You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The regulation of technology is an important and topical area of law, relevant to almost all aspects of society. Technology Law: Australian and International Perspectives presents a thorough exploration of the new legal challenges created by evolving technologies, from the use of facial recognition technology in criminal investigations to the rise and regulation of cryptocurrencies. A well-written and fascinating introduction to technology law in Australia and internationally, Technology Law provides thorough coverage of the theoretical perspectives, legislation, cases and developing issues where technology and the law interact. The text covers data protection and privacy, healthcare technology, criminal justice technology, commercial transactions, cybercrime, social media and intellectual property, and canvasses the future of technology and technology law. Written by leading experts in the field, Technology Law is an excellent resource for law students and legal professionals with an interest in the area.
Australian Uniform Evidence Law provides a clear, accessible introduction to the law of evidence.
This book addresses the use of biometrics – including fingerprint identification, DNA identification and facial recognition – in the criminal justice system: balancing the need to ensure society is protected from harms, such as crime and terrorism, while also preserving individual rights. It offers a comprehensive discussion of biometric identification that includes a consideration of: basic scientific principles, their historical development, the perspectives of political philosophy, critical security and surveillance studies; but especially the relevant law, policy and regulatory issues. Developments in key jurisdictions where the technology has been implemented, including the United K...
As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been prevented. Very little has been written about what follows: the capture, possible extradition, prosecution, sentencing and incarceration of the cyber criminal. Originally published in 2004, this book provides an international study of the manner in which cyber criminals are dealt with by the judicial process. It is a sequel to the groundbreaking Electronic Theft: Unlawful Acquisition in Cyberspace by Grabosky, Smith and Dempsey (Cambridge University Press, 2001). Some of the most prominent cases from around the world are presented in an attempt to discern trends in the handling of cases, and common factors and problems that emerge during the processes of prosecution, trial and sentencing.
This book explores the recent surge in true crime by critically exploring how murder and violence are represented in documentaries, films, podcasts, museums, novels and in the press, and the effects. From a range of contributors, it touches on a wide variety of topics overall and illustrates how examining true crime across the changing popular media landscape can contribute to important debates in contemporary culture and society. It encourages a critical eye towards understanding the harmful stereotypes, myths and misinformation that popular media can bring. Arranged into four sections, including: true crime trials, representations of victims, the consumption of serial killer narratives, an...
This Research Handbook on Transnational Crime is an interdisciplinary, up-to-date guide to this growing field, written by an international cohort of leading scholars and experts. It covers all the major areas of transnational crime, providing a well-rounded, detailed discussion of each topic, and includes chapters focusing on responses to transnational crime in specific regions.
This book centres on Webcam Child Sex Tourism and the Sweetie Project initiated by the children’s rights organization Terre des Hommes in 2013 in response to the exponential increase of online child abuse. Webcam child sex tourism is a growing international problem, which not only encourages the abuse and sexual exploitation of children and provides easy access to child-abuse images, but which is also a crime involving a relatively low risk for offenders as live-streamed webcam performances leave few traces that law enforcement can use. Moreover, webcam child sex tourism often has a cross-border character, which leads to jurisdictional conflicts and makes it even harder to obtain evidence,...
Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to global shipping following a terrorist attack on a leading regional port such as Hong Kong or Singapore. Considerable efforts have also been undertaken to improve responses to an array of maritime security threats, such as transnational crime, environmental pollution, and piracy and armed robbery. This volume identifies those issues that particularly affect Austr...
This text provides an account and an analysis of key issues within the field of cybercrime. It focuses on different constructions and manifestations of cybercrime and diverse responses to its regulation.
This collection is innovative and original. It introduces new knowledge and is very timely because of the current high profile of the international public discourse over security, the internet and its impact upon the growth of the information economy. The book will be very useful to a wide range of readers because it will both inform and provide the basis for instruction. This book significantly advances the scholarly literature available on the global problem of cyber-crime. It also makes a unique contribution to the literature in this area. Much of what has been written focuses on cyber-crime in the United States and in Europe. This much-needed volume focuses on how cyber-crime is being dealt with in Asian countries. It explains how law enforcement is responding to the complex issues cyber-crime raises and analyzes the difficult policy issues this new type of transnational crime generates. This book is an invaluable addition to the library of anyone who is concerned about online crime, computer security or the emerging culture of the Internet.