Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 270

Privacy-invading technologies (PITs) such as Body scanners; Public space CCTV microphones; Public space CCTV loudspeakers and Human-implantable microchips (RFID implants/GPS implants) are dealt with in this book. The book shows how and why laws that regulate the design and development of privacy-invading technologies (PITs) may more effectively ensure the protection of privacy than laws that only regulate data controllers and the use of such... more...

Social media has transformed how the world communicates. Its impact has been felt in every corner of our society including the law. Social Media Law in a Nutshell is a wide-ranging look of how the social media transformation has impacted various legal fields. From marketing to employment to torts to criminal law to copyright and beyond, virtually every legal field has been changed by social media. By looking at high level concerns and example cases,... more...

Decentering Biotechnology explores the nature of technology, objects and patent law. Investigating the patenting of organic life and the manner in which artifacts of biotechnology are given their object-ive appearance, Carolan details the enrollment mechanisms that give biotechnology its momentum. Drawing on legal judgements and case studies, this fascinating book examines the nature of object-ification, as a thought and a thing, without which... more...

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow, Russia. The 16 revised full papers presented together with 2 extended abstracts and 1 poster paper were carefully reviewed and selected from 38 submissions. The papers cover diverse topics in the field of digital forensics and cybercrime,... more...

Millions of children have been born in the United States with the help of cutting-edge reproductive technologies, much to the delight of their parents. But alarmingly, scarce attention has been paid to the lax regulations that have made the U.S. a major fertility tourism destination. And without clear protections, the unique rights and needs of the children of assisted reproduction are often ignored.   This book is the first to... more...


This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks... more...

This book explores the transformational impact of new technological developments on legal practice. More specifically, it addresses knowledge management, communication, and e-discovery related technologies, and helps readers develop the project management and data analysis skills needed to effectively navigate the current, and future, landscapes. It studies the impact of current trends on business practices, as well as the ethical,... more...

Digital technology has made culture more accessible than ever before. Texts, audio, pictures and video can easily be produced, disseminated, used and remixed using devices that are increasingly user-friendly and affordable. However, along with this technological democratization comes a paradoxical flipside: the norms regulating culture's use - copyright and related rights - have become increasingly restrictive. This book brings together essays by... more...

The general theme of this volume is contemporary armed conflicts and their implications for international humanitarian law. It is elaborated upon in several chapters, dealing with a variety of topics related to, among other things, the situations in Libya, Transnistria, Mexico, Syria/Iraq (Islamic State) and Israel/Gaza. Besides these chapters that can be connected to the general theme, this volume also contains a chapter dedicated to... more...

This Brief presents the overarching framework in which each nation is developing its own cyber-security policy, and the unique position adopted by France.  Modern informational crises have penetrated most societal arenas, from healthcare, politics, economics to the conduct of business and welfare. Witnessing a convergence between information warfare and the use of “fake news”, info-destabilization, cognitive warfare and... more...