You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This topical book examines the regulatory framework for introducing generic Top-Level Domains on the Internet. Drawn up by the Internet Corporation for Assigned Names and Numbers (ICANN), these rules form part of a growing body of transnational private regulation, complementing national and international law. The book elucidates and discusses how ICANN has tackled a diverse set of economic and regulatory issues, including competition, consumer protection, property rights, procedural fairness, and the resolution of disputes.
Adaptation of applied information and communication technologies (ICT) research results is one of the greatest challenges faced in building the global knowledge economy. This set of two books brings together a collection of contributions on commercial, government or societal exploitation of applied ICT.
This timely and original book provides an exploration of the factors that combine to determine the form of regulatory problems and the overall success or failure of regulation. Using environmental regulation as a basis for analysis, this book puts forward a theoretical framework for the design of effective regulation and demonstrates how businesses’ compliance with environmental regulation, in particular, could be improved.
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk Assessment and Risk-driven Testing, RISK 2013, held in conjunction with 25th IFIP International Conference on Testing Software and Systems, ICTSS 2013, in Istanbul, Turkey, in November 2013. The revised full papers were carefully reviewed and selected from 13 submissions. The papers are organized in topical sections on risk analysis, risk modeling and risk-based testing.
This book constitutes the refereed proceedings of the Third International Conference on Trust Management, iTrust 2005, held in Paris, France in May 2005. The 21 revised full papers and 4 revised short papers presented together with 2 keynote papers and 7 trust management tool and systems demonstration reports were carefully reviewed and selected from 71 papers submitted. Besides technical issues in distributed computing and open systems, topics from law, social sciences, business, and psychology are addressed in order to develop a deeper and more comprehensive understanding of current aspects and challenges in the area of trust management in dynamic open systems.
The term “risk” is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stølen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specia...
The EU Digital Services Act (DSA) provides a comprehensive framework regulating the provision of digital intermediary services in the EU internal market. It clarifies the conditions under which service providers can avoid being held liable for their users’ illegal content, establishes a set of harmonized duties they must follow, and sets broad safeguards for users’ rights. As an extensive article-by-article commentary, this book offers a comprehensive guide to the complex web of the DSA’s tightly intertwined provision. On a systemic level, it also contextualizes the DSA by exploring its relationship to other relevant legal instruments, such as those related to consumer protection, data...
Measurement at millimeter-wave frequencies are prone to parasitic effects which distort the overall results. Especially the use of RF probes introduces unknown distortions, even after the measurement setup is calibrated. This works investigates these distortions based on electromagnetic field simulations of integrated circuits in conjunction with models of the used RF probes. This allows to comprehend the observed distortions and successfully resolve the root of the distortions.
Radar target simulators (RTSs) deceive a radar under test (RuT) by creating an artificial environment consisting of virtual radar targets. In this work, new techniques are presented that overcome the rasterization deficiency of current RTS systems and enable the generation of virtual targets at arbitrary high-precision positions. This allows for continuous movement of the targets and thus a more credible simulation environment.
The Internet is now a key part of everyday life across the developed world, and growing rapidly across developing countries. This Handbook provides a comprehensive overview of the latest research on Internet governance, written by the leading scholars in the field. With an international focus, it features contributions from lawyers, economists and political scientists across North America, Europe and Australia. They adopt a broad multidisciplinary perspective, taking in law, economics, political science, international relations, and communications studies. Thought-provoking chapters cover topics such as ICANN, the Internet Governance Forum, grassroots activism, innovation, human rights, privacy in social networks, and network neutrality. Being a forward-looking guide for the next decade, this Research Handbook will strongly appeal to scholars and graduate students in the social sciences studying and researching Internet governance, political scientists, economists, lawyers and computer scientists working on governance issues, as well as regulators and policymakers responsible for Internet governance in national governments and intergovernmental organisations.