation on the foundations of consumer advocacy, contracting behaviour, control over intellectual capital and information privacy. A unique and timely perspective on these issues is presented by internationally renowned experts who provide novel approaches to the question of what consumer protection might consist of in the context of technological innovation.
Daniel Solove presents a startling revelation of how digital dossiers are created, usually without the knowledge of the subject, & argues that we must rethink our understanding of what privacy is & what it means in the digital age before addressing the need to reform the laws that regulate it.
The rise of the World Wide Web is challenging traditional concepts of jurisdiction, governance, and sovereignty. Many observers have praised the Internet for its ubiquitous and "borderless" nature and argued that this global medium is revolutionizing the nature of modern communications. Indeed, in the universe of cyberspace there are no passports and geography is often treated as a meaningless concept. But does that mean traditional concepts of jurisdiction and governance are obsolete? When legal disputes arise in cyberspace, or when governments attempt to apply their legal standards or cultural norms to the Internet, how are such matters to be adjudicated? Cultural norms and regulatory appr...
This study rebuts much of the traditional rationale for regulatory restrictions and provides a list of principles of regulation that would serve as a model for global accounting practices.