Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
LanguageLanguage
-
SubjectSubject
-
Item TypeItem Type
-
DisciplineDiscipline
-
YearFrom:-To:
-
More FiltersMore FiltersIs Peer Reviewed
Done
Filters
Reset
97,677
result(s) for
"LAW / Computer "
Sort by:
The Wealth of Networks
by
Yochai Benkler
in
Computer networks
,
Computer networks -- Economic aspects
,
Computer networks -- Social aspects
2006,2008,2013
With the radical changes in information production that the Internet has introduced, we stand at an important moment of transition, says Yochai Benkler in this thought-provoking book. The phenomenon he describes as social production is reshaping markets, while at the same time offering new opportunities to enhance individual freedom, cultural diversity, political discourse, and justice. But these results are by no means inevitable: a systematic campaign to protect the entrenched industrial information economy of the last century threatens the promise of today's emerging networked information environment.
In this comprehensive social theory of the Internet and the networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing-and shows that the way information and knowledge are made available can either limit or enlarge the ways people can create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained-or lost-by the decisions we make today.
A Practical Guide to IT Law
by
Lucas, Andy
,
De Silva, Sam
,
Katz, Andrew
in
Computers
,
Computers-Law and legislation
,
Computers-Law and legislation-Great Britain
2020
This comprehensive guide for management professionals discusses the IT-related legal issues faced by businesses on a daily basis. Legal concepts and terminology are notoriously difficult for non-specialists, but this book explains in plain English the most relevant legal frameworks and gives examples from actual cases.
The Global War for Internet Governance
by
DeNardis, Laura
in
Internet governance
,
Internet governance -- Law and legislation
,
LAW / Computer & Internet
2014
The Internet has transformed the manner in which information is exchanged and business is conducted, arguably more than any other communication development in the past century. Despite its wide reach and powerful global influence, it is a medium uncontrolled by any one centralized system, organization, or governing body, a reality that has given rise to all manner of free-speech issues and cybersecurity concerns. The conflicts surrounding Internet governance are the new spaces where political and economic power is unfolding in the twenty-first century.This all-important study by Laura DeNardis reveals the inner power structure already in place within the architectures and institutions of Internet governance. It provides a theoretical framework for Internet governance that takes into account the privatization of global power as well as the role of sovereign nations and international treaties. In addition, DeNardis explores what is at stake in open global controversies and stresses the responsibility of the public to actively engage in these debates, because Internet governance will ultimately determine Internet freedom.
A Legal Theory for Autonomous Artificial Agents
by
White, Laurence F
,
Chopra, Samir
in
Agency (Law)
,
Computer & Internet
,
Intelligent agents (Computer software)
2011
\"An extraordinarily good synthesis from an amazing range of philosophical, legal, and technological sources . . . the book will appeal to legal academics and students, lawyers involved in e-commerce and cyberspace legal issues, technologists, moral philosophers, and intelligent lay readers interested in high tech issues, privacy, [and] robotics.\"-Kevin Ashley, University of Pittsburgh School of LawAs corporations and government agencies replace human employees with online customer service and automated phone systems, we become accustomed to doing business with nonhuman agents. If artificial intelligence (AI) technology advances as today's leading researchers predict, these agents may soon function with such limited human input that they appear to act independently. When they achieve that level of autonomy, what legal status should they have?Samir Chopra and Laurence F. White present a carefully reasoned discussion of how existing philosophy and legal theory can accommodate increasingly sophisticated AI technology. Arguing for the legal personhood of an artificial agent, the authors discuss what it means to say it has \"knowledge\" and the ability to make a decision. They consider key questions such as who must take responsibility for an agent's actions, whom the agent serves, and whether it could face a conflict of interest.
Configuring the networked self : law, code, and the play of everyday practice
by
Cohen, Julie E.
in
Access to information
,
Copyright and electronic data processing
,
Data protection
2012
The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.
Digital Forensics for Legal Professionals
by
Daniel, Lars
,
Daniel, Larry
in
Electronic discovery (Law)
,
Electronic records
,
Evidence, Documentary
2011,2012
Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics.In the authors' years of experience in working with attorneys as digital forensics experts, common questions arise again and again: \"What do I ask for?\" \"Is the evidence relevant?\" \"What does this item.
Cybercrime and the law : challenges, issues, and outcomes
2012
The first full-scale overview of cybercrime, law, and policy
The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which the computer itself is used as a tool (cyberstalking, cyberextortion, cybertheft, and embezzlement). Illuminating legal issues unique to investigations in a digital environment, Brenner examines both national law enforcement agencies and transnational crime, and shows how cyberspace erodes the functional and empirical differences that have long distinguished crime from terrorism and both from warfare.
Information Technology and Intellectual Property Law
Information Technology and Intellectual Property Law is a complete exploration of the relationship between information technology and intellectual property laws a very wide-ranging and complex, ever changing area of law. It provides up-to-date coverage and analysis of the intellectual property laws applicable to all forms of computer software. placing the law in the context of computer use examining copyright, database rights, patents, trade marks, design rights and the law of confidence. There have been numerous cases before the Court of Justice for the European Union (CJEU) recently, in particular involving the use of trade marks on the Internet, and these are analysed in detail with the implications of the judgments explained in a practical and accessible way. Information Technology and Intellectual Property Law includes developments surrounding ISPs (Internet Service Providers), for example injunctions against ISPs both in the UK and before the Court of Justice of the European Union, and coverage of the Digital Economy Act provisions. It can either be read from cover to cover as a thorough introduction to the subjects addressed or be used as a very useful starting point for a specialist practitioner faced with a particular problem on a particular case. With this in mind Information Technology and Intellectual Property Law is an essential addition to any an IT and IP practitioner’s bookshelf as well as a useful textbook for non-specialists as well as advanced undergraduate and taught postgraduate IT and IP courses.
Cybersecurity law
2017
Written in an accessible manner, this definitive guide to cybersecurity law provides real-world examples and case studies to help readers understand the practical applications of the presented material. --
Global cybercrime and cybersecurity laws and regulations : issues and challenges in the 21st century
by
Shahidullah, Shahid M.
,
Coates, Carla
,
Kersha-Aerga, Dorothy
in
Computer crimes
,
Computer crimes -- Law and legislation
,
Computer crimes -- Prevention
2022
The global Internet and cyberspace age witness a new generation of cybercriminals, hackers, cybergangs, cyber terrorists, and cyber sexual harassers. This phenomenon, broadly defined as cybercrimes, is the focus of this book. The International Telecommunication Union's Global Cyber Security Index found that about 90 percent of the world's countries have enacted laws and regulations to control and combat cybercrime. This book has examined some of those cyber laws and regulations in 12 countries, including the United States, United Kingdom, Canada, China, Russia, Japan, Singapore, Nigeria, South Africa, India, Pakistan, and Bangladesh. Different chapters of this book have found some common themes. First, in most of the countries of the world, there is an advancing process of legally criminalizing cybercrimes, including such behaviors as unauthorized access, use, and interception; damage and deletion of computer data; damage and destruction of computer networks; and dissemination and transportation of illegally obtained computer data. Second, there is high sensitivity in all countries studied about the security of the information infrastructure and their critical economic, political, and social infrastructures such as power plants, chemical industries, aviation systems, and electoral systems. Third, all forms of cybercrime committed by using the computer and the Internet are also defined as fraud and forgery, identity theft, cyber espionage, sexual harassment, cyber sexual extortion, online child pornography, and revenge pornography. One of the more critical themes that emerged is that no country defines cybersecurity as just a technical matter-a matter only of coding and decoding and encryption and decryption. Cybersecurity is also broadly perceived as a legal, political, organizational, and educational issue. It is perceived as a matter to be dealt with by a government in cooperation with international partners, potentially barring China and Russia. One of the other themes that emerged as a genuine concern is the rapid escalation of cyber sexual violence against women and minors. In most countries examined in this book, the policymakers and law enforcement believe that social media is partly responsible for increasing cyber sexual violence.