More than 4 weeks availability
Information technology has served to revolutionise the use, exchange, and protection of information. The growth of the internet, the convergence of technologies as well as the development of user generated and social networking sites has meant that significant amounts of person data as well as copyrighted materials are now readily accessible. Within this changing cultural landscape the legal concepts of privacy, data protection, intellectual property and criminality have necessarily had to develop and adapt. In this volume a number of international scholars consider this process and whether it has merely been a question of the law adapting to technology or whether technology has been forced to adapt to law. Technologies have wrought a culture shift it is therefore apposite to ask whether legal concepts, as reflections of culture, should also change. It is in this volume where papers on privacy date protection, intellectual protection and cyber crime begin address this question. This book was published as a special issue of International review of Law Computers and Technology.
Richard Jones, Associate Editor, International Review, Law Computers and Technology has taught in areas of intellectual property and information technology law. He was invited by the Council of Europe to work in this area and awarded a Research fellowship with IBM to investigate legal expert systems. He was Chair of the British and Irish Legal Educational Technology Association (BILETA) and a Council member of the Society for Computers and the Law. Roksana Moore, Lecturer in Law and Intellectual Property, School of Law, University of Southampton is researching in vendor liability for software defects. Her research interests also include software patents, ICT standardisation and traditional knowledge and intellectual property.
1. Introduction: An uncomfortable marriage: The challenges 'new' technology is posing to 'old' or established legal concepts? Richard Jones and Roksana Moore 2. Law shaping technology: Technology shaping the law David Flint 3. Protecting 'privacy' through control of 'personal' data processing: A flawed approach Karen McCullagh 4. Is it possible to define 'privacies' within the law? Reflections on the 'securitisation' debate and the interception of communications Dan Ritchie 5. Children's data protection vs marketing companies Emmanuelle Bartoli 6. The UK 2007-2008 data protection fiasco: Moving on from bad policy and bad law? Joseph A. Cannataci and Jeanne Pia Mifsud Bonnici 7. Is identity theft really theft? Clare Sullivan 8. 'Spam, spam, spam, spam ... Lovely spam!' Why is Bluespam different? Eleni Kosta, Peggy Valcke and David Stevens 9. Agents, Trojans and tags: The next generation of investigators Wiebke Abel 10. Technology and the cultural appropriation of music Richard Jones 11. Decentralised P2P technology: Can the unruly be ruled? Hasina Haque 12. The future of copyright in the age of convergence: Is a new approach needed for the new media world? Neal Geach 13. Copyright, contract and the protection of computer programs Ruth Dawn Atkins
Number Of Pages:
- ID: 9780415614856
- Saver Delivery: Yes
- 1st Class Delivery: Yes
- Courier Delivery: Yes
- Store Delivery: Yes
Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly
© Copyright 2013 - 2016 WHSmith and its suppliers.
WHSmith High Street Limited Greenbridge Road, Swindon, Wiltshire, United Kingdom, SN3 3LD, VAT GB238 5548 36