Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Both legal scholars and computer scientists will be curious to know how the gap between law and computing can be bridged. The law, and also jurisprudence, is based on language, and is mainly textual. Every syntactic system has its semantic range, and so does language, which in law achieves a high degree of professional precision. The use of visualisations is a syntactic supplement and opens up a new understanding of legal forms. This understanding was reinforced by the paradigm shift from textual law to legal informatics, in which visual formal notations are decisive. The authors have been dealing with visualisation approaches for a long time and summarise them here for discussion. In this book, a multiphase transformation from the legal domain to computer code is explored. The authors consider law enforcement by computer. The target view is that legal machines are legal actors that are capable of triggering institutional facts. In the visualisation of statutory law, an approach called Structural Legal Visualisation is presented. Specifically, the visualisation of legal meaning is linked with tertium comparationis, the third part of the comparison. In a legal documentation system, representing one legal source with multiple documents is viewed as a granularity problem. The authors propose to supplement legislative documents ex ante with explicit logic-oriented information in the form of a mini thesaurus. In contrast to so-called strong relations such as synonymy, antonymy and hypernymy/hyponymy, one should consider weak relations: (1) dialectical relations, a term of dialectical antithesis; (2) context relations; and (3) metaphorical relations, which means the use of metaphors for terms. The chapters trace topics such as the distinction between knowledge visualisation and knowledge representation, the visualisation of Hans Kelsen’s Pure Theory of Law, the separation of law and legal science, legal subsumption, legal relations, legal machines, encapsulation, compliance, transparency, standard cases and hard cases.
Semiotics --- Industrial and intellectual property --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- semiotiek --- intellectueel eigendomsrecht --- KI (kunstmatige intelligentie) --- computercriminaliteit --- Information technology --- Mass media --- Computers --- Artificial intelligence. --- Semiotics. --- IT Law, Media Law, Intellectual Property. --- Legal Aspects of Computing. --- Artificial Intelligence. --- Law and legislation. --- Law --- AI (artificiële intelligentie)
Choose an application
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
Computer security --- Computer networking & communications --- Artificial intelligence --- Legal aspects of IT --- Network security --- application service layer --- artificial intelligence --- communication systems --- computer crime --- computer networks --- computer security --- computer systems --- cryptography --- cyber security --- data communication systems --- data security --- databases --- machine learning --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems
Choose an application
This book pursues the questions from a broad range of law and economics perspectives. Digital transformation leads to economic and social change, bringing with it both opportunities and risks. This raises questions of the extent to which existent legal frameworks are still sufficient and whether there is a need for new or additional regulation in the affected areas: new demands are made on the law and jurisprudence.
Commercial law. --- European Economic Community. --- Information technology --- Mass media --- Law and economics. --- Computers --- European Economic Law. --- IT Law, Media Law, Intellectual Property. --- Law and Economics. --- Legal Aspects of Computing. --- Law and legislation. --- Cyberspace --- Economics and jurisprudence --- Economics and law --- Jurisprudence and economics --- Economics --- Jurisprudence --- Technology and law --- Business --- Business law --- Commerce --- Law, Commercial --- Mercantile law --- Law --- Law merchant --- Maritime law --- Law and legislation --- Business & Economics
Choose an application
This book constitutes papers presented during the workshop session titled “CyberSec4Europe - Research to Innovation: Common Research Framework on Security and Privacy” during the Privacy Symposium hosted by Università Ca’ Foscari in Venice, Italy, in April 2022. The 11 peer-reviewed selected papers present findings, conclusions, research, and recommendations in various security-related areas, from highly technical ones (e.g., software and network security) to law and human-centric ones (e.g., governance and cybersecurity awareness).
Data protection. --- Computers --- Information technology --- Computer crimes. --- Software engineering. --- Operating systems (Computers). --- Data and Information Security. --- Legal Aspects of Computing. --- Computer Crime. --- Software Engineering. --- Operating Systems. --- Law and legislation. --- Computer operating systems --- Disk operating systems --- Systems software --- Computer software engineering --- Engineering --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Technology and law --- Cyberspace --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Operating systems --- Law and legislation
Choose an application
This book explores the concept of a fourth industrial revolution as an expression of the current technological, economic, and social changes sparked by the growing interconnectivity and intelligent automation that have emerged in the 21st century. It seeks to identify and explain the legal challenges posed by this phenomenon in four main areas: content, economy, security, and people. Part I, Content, considers e.g. the problems posed by new uses of protected works in the digital environment, and the new rules on liability for intermediary services contained in the Digital Services Act. Part II, Economy, is particularly concerned with the regulation of Big Tech in the EU’s Digital Markets Act, ecommerce and EU consumers’ rights, the taxation of online platforms, and digital advertising. Part III, Security, addresses the European Union Strategy for Cybersecurity, the use of biometric data systems and facial recognition technologies for law enforcement purposes, and the security implications of the Proposal for an EU Regulation on Artificial Intelligence, as well as the challenges entailed by the European Union’s positioning itself as a major cyber defence actor. Part IV, People, discusses the Data Protection Litigation System under the GDPR, the right to disconnect from work, the proposed EU Catalogue of Fundamental Digital Rights, the countering of terrorist propaganda online through the TERREG and the DSA, and AI and Fundamental Rights.
Information technology --- Mass media --- Law --- Technological innovations. --- Computers --- Business information services. --- Computational intelligence. --- IT Law, Media Law, Intellectual Property. --- European Law. --- Innovation and Technology Management. --- Legal Aspects of Computing. --- IT in Business. --- Computational Intelligence. --- Law and legislation. --- Europe. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Business --- Business enterprises --- Information services --- Cyberspace --- Breakthroughs, Technological --- Innovations, Industrial --- Innovations, Technological --- Technical innovations --- Technological breakthroughs --- Technological change --- Creative ability in technology --- Inventions --- Domestication of technology --- Innovation relay centers --- Research, Industrial --- Technology transfer --- Technology and law --- Law and legislation
Choose an application
This book provides a set of proposals for the new conceptual network required in order to establish civil law rules for a world permeated by Artificial Intelligence. These proposals are intended by their authors to push the debate on the new civil law forward. In spite of the natural conservatism of jurists, some innovative or even futuristic ideas are called for, also because the future, even this not-so-distant one, is difficult to foresee. Paradoxically, and unlike in the past, this lack of knowledge must not stop us from planning. If it does, humankind may, as some pessimists already claim, lose its chance to win the battle for control of the world. The rise and expansion of Artificial Intelligence and robotics in recent years has highlighted a pressing need to create a suitable legal framework for this new phenomenon. The debate on the subject, although wide-ranging and involving many new legal documents, is still quite general and preliminary in nature, although these preparatory works illustrate the very real need to develop appropriate new civil law arrangements. It is exactly the branch of private law where the necessity of these new rules appears to be the most imperative. Autonomous vehicles, medical robots, and expertise software raise fundamental questions on aspects of civil liability such as culpability; whereas the growth in popularity of automated, intelligent software systems for concluding contracts requires a new approach to many fundamental and deeply rooted elements of contract law, e.g. consciousness, intent, error, deception, interpretation of contracts and good faith. Ruling on these specific matters demands the identification and clarification of certain key points, which shall become the foundation for constructing AI/robot civil law.
Information technology—Law and legislation. --- Mass media—Law and legislation. --- Civil law. --- Artificial intelligence. --- Computers—Law and legislation. --- Law—Philosophy. --- Law—History. --- IT Law, Media Law, Intellectual Property. --- Civil Law. --- Artificial Intelligence. --- Legal Aspects of Computing. --- Theories of Law, Philosophy of Law, Legal History. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Law, Civil --- Private law --- Roman law --- Information technology --- Mass media --- Computers --- Law --- Law and legislation. --- Philosophy. --- History. --- Legal history --- Jurisprudence --- Cyberspace --- Technology and law --- History and criticism --- Law and legislation
Choose an application
This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3–4, 2023. The 12 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault-injection analyses and countermeasures; side-channel analyses and countermeasures; attacks on PQC and countermeasure; and analyses and tools.
Data protection. --- Computers—Law and legislation. --- Information technology—Law and legislation. --- Computer networks. --- Computers, Special purpose. --- Computer systems. --- Microprogramming. --- Data and Information Security. --- Legal Aspects of Computing. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computer System Implementation. --- Control Structures and Microprogramming. --- Computer programming --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- Special purpose computers --- Computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Information networks --- Telecommunication --- Electronic data processing --- Network computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing --- Computer security --- Data encryption (Computer science)
Choose an application
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
Computer security --- Computer networking & communications --- Artificial intelligence --- Legal aspects of IT --- Network security --- application service layer --- artificial intelligence --- communication systems --- computer crime --- computer networks --- computer security --- computer systems --- cryptography --- cyber security --- data communication systems --- data security --- databases --- machine learning --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems --- application service layer --- artificial intelligence --- communication systems --- computer crime --- computer networks --- computer security --- computer systems --- cryptography --- cyber security --- data communication systems --- data security --- databases --- machine learning --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems
Choose an application
This book constitutes the proceedings of the 17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, held in Kent, United Kingdom, in July 2023. The 37 full papers presented in this volume were carefully reviewed and selected from 54 submissions. They are organized in the following topical sections: education and training; management, policy and skills; evolving threats and attacks; social-technical factors; and research methods.
Application software. --- Data protection. --- User interfaces (Computer systems). --- Human-computer interaction. --- Computers --- Information technology --- Computer networks. --- Computer and Information Systems Applications. --- Data and Information Security. --- User Interfaces and Human Computer Interaction. --- Legal Aspects of Computing. --- Computer Communication Networks. --- Law and legislation. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Technology and law --- Cyberspace --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Distributed processing --- Law and legislation
Choose an application
This proceedings, HCI-CPT 2023, constitutes the refereed proceedings of the 5th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings focuses on to user privacy and data protection, trustworthiness and user experience in cybersecurity, multifaceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments. The conference focused on HCI principles, methods and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies.
User interfaces (Computer systems). --- Human-computer interaction. --- Coding theory. --- Information theory. --- Computers—Law and legislation. --- Information technology—Law and legislation. --- Computer networks. --- Electronic commerce. --- Software engineering. --- User Interfaces and Human Computer Interaction. --- Coding and Information Theory. --- Legal Aspects of Computing. --- Computer Communication Networks. --- e-Commerce and e-Business. --- Software Engineering. --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Computer software engineering --- Engineering --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Computer security --- Data encryption (Computer science)
Listing 1 - 10 of 10 |
Sort by
|