Narrow your search

Library

ULB (9)

ULiège (9)

KU Leuven (8)

Odisee (8)

Thomas More Kempen (8)

Thomas More Mechelen (8)

UCLL (8)

VIVES (8)

UGent (7)

KBC (5)

More...

Resource type

book (10)

digital (1)


Language

English (10)


Year
From To Submit

2023 (10)

Listing 1 - 10 of 10
Sort by

Multi
Essays on the Visualisation of Legal Informatics
Authors: ---
ISBN: 9783031279577 9783031279560 9783031279584 9783031279591 Year: 2023 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Both legal scholars and computer scientists will be curious to know how the gap between law and computing can be bridged. The law, and also jurisprudence, is based on language, and is mainly textual. Every syntactic system has its semantic range, and so does language, which in law achieves a high degree of professional precision. The use of visualisations is a syntactic supplement and opens up a new understanding of legal forms. This understanding was reinforced by the paradigm shift from textual law to legal informatics, in which visual formal notations are decisive. The authors have been dealing with visualisation approaches for a long time and summarise them here for discussion. In this book, a multiphase transformation from the legal domain to computer code is explored. The authors consider law enforcement by computer. The target view is that legal machines are legal actors that are capable of triggering institutional facts. In the visualisation of statutory law, an approach called Structural Legal Visualisation is presented. Specifically, the visualisation of legal meaning is linked with tertium comparationis, the third part of the comparison. In a legal documentation system, representing one legal source with multiple documents is viewed as a granularity problem. The authors propose to supplement legislative documents ex ante with explicit logic-oriented information in the form of a mini thesaurus. In contrast to so-called strong relations such as synonymy, antonymy and hypernymy/hyponymy, one should consider weak relations: (1) dialectical relations, a term of dialectical antithesis; (2) context relations; and (3) metaphorical relations, which means the use of metaphors for terms. The chapters trace topics such as the distinction between knowledge visualisation and knowledge representation, the visualisation of Hans Kelsen’s Pure Theory of Law, the separation of law and legal science, legal subsumption, legal relations, legal machines, encapsulation, compliance, transparency, standard cases and hard cases.


Book
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers.
Authors: --- --- --- ---
Year: 2023 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.


Book
Law and Economics of the Digital Transformation
Authors: ---
ISBN: 3031250591 3031250583 Year: 2023 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book pursues the questions from a broad range of law and economics perspectives. Digital transformation leads to economic and social change, bringing with it both opportunities and risks. This raises questions of the extent to which existent legal frameworks are still sufficient and whether there is a need for new or additional regulation in the affected areas: new demands are made on the law and jurisprudence.


Book
Digital Sovereignty in Cyber Security: New Challenges in Future Vision : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers
Authors: --- --- ---
ISBN: 3031360966 3031360958 Year: 2023 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes papers presented during the workshop session titled “CyberSec4Europe - Research to Innovation: Common Research Framework on Security and Privacy” during the Privacy Symposium hosted by Università Ca’ Foscari in Venice, Italy, in April 2022. The 11 peer-reviewed selected papers present findings, conclusions, research, and recommendations in various security-related areas, from highly technical ones (e.g., software and network security) to law and human-centric ones (e.g., governance and cybersecurity awareness).


Book
The Legal Challenges of the Fourth Industrial Revolution : The European Union's Digital Strategy
Authors: --- ---
ISBN: 3031405161 3031405153 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book explores the concept of a fourth industrial revolution as an expression of the current technological, economic, and social changes sparked by the growing interconnectivity and intelligent automation that have emerged in the 21st century. It seeks to identify and explain the legal challenges posed by this phenomenon in four main areas: content, economy, security, and people. Part I, Content, considers e.g. the problems posed by new uses of protected works in the digital environment, and the new rules on liability for intermediary services contained in the Digital Services Act. Part II, Economy, is particularly concerned with the regulation of Big Tech in the EU’s Digital Markets Act, ecommerce and EU consumers’ rights, the taxation of online platforms, and digital advertising. Part III, Security, addresses the European Union Strategy for Cybersecurity, the use of biometric data systems and facial recognition technologies for law enforcement purposes, and the security implications of the Proposal for an EU Regulation on Artificial Intelligence, as well as the challenges entailed by the European Union’s positioning itself as a major cyber defence actor. Part IV, People, discusses the Data Protection Litigation System under the GDPR, the right to disconnect from work, the proposed EU Catalogue of Fundamental Digital Rights, the countering of terrorist propaganda online through the TERREG and the DSA, and AI and Fundamental Rights.


Book
Toward a Conceptual Network for the Private Law of Artificial Intelligence
Authors: ---
ISBN: 3031194470 3031194462 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a set of proposals for the new conceptual network required in order to establish civil law rules for a world permeated by Artificial Intelligence. These proposals are intended by their authors to push the debate on the new civil law forward. In spite of the natural conservatism of jurists, some innovative or even futuristic ideas are called for, also because the future, even this not-so-distant one, is difficult to foresee. Paradoxically, and unlike in the past, this lack of knowledge must not stop us from planning. If it does, humankind may, as some pessimists already claim, lose its chance to win the battle for control of the world. The rise and expansion of Artificial Intelligence and robotics in recent years has highlighted a pressing need to create a suitable legal framework for this new phenomenon. The debate on the subject, although wide-ranging and involving many new legal documents, is still quite general and preliminary in nature, although these preparatory works illustrate the very real need to develop appropriate new civil law arrangements. It is exactly the branch of private law where the necessity of these new rules appears to be the most imperative. Autonomous vehicles, medical robots, and expertise software raise fundamental questions on aspects of civil liability such as culpability; whereas the growth in popularity of automated, intelligent software systems for concluding contracts requires a new approach to many fundamental and deeply rooted elements of contract law, e.g. consciousness, intent, error, deception, interpretation of contracts and good faith. Ruling on these specific matters demands the identification and clarification of certain key points, which shall become the foundation for constructing AI/robot civil law.


Book
Constructive side-channel analysis and secure design : 14th international workshop, COSADE 2023, Munich, Germany, April 3-4, 2023, proceedings
Authors: ---
ISBN: 3031294971 3031294963 Year: 2023 Publisher: Cham, Switzerland : Springer Nature Switzerland AG,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3–4, 2023. The 12 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault-injection analyses and countermeasures; side-channel analyses and countermeasures; attacks on PQC and countermeasure; and analyses and tools.


Book
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers.
Authors: --- --- --- ---
Year: 2023 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.


Book
Human Aspects of Information Security and Assurance : 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings
Authors: ---
ISBN: 3031385306 3031385292 Year: 2023 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, held in Kent, United Kingdom, in July 2023. The 37 full papers presented in this volume were carefully reviewed and selected from 54 submissions. They are organized in the following topical sections: education and training; management, policy and skills; evolving threats and attacks; social-technical factors; and research methods.


Book
HCI for Cybersecurity, Privacy and Trust : 5th International Conference, HCI-CPT 2023, Held As Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings
Author:
ISBN: 3031358228 303135821X Year: 2023 Publisher: Cham, Switzerland : Springer Nature Switzerland AG,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This proceedings, HCI-CPT 2023, constitutes the refereed proceedings of the 5th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings focuses on to user privacy and data protection, trustworthiness and user experience in cybersecurity, multifaceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments. The conference focused on HCI principles, methods and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies.

Keywords

User interfaces (Computer systems). --- Human-computer interaction. --- Coding theory. --- Information theory. --- Computers—Law and legislation. --- Information technology—Law and legislation. --- Computer networks. --- Electronic commerce. --- Software engineering. --- User Interfaces and Human Computer Interaction. --- Coding and Information Theory. --- Legal Aspects of Computing. --- Computer Communication Networks. --- e-Commerce and e-Business. --- Software Engineering. --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Computer software engineering --- Engineering --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Computer security --- Data encryption (Computer science)

Listing 1 - 10 of 10
Sort by