Law and Technology
In: International Encyclopedia of Digital Communication & Society, 2014
6338208 Ergebnisse
Sortierung:
In: International Encyclopedia of Digital Communication & Society, 2014
SSRN
SSRN
The author will deal with the relationship between law and technology from the viewpoint of technology security standard. One of the relationships can be found in that law has been providing a security level of technology. They have been saying that law would often follow technology. Law is too slow to adapt the changing technology through the advancement of technology. Above all, information technology has an electronic rapidity and a legislation technology has a paper one. There might be a big estrangement between law and technology. However, law must provide a security standard of technology. The standard must be based on a relative security level. The relative level would premise on the ordinary, lawful and ethical use of technology. Most technology has been opened to the public without any technology impact assessment. Technology would have some defect, which the producers have overlooked. As a result, the users might often meet with the accidents caused on the defects. Then law should provide a technology security standard to exclude the defects from the users' viewpoint as secure as possible. The security standard must be reflected on the architecture standard of technology. The architecture standard may be a yardstick whether the creators can evade the responsibility for the accidents. The standard would also premise on the ordinary, lawful and ethical use of technology. The ordinary use means that the users should use normally technology within the extent of the architecture standard. The ethical use means that the users should use technology being conscious of the defects in order to avoid accidents. The relative security level may be the sum of the architecture standard and the ethical use of technology.
BASE
In: in Roger Brownsword, Eloise Scotford & Karen Yeung, eds., Oxford Handbook of the Law and Regulation of Technology (University of Oxford Press, 2017 Forthcoming)
SSRN
Working paper
SSRN
In: Science and public policy: journal of the Science Policy Foundation
ISSN: 1471-5430
In: Bulletin of science, technology & society, Band 30, Heft 1, S. 3-3
ISSN: 1552-4183
Recht und Technologie stellen die Menschheit vor Herausforderungen und Chancen. Dieser internationale Forschungsband widmet sich drei ihrer Säulen: Künstliche Intelligenz, Blockchain und digitale Plattformen. Die Beiträge der Autoren analysieren diese Themen aus unterschiedlichen Perspektiven des öffentlichen und privaten Rechts im deutschen, österreichischen, europäischen, amerikanischen, japanischen und lateinamerikanischen Kontext
In: Pacific affairs, Band 69, Heft 4, S. 561-563
ISSN: 0030-851X
'Law and Technology in the Pacific Community' edited by Philip S. C. Lewis is reviewed.
SSRN
Working paper
In: Routledge studies in conflict, security and technology
"This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general"--
In: Routledge studies in conflict, security and technology
"This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general"--
In: Routledge handbooks
In: Pacific affairs: an international review of Asia and the Pacific, Band 69, Heft 4, S. 561
ISSN: 1715-3379