Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
93,453
result(s) for
"Law -- Computer "
Sort by:
Legal education in the digital age
\"During the coming decades, the digital revolution that has transformed so much of our world will transform legal education as well. The digital production and distribution of course materials will powerfully affect both the content and the way materials are used in the classroom and library. This collection of essays by leading legal scholars in various fields explores three aspects of this coming transformation. The first set of essays discusses the way digital materials will be created and how they will change concepts of authorship as well as methods of production and distribution. The second set explores the impact of digital materials on law school classrooms and law libraries, and the third set considers the potential transformation of the curriculum that the materials are likely to produce. Taken together, these essays provide a guide to momentous changes that every legal teacher and scholar needs to understand\"
The Wealth of Networks
by
Yochai Benkler
in
Computer networks
,
Computer networks -- Economic aspects
,
Computer networks -- Social aspects
2006,2008,2013
With the radical changes in information production that the Internet has introduced, we stand at an important moment of transition, says Yochai Benkler in this thought-provoking book. The phenomenon he describes as social production is reshaping markets, while at the same time offering new opportunities to enhance individual freedom, cultural diversity, political discourse, and justice. But these results are by no means inevitable: a systematic campaign to protect the entrenched industrial information economy of the last century threatens the promise of today's emerging networked information environment.
In this comprehensive social theory of the Internet and the networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing-and shows that the way information and knowledge are made available can either limit or enlarge the ways people can create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained-or lost-by the decisions we make today.
A Practical Guide to IT Law
by
Lucas, Andy
,
De Silva, Sam
,
Katz, Andrew
in
Computers
,
Computers-Law and legislation
,
Computers-Law and legislation-Great Britain
2020
This comprehensive guide for management professionals discusses the IT-related legal issues faced by businesses on a daily basis. Legal concepts and terminology are notoriously difficult for non-specialists, but this book explains in plain English the most relevant legal frameworks and gives examples from actual cases.
A Legal Theory for Autonomous Artificial Agents
by
White, Laurence F
,
Chopra, Samir
in
Agency (Law)
,
Computer & Internet
,
Intelligent agents (Computer software)
2011
\"An extraordinarily good synthesis from an amazing range of philosophical, legal, and technological sources . . . the book will appeal to legal academics and students, lawyers involved in e-commerce and cyberspace legal issues, technologists, moral philosophers, and intelligent lay readers interested in high tech issues, privacy, [and] robotics.\"-Kevin Ashley, University of Pittsburgh School of LawAs corporations and government agencies replace human employees with online customer service and automated phone systems, we become accustomed to doing business with nonhuman agents. If artificial intelligence (AI) technology advances as today's leading researchers predict, these agents may soon function with such limited human input that they appear to act independently. When they achieve that level of autonomy, what legal status should they have?Samir Chopra and Laurence F. White present a carefully reasoned discussion of how existing philosophy and legal theory can accommodate increasingly sophisticated AI technology. Arguing for the legal personhood of an artificial agent, the authors discuss what it means to say it has \"knowledge\" and the ability to make a decision. They consider key questions such as who must take responsibility for an agent's actions, whom the agent serves, and whether it could face a conflict of interest.
The Global War for Internet Governance
by
DeNardis, Laura
in
Internet governance
,
Internet governance -- Law and legislation
,
LAW / Computer & Internet
2014
The Internet has transformed the manner in which information is exchanged and business is conducted, arguably more than any other communication development in the past century. Despite its wide reach and powerful global influence, it is a medium uncontrolled by any one centralized system, organization, or governing body, a reality that has given rise to all manner of free-speech issues and cybersecurity concerns. The conflicts surrounding Internet governance are the new spaces where political and economic power is unfolding in the twenty-first century.This all-important study by Laura DeNardis reveals the inner power structure already in place within the architectures and institutions of Internet governance. It provides a theoretical framework for Internet governance that takes into account the privatization of global power as well as the role of sovereign nations and international treaties. In addition, DeNardis explores what is at stake in open global controversies and stresses the responsibility of the public to actively engage in these debates, because Internet governance will ultimately determine Internet freedom.
Listening in : cybersecurity in an insecure age
\"New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.\"--Inside dust jacket.
Configuring the networked self : law, code, and the play of everyday practice
by
Cohen, Julie E.
in
Access to information
,
Copyright and electronic data processing
,
Data protection
2012
The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.