Artificial intelligence and international economic law : disruption, regulation, and reconfiguration / / edited by Shin-Yi Peng, National Tsing Hua University, Ching-Fu Lin, National Tsing Hua University, Thomas Streinz, New York University School of Law [[electronic resource]] |
Autore | Peng Shin-yi |
Pubbl/distr/stampa | Cambridge University Press, 2021 |
Descrizione fisica | 1 online resource (xii, 352 pages) : digital, PDF file(s) |
Disciplina | 343.08/7 |
Collana | Social Sciences |
Soggetto topico |
Foreign trade regulation
International trade - Effect of technological innovations on Artificial intelligence - Law and legislation |
Soggetto non controllato |
international economic law
world trade organization big data artificial intelligence trade law privacy |
ISBN |
1-108-95715-3
1-108-95735-8 1-108-95400-6 |
Classificazione | LAW051000LAW051000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Artificial Intelligence and International Economic Law : Disruption, Regulation, and Reconfiguration / Shin-Yi Peng, Ching-Fu Lin and Thomas Streinz -- Trade Law in a Data-Driven Economy : A Call for Modesty and Resilience / Gregory Shaffer -- Global Law in the Face of Datafication and Artificial Intelligence / Rolf H. Weber -- Trading AI : Economic Interests, Societal Choices and Multilateral Rules / Dan Ciuriak and Vlada Rodionova -- Trade Rules for Industry 4.0 : Why the TBT Agreement Matters Even More / Aik Hoe Lim -- Autonomous Vehicle Standards under the TBT Agreement : Disrupting the Boundaries? / Shin-Yi Peng -- Convergence, Complexity and Uncertainty : AI and Intellectual Property Protection / Bryan Mercurio and Ronald Yu -- Are Digital Trade Disputes "Trade Disputes"? / Yuka Fukunaga -- International Economic Law's Regulation of Data as a Resource for the AI Economy / Thomas Streinz -- Data Protection and Artificial Intelligence : The EU's Internal Approach and Its Promotion through Trade Agreements / Alan Herv e -- Data Portability in a Data-Driven World / Frederike Zufall and Raphael Zingg -- Public Moral, Trade Secret, and the Dilemma of Regulating Driving Automation Systems / Ching-Fu Lin -- International Trade Law and the Data Ethics : Possibilities and Challenges / Neha Mishra -- Disciplining Artificial Intelligence Policies : WTO Law as a Sword and a Shield / Kelly K. Shang and Rachel R. Du -- Across the Great Wall : E-commerce Joint Statement Initiative Negotiation and China / Henry Gao -- The Next Great Global Knowledge Infrastructure Land Rush Has Begun : Will the US or China Prevail? / Jane K. Winn and Yi-Shyuan Chiang -- Trade Law Architecture after the Fourth Industrial Revolution / Lisa Toohey. |
Altri titoli varianti | Artificial Intelligence & International Economic Law |
Record Nr. | UNINA-9910585960003321 |
Peng Shin-yi
![]() |
||
Cambridge University Press, 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Balancing privacy and free speech : unwanted attention in the age of social media / / Mark Tunick |
Autore | Tunick Mark |
Edizione | [1 ed.] |
Pubbl/distr/stampa | Taylor & Francis, 2015 |
Descrizione fisica | 1 online resource (xiv, 222 pages) |
Disciplina |
323.44/8
323.448 |
Collana | Routledge Research in Information Technology and E-Commerce Law |
Soggetto topico |
Social media - Law and legislation
Privacy, Right of Freedom of expression |
Soggetto non controllato |
free speech
internet governance legal ethics media privacy social media |
ISBN |
1-317-65036-0
1-315-76313-3 1-317-65037-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Table of cases -- Acknowledgments -- 1. Introduction -- Unwanted attention -- The democratization of the media -- Permissible and impermissible speech -- Goals: Building a framework for addressing conflicts between privacy and free speech ; Formulating principles of privacy ethics ; Grounding privacy ; Reevaluating case law ; Distinguishing ethical and legal judgments -- The book's layout -- 2. The value of privacy -- Defining privacy -- Why privacy is valuable: Reputation ; Avoiding unjust punishment, and the "right to be forgotten" ; Property ; A lack of privacy is objectively harmful ; Intimacy, relational harms, and the need to compartmentalize ; No harm no foul? ; Trust ; Dignity and respect for persons ; Privacy, toleration, and community -- Summary -- 3. Legitimate privacy interests -- Terminology: legitimate privacy interests and reasonable expectations of privacy -- The plain view principle, modified -- Which means of observation are legitimate? -- the careful and carefree societies -- Qualifying the plain view principle: One may reasonably expect privacy when one's dignity is implicated ; One can have a legitimate privacy interest that information not be spread to circles wider than one willingly exposed oneself to ; Controlling the intended audience of one's message ; Clarifying what counts as "readily accessible through legitimate means" ; Consent -- Conclusion: privacy in public places -- 4. The value of free speech -- Reasons free speech is valuable -- Should interests in free speech be put on a balancing scale?: The E.U. vs the U.S. -- The slippery slope objection to protecting only some speech -- The speech that merits legal protection -- Do legal protections of free speech apply only to professional journalists? -- Deciding what is newsworthy: Substitutability (Finger and Kim Phuc) ; Non-newsworthy details of a newsworthy event (Y.G and L.G.) ; Newsworthy for a select group, non-newsworthy for the general public (Parnigoni) -- Conclusion -- 5. Balancing privacy and free speech: Utilitarianism, its limits, and tolerating the sensitive -- Introduction -- The framework: Interests and rights ; Balancing privacy against free speech (as opposed to public safety) ; The utilitarian approach ; Limits of a utilitarian approach -- Feasibility problems -- The respect and dignity problem -- Toleration and respect for persons -- Weighing reasons and considerations without making a utilitarian calculation -- 6. Cases -- Publicizing private facts: Private facts in private places (Rear Window, Lake v. Wal-Mart) ; Private facts that are newsworthy (Alvarado, Kaysen) ; Private facts in public places (Upskirt videos, Dennison, Turnbull) -- Cases at the border (Riley, Vazquez, and Wood) -- Publicizing public facts: Public facts that are not newsworthy (the baseball fan) ; Publicizing newsworthy public facts (Public meetings and lectures, police conduct, arrests) -- 7. Remedies -- Google Glass with face recognition -- Remedies: New social norms ; Legal remedies and their limits -- Other alternatives -- Technology and architecture -- Market solutions and their limits -- Conclusion. |
Record Nr. | UNINA-9910545199403321 |
Tunick Mark
![]() |
||
Taylor & Francis, 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Confidentiality and its discontents : dilemmas of privacy in psychotherapy / / Paul W. Mosher and Jeffrey Berman |
Autore | Mosher Paul W. |
Pubbl/distr/stampa | New York : , : Fordham University Press, , 2015 |
Descrizione fisica | 1 online resource (360 p.) |
Disciplina | 616.89/14 |
Collana | Psychoanalytic interventions |
Soggetto topico |
Confidential communications
Privacy Psychotherapy Psychotherapist and patient |
Soggetto non controllato |
Freud
Jaffee v. Redmond Philip Roth Tarasoff breach of confidentiality confidentiality in psychotherapy duty to protect full disclosure privacy psychotherapist-patient privilege |
ISBN |
0-8232-6512-9
0-8232-6513-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | We have met the enemy, and he (is) was us -- The buried bodies case: lawyers risk their careers to defend their ethical commitment to client privacy -- The case of Joseph Lifschutz: a psychoanalyst in jail -- "The angry act": the psychoanalyst's breach of confidentiality in Philip Roth's life and art -- Angry acts and counteracts in Philip Roth's life and art -- The case of Jane Doe v. Joan Roe and Peter Poe: the most extensive violation ever of a psychotherapy patient's privacy -- The Anne Sexton controversy: "There is nothing like this in the history of literary biography!" -- The tarasoff case: must the protective privilege end where the public peril begins? -- Jaffee v. Redmond: the supreme court speaks -- The people v. Robert Bierenbaum: "Long-ago warnings cannot justify abrogating the privilege covering still confidential communications" -- United States v. Sol Wachtler: "This chief judge is either crazy or criminal". |
Record Nr. | UNINA-9910797323403321 |
Mosher Paul W.
![]() |
||
New York : , : Fordham University Press, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Confidentiality and its discontents : dilemmas of privacy in psychotherapy / / Paul W. Mosher and Jeffrey Berman |
Autore | Mosher Paul W. |
Pubbl/distr/stampa | New York : , : Fordham University Press, , 2015 |
Descrizione fisica | 1 online resource (360 p.) |
Disciplina | 616.89/14 |
Collana | Psychoanalytic interventions |
Soggetto topico |
Confidential communications
Privacy Psychotherapy Psychotherapist and patient |
Soggetto non controllato |
Freud
Jaffee v. Redmond Philip Roth Tarasoff breach of confidentiality confidentiality in psychotherapy duty to protect full disclosure privacy psychotherapist-patient privilege |
ISBN |
0-8232-6512-9
0-8232-6513-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | We have met the enemy, and he (is) was us -- The buried bodies case: lawyers risk their careers to defend their ethical commitment to client privacy -- The case of Joseph Lifschutz: a psychoanalyst in jail -- "The angry act": the psychoanalyst's breach of confidentiality in Philip Roth's life and art -- Angry acts and counteracts in Philip Roth's life and art -- The case of Jane Doe v. Joan Roe and Peter Poe: the most extensive violation ever of a psychotherapy patient's privacy -- The Anne Sexton controversy: "There is nothing like this in the history of literary biography!" -- The tarasoff case: must the protective privilege end where the public peril begins? -- Jaffee v. Redmond: the supreme court speaks -- The people v. Robert Bierenbaum: "Long-ago warnings cannot justify abrogating the privilege covering still confidential communications" -- United States v. Sol Wachtler: "This chief judge is either crazy or criminal". |
Record Nr. | UNINA-9910817144703321 |
Mosher Paul W.
![]() |
||
New York : , : Fordham University Press, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Creating Age-friendly Communities : Housing and Technology |
Autore | van Hoof Joost |
Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
Descrizione fisica | 1 electronic resource (228 p.) |
Soggetto topico | Medicine |
Soggetto non controllato |
physical environment/space
nursing homes small-scale living green care farms engagement social interaction long-term care facilities older adults gerontechnology dementia-friendly environments aids and adaptations loneliness domestic settings ICT Age in Place Disability Smart Technology Intergenerational Relationships Connected Health smart health older people co-design digital life-world smart cities retirement community privacy research ethics artificial intelligence robots living alone older immigrants Canada U.S. older age-friendly housing dementia technology perspectives informal caregivers formal caregivers rural ageing qualitative research methods intergenerational social connectedness community networks cardiology wearable devices community care primary care clinical care scoping review meaningful activities transition nursing home citizen science built environment urban neighbourhoods GIS spatial Australia |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Creating Age-friendly Communities |
Record Nr. | UNINA-9910580213803321 |
van Hoof Joost
![]() |
||
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography and Its Applications in Information Security |
Autore | Assad Safwan El |
Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
Descrizione fisica | 1 electronic resource (202 p.) |
Soggetto topico |
Technology: general issues
History of engineering & technology |
Soggetto non controllato |
bit independence criterion
bit independence RC4 stream cipher complexity chaos-based stream cipher SPCNG 3D chebyshev logistic skew-tent FPGA performance museum digital copyright management blockchain smart contract authorization model coupled map lattice intermittent jumping multi-chaos public key exchange security asymmetric asymmetric algorithm cryptography framework limited computational power computationally biased intrusion detection systems machine learning communication digital cash privacy privacy preserving homomorphic encryption federated learning |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910566470303321 |
Assad Safwan El
![]() |
||
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers |
Autore | Lu Wei |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
Descrizione fisica | 1 electronic resource (239 p.) |
Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networking & communications Artificial intelligence Legal aspects of IT Network security |
Soggetto non controllato |
application service layer
artificial intelligence communication systems computer crime computer networks computer security computer systems cryptography cyber security data communication systems data security databases machine learning network protocols network security privacy signal processing telecommunication networks telecommunication systems |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996503561903316 |
Lu Wei
![]() |
||
Singapore : , : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers |
Autore | Lu Wei |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
Descrizione fisica | 1 electronic resource (239 p.) |
Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networking & communications Artificial intelligence Legal aspects of IT Network security |
Soggetto non controllato |
application service layer
artificial intelligence communication systems computer crime computer networks computer security computer systems cryptography cyber security data communication systems data security databases machine learning network protocols network security privacy signal processing telecommunication networks telecommunication systems |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910633995903321 |
Lu Wei
![]() |
||
Singapore : , : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers |
Autore | Lu Wei |
Pubbl/distr/stampa | Singapore, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (234 pages) |
Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networking & communications Coding theory & cryptology Network security Artificial intelligence Software Engineering |
Soggetto non controllato |
artificial intelligence
authentication computer hardware computer networks computer security computer systems cryptography data communication systems data mining data security databases information retrieval network protocols network security privacy signal processing telecommunication networks telecommunication systems |
ISBN | 981-16-9229-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910522970803321 |
Lu Wei
![]() |
||
Singapore, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers |
Autore | Lu Wei |
Pubbl/distr/stampa | Singapore, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (234 pages) |
Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networking & communications Coding theory & cryptology Network security Artificial intelligence Software Engineering |
Soggetto non controllato |
artificial intelligence
authentication computer hardware computer networks computer security computer systems cryptography data communication systems data mining data security databases information retrieval network protocols network security privacy signal processing telecommunication networks telecommunication systems |
ISBN | 981-16-9229-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464545403316 |
Lu Wei
![]() |
||
Singapore, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|