top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Artificial intelligence and international economic law : disruption, regulation, and reconfiguration / / edited by Shin-Yi Peng, National Tsing Hua University, Ching-Fu Lin, National Tsing Hua University, Thomas Streinz, New York University School of Law [[electronic resource]]
Artificial intelligence and international economic law : disruption, regulation, and reconfiguration / / edited by Shin-Yi Peng, National Tsing Hua University, Ching-Fu Lin, National Tsing Hua University, Thomas Streinz, New York University School of Law [[electronic resource]]
Autore Peng Shin-yi
Pubbl/distr/stampa Cambridge University Press, 2021
Descrizione fisica 1 online resource (xii, 352 pages) : digital, PDF file(s)
Disciplina 343.08/7
Collana Social Sciences
Soggetto topico Foreign trade regulation
International trade - Effect of technological innovations on
Artificial intelligence - Law and legislation
Soggetto non controllato international economic law
world trade organization
big data
artificial intelligence
trade law
privacy
ISBN 1-108-95715-3
1-108-95735-8
1-108-95400-6
Classificazione LAW051000LAW051000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence and International Economic Law : Disruption, Regulation, and Reconfiguration / Shin-Yi Peng, Ching-Fu Lin and Thomas Streinz -- Trade Law in a Data-Driven Economy : A Call for Modesty and Resilience / Gregory Shaffer -- Global Law in the Face of Datafication and Artificial Intelligence / Rolf H. Weber -- Trading AI : Economic Interests, Societal Choices and Multilateral Rules / Dan Ciuriak and Vlada Rodionova -- Trade Rules for Industry 4.0 : Why the TBT Agreement Matters Even More / Aik Hoe Lim -- Autonomous Vehicle Standards under the TBT Agreement : Disrupting the Boundaries? / Shin-Yi Peng -- Convergence, Complexity and Uncertainty : AI and Intellectual Property Protection / Bryan Mercurio and Ronald Yu -- Are Digital Trade Disputes "Trade Disputes"? / Yuka Fukunaga -- International Economic Law's Regulation of Data as a Resource for the AI Economy / Thomas Streinz -- Data Protection and Artificial Intelligence : The EU's Internal Approach and Its Promotion through Trade Agreements / Alan Herv e -- Data Portability in a Data-Driven World / Frederike Zufall and Raphael Zingg -- Public Moral, Trade Secret, and the Dilemma of Regulating Driving Automation Systems / Ching-Fu Lin -- International Trade Law and the Data Ethics : Possibilities and Challenges / Neha Mishra -- Disciplining Artificial Intelligence Policies : WTO Law as a Sword and a Shield / Kelly K. Shang and Rachel R. Du -- Across the Great Wall : E-commerce Joint Statement Initiative Negotiation and China / Henry Gao -- The Next Great Global Knowledge Infrastructure Land Rush Has Begun : Will the US or China Prevail? / Jane K. Winn and Yi-Shyuan Chiang -- Trade Law Architecture after the Fourth Industrial Revolution / Lisa Toohey.
Altri titoli varianti Artificial Intelligence & International Economic Law
Record Nr. UNINA-9910585960003321
Peng Shin-yi  
Cambridge University Press, 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Balancing privacy and free speech : unwanted attention in the age of social media / / Mark Tunick
Balancing privacy and free speech : unwanted attention in the age of social media / / Mark Tunick
Autore Tunick Mark
Edizione [1 ed.]
Pubbl/distr/stampa Taylor & Francis, 2015
Descrizione fisica 1 online resource (xiv, 222 pages)
Disciplina 323.44/8
323.448
Collana Routledge Research in Information Technology and E-Commerce Law
Soggetto topico Social media - Law and legislation
Privacy, Right of
Freedom of expression
Soggetto non controllato free speech
internet governance
legal ethics
media
privacy
social media
ISBN 1-317-65036-0
1-315-76313-3
1-317-65037-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Table of cases -- Acknowledgments -- 1. Introduction -- Unwanted attention -- The democratization of the media -- Permissible and impermissible speech -- Goals: Building a framework for addressing conflicts between privacy and free speech ; Formulating principles of privacy ethics ; Grounding privacy ; Reevaluating case law ; Distinguishing ethical and legal judgments -- The book's layout -- 2. The value of privacy -- Defining privacy -- Why privacy is valuable: Reputation ; Avoiding unjust punishment, and the "right to be forgotten" ; Property ; A lack of privacy is objectively harmful ; Intimacy, relational harms, and the need to compartmentalize ; No harm no foul? ; Trust ; Dignity and respect for persons ; Privacy, toleration, and community -- Summary -- 3. Legitimate privacy interests -- Terminology: legitimate privacy interests and reasonable expectations of privacy -- The plain view principle, modified -- Which means of observation are legitimate? -- the careful and carefree societies -- Qualifying the plain view principle: One may reasonably expect privacy when one's dignity is implicated ; One can have a legitimate privacy interest that information not be spread to circles wider than one willingly exposed oneself to ; Controlling the intended audience of one's message ; Clarifying what counts as "readily accessible through legitimate means" ; Consent -- Conclusion: privacy in public places -- 4. The value of free speech -- Reasons free speech is valuable -- Should interests in free speech be put on a balancing scale?: The E.U. vs the U.S. -- The slippery slope objection to protecting only some speech -- The speech that merits legal protection -- Do legal protections of free speech apply only to professional journalists? -- Deciding what is newsworthy: Substitutability (Finger and Kim Phuc) ; Non-newsworthy details of a newsworthy event (Y.G and L.G.) ; Newsworthy for a select group, non-newsworthy for the general public (Parnigoni) -- Conclusion -- 5. Balancing privacy and free speech: Utilitarianism, its limits, and tolerating the sensitive -- Introduction -- The framework: Interests and rights ; Balancing privacy against free speech (as opposed to public safety) ; The utilitarian approach ; Limits of a utilitarian approach -- Feasibility problems -- The respect and dignity problem -- Toleration and respect for persons -- Weighing reasons and considerations without making a utilitarian calculation -- 6. Cases -- Publicizing private facts: Private facts in private places (Rear Window, Lake v. Wal-Mart) ; Private facts that are newsworthy (Alvarado, Kaysen) ; Private facts in public places (Upskirt videos, Dennison, Turnbull) -- Cases at the border (Riley, Vazquez, and Wood) -- Publicizing public facts: Public facts that are not newsworthy (the baseball fan) ; Publicizing newsworthy public facts (Public meetings and lectures, police conduct, arrests) -- 7. Remedies -- Google Glass with face recognition -- Remedies: New social norms ; Legal remedies and their limits -- Other alternatives -- Technology and architecture -- Market solutions and their limits -- Conclusion.
Record Nr. UNINA-9910545199403321
Tunick Mark  
Taylor & Francis, 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Confidentiality and its discontents : dilemmas of privacy in psychotherapy / / Paul W. Mosher and Jeffrey Berman
Confidentiality and its discontents : dilemmas of privacy in psychotherapy / / Paul W. Mosher and Jeffrey Berman
Autore Mosher Paul W.
Pubbl/distr/stampa New York : , : Fordham University Press, , 2015
Descrizione fisica 1 online resource (360 p.)
Disciplina 616.89/14
Collana Psychoanalytic interventions
Soggetto topico Confidential communications
Privacy
Psychotherapy
Psychotherapist and patient
Soggetto non controllato Freud
Jaffee v. Redmond
Philip Roth
Tarasoff
breach of confidentiality
confidentiality in psychotherapy
duty to protect
full disclosure
privacy
psychotherapist-patient privilege
ISBN 0-8232-6512-9
0-8232-6513-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto We have met the enemy, and he (is) was us -- The buried bodies case: lawyers risk their careers to defend their ethical commitment to client privacy -- The case of Joseph Lifschutz: a psychoanalyst in jail -- "The angry act": the psychoanalyst's breach of confidentiality in Philip Roth's life and art -- Angry acts and counteracts in Philip Roth's life and art -- The case of Jane Doe v. Joan Roe and Peter Poe: the most extensive violation ever of a psychotherapy patient's privacy -- The Anne Sexton controversy: "There is nothing like this in the history of literary biography!" -- The tarasoff case: must the protective privilege end where the public peril begins? -- Jaffee v. Redmond: the supreme court speaks -- The people v. Robert Bierenbaum: "Long-ago warnings cannot justify abrogating the privilege covering still confidential communications" -- United States v. Sol Wachtler: "This chief judge is either crazy or criminal".
Record Nr. UNINA-9910797323403321
Mosher Paul W.  
New York : , : Fordham University Press, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Confidentiality and its discontents : dilemmas of privacy in psychotherapy / / Paul W. Mosher and Jeffrey Berman
Confidentiality and its discontents : dilemmas of privacy in psychotherapy / / Paul W. Mosher and Jeffrey Berman
Autore Mosher Paul W.
Pubbl/distr/stampa New York : , : Fordham University Press, , 2015
Descrizione fisica 1 online resource (360 p.)
Disciplina 616.89/14
Collana Psychoanalytic interventions
Soggetto topico Confidential communications
Privacy
Psychotherapy
Psychotherapist and patient
Soggetto non controllato Freud
Jaffee v. Redmond
Philip Roth
Tarasoff
breach of confidentiality
confidentiality in psychotherapy
duty to protect
full disclosure
privacy
psychotherapist-patient privilege
ISBN 0-8232-6512-9
0-8232-6513-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto We have met the enemy, and he (is) was us -- The buried bodies case: lawyers risk their careers to defend their ethical commitment to client privacy -- The case of Joseph Lifschutz: a psychoanalyst in jail -- "The angry act": the psychoanalyst's breach of confidentiality in Philip Roth's life and art -- Angry acts and counteracts in Philip Roth's life and art -- The case of Jane Doe v. Joan Roe and Peter Poe: the most extensive violation ever of a psychotherapy patient's privacy -- The Anne Sexton controversy: "There is nothing like this in the history of literary biography!" -- The tarasoff case: must the protective privilege end where the public peril begins? -- Jaffee v. Redmond: the supreme court speaks -- The people v. Robert Bierenbaum: "Long-ago warnings cannot justify abrogating the privilege covering still confidential communications" -- United States v. Sol Wachtler: "This chief judge is either crazy or criminal".
Record Nr. UNINA-9910817144703321
Mosher Paul W.  
New York : , : Fordham University Press, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Creating Age-friendly Communities : Housing and Technology
Creating Age-friendly Communities : Housing and Technology
Autore van Hoof Joost
Pubbl/distr/stampa Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Descrizione fisica 1 electronic resource (228 p.)
Soggetto topico Medicine
Soggetto non controllato physical environment/space
nursing homes
small-scale living
green care farms
engagement
social interaction
long-term care facilities
older adults
gerontechnology
dementia-friendly environments
aids and adaptations
loneliness
domestic settings
ICT
Age in Place
Disability
Smart Technology
Intergenerational Relationships
Connected Health
smart health
older people
co-design
digital life-world
smart cities
retirement community
privacy
research ethics
artificial intelligence
robots
living alone
older immigrants
Canada
U.S.
older age-friendly housing
dementia
technology
perspectives
informal caregivers
formal caregivers
rural ageing
qualitative research methods
intergenerational
social connectedness
community networks
cardiology
wearable devices
community care
primary care
clinical care
scoping review
meaningful activities
transition
nursing home
citizen science
built environment
urban neighbourhoods
GIS
spatial
Australia
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Creating Age-friendly Communities
Record Nr. UNINA-9910580213803321
van Hoof Joost  
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptography and Its Applications in Information Security
Cryptography and Its Applications in Information Security
Autore Assad Safwan El
Pubbl/distr/stampa Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Descrizione fisica 1 electronic resource (202 p.)
Soggetto topico Technology: general issues
History of engineering & technology
Soggetto non controllato bit independence criterion
bit independence
RC4
stream cipher
complexity
chaos-based stream cipher
SPCNG
3D chebyshev
logistic
skew-tent
FPGA
performance
museum
digital copyright management
blockchain
smart contract
authorization model
coupled map lattice
intermittent jumping
multi-chaos
public key exchange
security
asymmetric
asymmetric algorithm
cryptography
framework
limited computational power
computationally biased
intrusion detection systems
machine learning
communication
digital cash
privacy
privacy preserving
homomorphic encryption
federated learning
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910566470303321
Assad Safwan El  
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Autore Lu Wei
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 electronic resource (239 p.)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Artificial intelligence
Legal aspects of IT
Network security
Soggetto non controllato application service layer
artificial intelligence
communication systems
computer crime
computer networks
computer security
computer systems
cryptography
cyber security
data communication systems
data security
databases
machine learning
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996503561903316
Lu Wei  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Autore Lu Wei
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 electronic resource (239 p.)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Artificial intelligence
Legal aspects of IT
Network security
Soggetto non controllato application service layer
artificial intelligence
communication systems
computer crime
computer networks
computer security
computer systems
cryptography
cyber security
data communication systems
data security
databases
machine learning
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910633995903321
Lu Wei  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
Autore Lu Wei
Pubbl/distr/stampa Singapore, : Springer Nature, 2022
Descrizione fisica 1 online resource (234 pages)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Coding theory & cryptology
Network security
Artificial intelligence
Software Engineering
Soggetto non controllato artificial intelligence
authentication
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data mining
data security
databases
information retrieval
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
ISBN 981-16-9229-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910522970803321
Lu Wei  
Singapore, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
Autore Lu Wei
Pubbl/distr/stampa Singapore, : Springer Nature, 2022
Descrizione fisica 1 online resource (234 pages)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Coding theory & cryptology
Network security
Artificial intelligence
Software Engineering
Soggetto non controllato artificial intelligence
authentication
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data mining
data security
databases
information retrieval
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
ISBN 981-16-9229-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464545403316
Lu Wei  
Singapore, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui