...more
Any law school graduate will tell you that when picking your outline tool you need to pick the best because your outline......more
...more
...more
Written by the Director for the newly created Center for Cyberspace Law & Policy at Case Western Reserve University, the......more
This book investigates the intersection of terrorism, digital technologies and cyberspace....more
Internet intermediaries play a central role in modern commerce and the dissemination of ideas. Although their economic a......more
...more
Every day, corporations are connecting the dots about our personal behavior--silently scrutinizing clues left behind by ......more
...more
A comprehensive, structured, and up-to-date introduction to the law governing the dissemination of information in a comp......more
In an age where lawyers frequently conduct business across wireless networks using smartphones and laptops, how can atto......more
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law - the law ......more
This study examines a key aspect of regulatory policy in the field of data protection, namely the frameworks governing t......more
...more
Most Internet users are familiar with trolling--aggressive, foul-mouthed posts designed to elicit angry responses in a s......more
In this, the third edition of Private International Law and the Internet, Professor Dan Svantesson provides a detailed a......more
...more
This book serves as a health law primer and provides an overview of what telemedicine is. Telemedicine services refer to......more
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law and#8211; ......more
...more
...more
Managing scarcity to serve the public interest is a classic government task. An important way to execute this task is by......more
"The international battle against Internet pirates has been heating up as ebook publishing gains an ever-larger market s......more
Your cell phone provider tracks your location and knows who s with you. Your online and in-store purchasing patterns are......more
Each new print copy includes Navigate 2 Advantage Access that unlocks a complete eBook, Study Center, homework and Asses......more
The free flow of information and services around the world via the Internet constantly creates new issues and problems, ......more
Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organiza......more
Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from th......more
This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions th......more
...more
This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions th......more
Who Is Bob_34? sheds light on the clandestine world of online child pornography and pedophilia. What exactly do we know ......more
...more
"He was the most important scholar of privacy since Louis Brandeis."--Jeffrey Rosen In defining privacy as "the claim of......more
...more
This updated and revised edition from bestselling ABA author and law-firm technology expert John Heckman covers the newl......more
Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows o......more
Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows o......more
...more
...more
...more
...more
...more
Who Is Bob_34? sheds light on the clandestine world of online child pornography and pedophilia. What exactly do we know ......more
...more
Terrorism, cyberbullying, child pornography, hate speech, cybercrime: along with unprecedented advancements in productiv......more
Terrorism, cyberbullying, child pornography, hate speech, cybercrime: along with unprecedented advancements in productiv......more
...more
Years of surveillance-related leaks from US whistleblower Edward Snowden have fueled an international debate on privacy,......more
...more
...more
...more
...more
...more
...more
...more
Internet Governance: Origins, Current Issues, and Future Possibilities provides an introductory, multidisciplinary accou......more
This book investigates the intersection of terrorism, digital technologies and cyberspace. The evolving field of cyber-t......more
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law and#8211; ......more
Your cell phone provider tracks your location and knows who s with you. Your online and in-store purchasing patterns are......more
A groundbreaking study of one of the most crucial yet least understood issues of the twenty-first century: the governanc......more
...more
Featuring specially commissioned chapters from experts in the field of media and communications law, this book provides ......more
Every day, corporations are connecting the dots about our personal behavior--silently scrutinizing clues left behind by ......more
Now in paperback format, this is the first work to examine data privacy laws across Asia, covering all 26 countries and ......more
...more
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law and#8211; ......more
...more
The Internet’s rapid diffusion and digitization of economic activities have led to the emergence of a new breed of crimi......more
Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirement......more
...more
...more
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law and#8211; ......more
This book is addressed to all who are interested in the interplay between Information Technology and law. It constitutes......more
...more
...more
An information and communication technology (ICT) revolution is underway in Africa. New possibilities have been created ......more
...more
This book examines one of the greatest social and legal concerns of the modern age: social networking and the internet. ......more
...more
...more
This book offers an original analysis of private copying and determines its actual scope as an area of end-user freedom.......more