Showing: 1-10 results of 166

Privacy-invading technologies (PITs) such as Body scanners; Public space CCTV microphones; Public space CCTV loudspeakers and Human-implantable microchips (RFID implants/GPS implants) are dealt with in this book. The book shows how and why laws that regulate the design and development of privacy-invading technologies (PITs) may more effectively ensure the protection of privacy than laws that only regulate data controllers and the use of such... more...

In January 2012, millions participated in the now-infamous “Internet blackout” against the Stop Online Piracy Act, protesting the power it would have given intellectual property holders over the Internet. However, while SOPA’s withdrawal was heralded as a victory for an open Internet, a small group of corporations, tacitly backed by the US and other governments, have implemented much of SOPA via a series of secret, handshake... more...

During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these new and emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a... more...

The internet opens up new opportunities for citizens to organize and mobilize for action but it also provides new channels that established political, social and economic interests can use to extend their powers. Will the internet revolutionize politics? The Prospect of Internet Democracy is a rich and detailed exploration of the theoretical implications of the internet and related information and communication technologies (ICTs) for democratic... more...

The international battle against Internet pirates has been heating up. Increasingly law enforcement is paying attention to book piracy as ebook publishing gains an ever-larger market share. With this threat to their health and even survival, publishers and authors must act much like the music, film, and software giants that have waged war against pirates for the past two decades. Now, The Battle against Internet Piracy opens a... more...


This book discusses the main legal questions raised by free and open source software (FOSS) licenses and other alternative license models, such as Creative Commons. The legal questions raised by FOSS and other alternative licenses have been the subject of an intense international debate among legal scholars and practising lawyers in the last years. Courts in different jurisdictions have confirmed that the core features of FOSS licenses... more...

'The breadth of fascinating legal and public policy challenges posed by the advent of robots (both physical and virtual) into the commerce of daily life are well represented in this wonderful collection of essays. It is truly heartening to witness the depth of reflection offered by the contributing legal and social theorists regarding ways to navigate the countless perceivable policy challenges and uncertainties the roboticization of warfare, commerce,... more...

This book warns of the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI). It contains realistic scenarios that demonstrate the threats of an AmI-world.

Years of surveillance-related leaks from US whistleblower Edward Snowden have fuelled an international debate on privacy, spying, and Internet surveillance. Much of the focus has centered on the role of the US National Security Agency, yet there is an important Canadian side to the story. The Communications Security Establishment, the Canadian counterpart to the NSA, has played an active role in surveillance activities both at home and... more...

TyAnna K. Herrington explains current intellectual property law and examines the effect of the Internet and ideological power on its interpretation. Promoting a balanced development of our national culture, she advocates educators’ informed participation in ensuring egalitarian public access to information. She discusses the control of information and the creation of knowledge in terms of the way... more...