Computer law review and technology journal |
Pubbl/distr/stampa | Dallas, Tex., : Southern Methodist University School of Law, 1996-[2006] |
Descrizione fisica | v. : ill. ; ; 28 cm |
Disciplina | 004 |
Soggetto topico |
Computers - Law and legislation - United States
Computer networks - Law and legislation - United States Computer networks - Law and legislation Computers - Law and legislation |
Soggetto genere / forma |
Law reviews.
Periodicals. Electronic journals. |
ISSN | 1544-9262 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | SMU Science and Technology Law Review |
Record Nr. | UNISA-996211744703316 |
Dallas, Tex., : Southern Methodist University School of Law, 1996-[2006] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Conflicts, crimes and regulations in cyberspace / / edited by Sebastien-Yves Laurent |
Pubbl/distr/stampa | Hoboken, NJ : , : John Wiley & Sons, Inc., , 2021 |
Descrizione fisica | 1 online resource (240 pages) |
Disciplina | 364.168 |
Soggetto topico |
Computer crimes
Computer networks - Law and legislation |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-88507-8
1-119-88509-4 1-119-88508-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910555142303321 |
Hoboken, NJ : , : John Wiley & Sons, Inc., , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Conflicts, crimes and regulations in cyberspace / / edited by Sebastien-Yves Laurent |
Pubbl/distr/stampa | Hoboken, NJ : , : John Wiley & Sons, Inc., , 2021 |
Descrizione fisica | 1 online resource (240 pages) |
Disciplina | 364.168 |
Soggetto topico |
Computer crimes
Computer networks - Law and legislation |
ISBN |
1-119-88507-8
1-119-88509-4 1-119-88508-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910830514903321 |
Hoboken, NJ : , : John Wiley & Sons, Inc., , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber infrastructure protection / / Tarek Saadawi, Louis Jordan, editors |
Pubbl/distr/stampa | Carlisle, PA : , : Strategic Studies Institute, , 2011- |
Descrizione fisica | 1 online resource (volumes) : illustrations (some color) |
Soggetto topico |
Cyberinfrastructure - Security measures
Computer networks - Security measures Cyberterrorism - Prevention Cyberinfrastructure - Law and legislation Computer networks - Law and legislation Cyberterrorism - Law and legislation |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Volume I. Introduction -- part I. Strategy and policy aspects. -- part II. Social and legal aspects. -- part III. Technical aspects. -- Volume II. Introduction -- part I. Economics and social aspects of cyber security. -- part II. Law and cybercrime. -- part III. Cyber infrastructure. -- Volume III. part I. Cybersecurity policy, strategy, and cybercrime. -- part II. Cybersecurity of smart cities. -- part III. Cyber infrastructure security. |
Altri titoli varianti | Cyber infrastructure protection |
Record Nr. | UNINA-9910706217903321 |
Carlisle, PA : , : Strategic Studies Institute, , 2011- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data sovereignty : from the digital silk road to the return of the state / / edited by Anupam Chander, Haochen Sun |
Pubbl/distr/stampa | New York, NY : , : Oxford University Press, , [2023] |
Descrizione fisica | 1 online resource (0 pages) |
Disciplina | 343.09944 |
Soggetto topico |
Internet - Law and legislation
Data protection - Law and legislation Data transmission systems - Law and legislation Digital media - Law and legislation Privacy, Right of Computer networks - Law and legislation |
ISBN |
0-19-758282-6
0-19-758281-8 0-19-758280-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Title Page -- Copyright Page -- Contents -- List of Contributors -- Introduction: Sovereignty 2.0 -- I. Defining Digital Sovereignty -- II. The Rise of Digital Sovereignty -- A. China: Inventing Digital Sovereignty -- B. The EU: Embracing Digital Sovereignty -- C. Russia: Promoting the Runet -- D. The United States: Digital Sovereignty by Default -- E. The Global South: Avoiding Data Colonialism -- III. How Digital Sovereignty Is Different -- A. Always Global -- B. Against Corporations -- C. More Control -- D. Enables Protectionism -- IV. Digital Sovereignty and the Russian Invasion of Ukraine -- V. The Plan for This Volume -- Part I Retheorizing Digital Sovereignty -- 1. Two Visions for Data Governance: Territorial vs. Functional Sovereignty -- I. Introducing Functional Sovereignty -- II. Asserting Functional Sovereignty -- III. Conclusion -- 2. A Starting Point for Re-thinking "Sovereignty" for the Online Environment -- I. Introduction -- II. The Point of Departure: Sovereignty Applies Online, but How? -- III. Three Examples Showcasing the Messy State of Sovereignty -- A. Sovereignty and Law Enforcement Access to Data -- B. Sovereignty and Content Removal Orders -- C. Sovereignty and Peacetime Cyber Espionage -- IV. Sovereignty and the Four Functions of International Law -- V. The Binary Nature of the Current Concept of Sovereignty -- VI. Sovereignty = "State" + "Exclusiveness"? -- VII. Sovereignty- Rule or Principle? -- VIII. "State Dignity"-the Core of Sovereignty -- A. Sovereignty Anchored in State Dignity-A Brief Illustration -- IX. Digital/Data Sovereignty-Political Slogan or Anchored in International Law? -- X. Concluding Remarks -- 3. Digital Sovereignty as Double-Edged Sword -- I. Introduction -- II. What Is Digital Sovereignty For? -- III. The Double-Edged Sword of Digital Sovereignty -- A. Speech -- B. Privacy.
C. National Security -- IV. Conclusion -- 4. From Data Subjects to Data Sovereigns: Addressing the Limits of Data Privacy in the Digital Era -- I. Introduction -- II. Data Subjects vs. Data Sovereigns -- III. Data Privacy in the Time of Pandemic -- A. The Challenge of Non-Personalized Data -- B. From Tracking the Pandemic to Tracking Individuals -- C. The Illusory Promise of Consent -- IV. Beyond Privacy: From Data Subjects to Data Sovereigns -- V. Conclusion -- Part II Technology and Economic Institutions -- 5. Digital Sovereignty + Artificial Intelligence -- I. Introduction -- II. How Digital Sovereignty Might Influence AI -- A. Three Models -- B. Implications -- III. How AI Might Influence Digital Sovereignty? -- A. Three Models -- B. Implications -- IV. Key Variables -- A. Access to Training Data -- B. Industrial Policy -- C. National Laws and Norms -- D. Attitudes toward AI-Powered Machines -- V. Conclusion -- 6. Taobao, Federalism, and the Emergence of Law, Chinese Style -- I. Introduction -- II. Development and Legal Market Infrastructure -- III. Federalism, Chinese Style: Delegation and the Origins of Chinese Political and Economic Reform, 1981-1993 -- IV. Taobao and Law, Chinese Style -- A. Evolution of Law, Chinese Style -- B. Taobao Creates a Market -- C. Taobao's Private Legal System -- V. Taobao and the Evolution of Federalism, Chinese Style: Recentralization -- A. Decentralization and the Incomplete Common Market -- B. Taobao and the Formation of a Common Market -- C. Taobao and Recentralization -- VI. Conclusion -- 7. Leveling the Playing Field between Sharing Platforms and Industry Incumbents: Good Regulatory Practices? -- I. Introduction: Increasing Regulatory Fragmentation -- II. A Case Study: Regulating the Sharing Economy and Its "Enemies" -- A. Innovation: The Sharing Platforms -- B. Competition: The Incumbents. C. Regulation: Dynamic and Divergent Approaches -- III. Regulatory Cooperation on Platform Regulations: Good Regulatory Practices? -- A. Regulatory Cooperation Trends in the Regional Trade Agreements -- B. Good Regulatory Practices for Platform Regulations? -- IV. Conclusion: Regulatory Cooperation and Sovereignty -- 8. The Emergence of Financial Data Governance and the Challenge of Financial Data Sovereignty -- I. Introduction -- II. The Datafication of Finance -- III. Financial Data Governance and General Data Governance -- A. Regulating Financial Data -- B. The Evolution of Data Governance Styles -- IV. Open Banking -- V. Financial Data Governance Strategies -- A. Property-Based: United States -- B. Rights-Based: European Union -- C. Shared Resource: China -- D. Hybrid Models -- VI. Financial Data Sovereignty: Localization vs. Globalization -- A. Regulatory Fragmentation -- B. Territorialization and Data Localization -- VII. The Data Sovereignty Challenge -- Part III Trade Regulation -- 9. Data Sovereignty and Trade Agreements: Three Digital Kingdoms -- I. Data Sovereignty -- II. Data Sovereignty and Trade Agreements -- III. United States: The Firm Sovereignty Model -- A. Firm Sovereignty -- B. Privacy as a Consumer Right -- C. Security as a Business Risk -- D. Trade Agreements -- IV. China: The State Sovereignty Model -- A. Data Sovereignty -- B. Trade Agreements -- C. Personal Information Protection -- D. "Important Data" and "Core Data" -- V. EU: The Individual Sovereignty Model -- A. The GDPR -- B. Digital Sovereignty -- C. Data Flow and Localization -- D. Trade Agreements -- VI. Why the Differences? -- VII. Conclusion -- 10. Data Governance and Digital Trade in India: Losing Sight of the Forest for the Trees? -- I. Introduction -- II. Data Governance in India: Multiple Narratives, Multiple Frameworks -- A. Underlying Ideas of Data Governance. B. Policy Goals in Data Governance Instruments -- C. The "Data Governance Complex" in India -- III. Data Governance and Influences on Digital Trade Policies in India -- A. The Nexus of Data Governance and Digital Trade -- B. Digital Trade Policies Reinforce the Data Governance Complex -- C. India in the Global Digital Trade Framework -- IV. Conclusion -- 11. Creating Data Flow Rules through Preferential Trade Agreements -- I. Introduction -- II. Digital Trade Provisions in PTAs -- A. Developments over Time -- B. Overview of Data-Related Rules in PTAs -- III. Different PTA Templates for Digital Trade Governance -- A. The U.S. Template -- B. The Digital Trade Agreements of the European Union -- C. The RCEP -- IV. Conclusion -- Part IV Data Localization -- 12. Personal Data Localization and Sovereignty along Asia's New Silk Roads -- I. Types of "Data Sovereignty" and "Data Localization" -- II. China, Russia, and Near Neighbors on the New Silk Roads -- A. China's Data Localizations -- B. Russia's Data Localizations -- C. Comparison of Chinese and Russian Localizations -- III. South Asia: Three Bills Include Localizations -- A. Regional Agreements -- B. India -- C. Sri Lanka -- D. Pakistan -- E. Comparison of South Asian Provisions -- IV. Central Asia: Five Laws Include Some Localizations -- A. International and Regional Agreements -- B. Data Localization Measures in National Laws -- C. Local Processing and Storage (Loc #1 and #2) -- D. Data Export Conditions and Prohibitions (Loc #3 and #4) -- E. Extraterritoriality and Local Representation (Loc #5 and #6) -- F. "Outsourcing Exemptions" -- G. Comparison of Central Asian Provisions -- V. How Relevant Are Free Trade Agreements? -- A. Adequacy and the GATS -- B. The Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) -- C. The Regional Comprehensive Economic Partnership (RCEP). D. FTAs and the Future of Data Localization -- VI. Conclusion -- 13. Lessons from Internet Shutdowns Jurisprudence for Data Localization -- I. Motivations of Data Localization -- A. Cybersecurity-Protection (Control) of Domestic People -- B. Nurturing Domestic Digital Players and Tax Revenues -- II. Trade Rules Applied to Data Localizations -- A. Applicability of Trade Rules -- B. Trade-Rules-Based Arguments against Data Localization -- III. Regulating Internet Shutdowns through Human Rights Norms -- A. United Nations -- B. UN Special Rapporteurs on Freedom of Expressions -- C. Joint Declarations of Special Rapporteurs on Freedom of Expression -- D. Europe -- E. Turkish Domestic Courts -- F. Americas -- G. Brazil Domestic Courts -- H. Africa -- I. Asia -- IV. Adaptation of the Internet Shutdown Jurisprudence for Data Localization -- A. Synthesis of Jurisprudence on Internet Shutdowns -- B. Adaptation to Data Localization -- V. Conclusion -- 14. European Digital Sovereignty, Data Protection, and the Push toward Data Localization -- I. The Push Toward Data Localization in Europe -- II. The Need to Better Understand the Reasons behind Calls for Data Localization -- III. The Influence of the Schrems II Judgment of the CJEU -- A. The Starting Point: Data Localization Is Not in the GDPR's DNA -- B. Calls for Data Localization After Schrems II -- C. Initial EDPB Guidance: Toward De Facto Data Localization -- D. The New Model SCC's and EDPB's Final Guidance: A Degree of Room for a Risk-Based Approach? -- E. Intensification of Enforcement of Schrems II by European DPAs and Rejection of a Risk-Based Approach -- IV. Conclusion. |
Record Nr. | UNINA-9910767597003321 |
New York, NY : , : Oxford University Press, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digisprudence : code as law rebooted / / Laurence Diver |
Autore | Diver Laurence |
Pubbl/distr/stampa | Edinburgh : , : Edinburgh University Press, , [2022] |
Descrizione fisica | 1 online resource (276 pages) : illustrations |
Disciplina | 343.09/944 |
Collana | Future Law : FULA |
Soggetto topico |
Computer networks - Law and legislation
Computer programming Computer programming - Social aspects Cyberspace - Social aspects LAW / Jurisprudence |
ISBN | 1-4744-8534-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Frontmatter -- Contents -- Expanded Table of Contents -- Illustrations -- Acknowledgements -- 1 Introduction -- Part I Computational Legalism and the Rule(s) of Code -- 2 A Design Perspective: Code is More than Law -- 3 A Legal Philosophy Perspective: Code is Less than Law -- Part II What Makes a Good Rule? -- 4 Criteria for Laws -- 5 Criteria for Code -- Part III Legitimating Code: Theory and Practice -- 6 The Digisprudential Affordances -- 7 Operationalising Digisprudence -- 8 Rebooting Code as Law: Conclusions and Next Steps -- Bibliography -- Index |
Record Nr. | UNISA-996455153703316 |
Diver Laurence | ||
Edinburgh : , : Edinburgh University Press, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Digisprudence : code as law rebooted / / Laurence Diver |
Autore | Diver Laurence |
Pubbl/distr/stampa | Edinburgh : , : Edinburgh University Press, , [2022] |
Descrizione fisica | 1 online resource (276 pages) : illustrations |
Disciplina |
343.09/944
343.09944 |
Collana | Future Law : FULA |
Soggetto topico |
Computer networks - Law and legislation
Computer programming Computer programming - Social aspects Cyberspace - Social aspects LAW / Jurisprudence |
ISBN | 1-4744-8534-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Frontmatter -- Contents -- Expanded Table of Contents -- Illustrations -- Acknowledgements -- 1 Introduction -- Part I Computational Legalism and the Rule(s) of Code -- 2 A Design Perspective: Code is More than Law -- 3 A Legal Philosophy Perspective: Code is Less than Law -- Part II What Makes a Good Rule? -- 4 Criteria for Laws -- 5 Criteria for Code -- Part III Legitimating Code: Theory and Practice -- 6 The Digisprudential Affordances -- 7 Operationalising Digisprudence -- 8 Rebooting Code as Law: Conclusions and Next Steps -- Bibliography -- Index |
Record Nr. | UNINA-9910520105203321 |
Diver Laurence | ||
Edinburgh : , : Edinburgh University Press, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digisprudence : code as law rebooted / / Laurence E. Diver |
Autore | Diver Laurence E. |
Pubbl/distr/stampa | Edinburgh : , : Edinburgh University Press, , 2021 |
Descrizione fisica | 1 online resource (xii, 264 pages) : illustrations (some color) |
Disciplina | 343.09944 |
Collana | Future law |
Soggetto topico |
Computer networks - Law and legislation
Computer programming |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910684570503321 |
Diver Laurence E. | ||
Edinburgh : , : Edinburgh University Press, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Governing cyberspace : behavior, power, and diplomacy / / edited by Dennis Broeders, Bibi van den Berg |
Autore | Dennis Broeders |
Pubbl/distr/stampa | Rowman & Littlefield International, 2020 |
Descrizione fisica | 1 online resource (337 pages) |
Disciplina | 343.09944 |
Collana | Digital technologies and global politics |
Soggetto topico |
Internet - Law and legislation
Computer networks - Law and legislation Cyberspace |
Soggetto non controllato |
Diplomacy
Digital Internet |
ISBN | 1-78661-496-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Governing cyberspace : Behavior, power and diplomacy / Dennis Broeders & Bibi van den Berg -- International legal and diplomatic approaches : International law and international cyber norms : A continuum? / Liisi Adamson -- Electoral cyber interference, self-determination, and the principle of non-intervention in cyberspace / Nicholas Tsagourias. |
Record Nr. | UNINA-9910411651203321 |
Dennis Broeders | ||
Rowman & Littlefield International, 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
In search of Jefferson's moose [[electronic resource] ] : notes on the state of cyberspace / / David G. Post |
Autore | Post David G |
Pubbl/distr/stampa | Oxford ; ; New York, : Oxford University Press, 2009 |
Descrizione fisica | 1 online resource (263 p.) |
Disciplina | 343.09/99 |
Collana | Law and current events masters |
Soggetto topico |
Internet - Law and legislation
Computer networks - Law and legislation Information superhighway - Law and legislation |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-98708-5
9786611987084 0-19-971142-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Contents; Acknowledgments; A Note to the Reader; PROLOGUE: THE FOX, THE HEDGEHOG, AND THE MOOSE; NOTES ON THE STATE OF CYBERSPACE: PART 1 CHAOS; INTERLUDE; NOTES ON THE STATE OF CYBERSPACE: PART 2 ORDER; EPILOGUE: JEFFERSON'S NATURE, AND THE NATURE OF CYBERSPACE; Appendix; References and Suggested Readings; Index |
Record Nr. | UNINA-9910454261703321 |
Post David G | ||
Oxford ; ; New York, : Oxford University Press, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|