Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2005-2009  (2)
  • 2008  (2)
  • Computer science
  • Computer Science  (1)
  • Political Science  (1)
  • Ethnology
  • Education
Datasource
Material
Language
Years
  • 2005-2009  (2)
Year
Keywords
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    New York, NY : Springer Science+Business Media, LLC
    ISBN: 9780387735788
    Language: English
    Pages: Online-Ressource (digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. Golumbic, Martin Charles, 1948 - Fighting terror online
    RVK:
    Keywords: Computer science ; Criminal Law ; Criminology ; Social Sciences, general ; Computer science ; Criminal Law ; Criminology ; Aufsatzsammlung ; Politische Verfolgung ; Online-Medien ; Politische Verfolgung ; Online-Medien ; Aufsatzsammlung
    Abstract: The unprecedented events that have taken place in recent years have led legislators and governments throughout the world to reconsider and restructure their policies regarding security issues. Today, worldwide attention is being given to a new security threat, in the form of global terrorism. Legal systems are being called upon to provide a response to these threats, in all areas of life, including the online environment. Among its many tools, global terror also uses advanced technological methods. This fact presents a difficult challenge to policymakers. Therefore, we have chosen to focus this book on the issue of formulating appropriate policy at the interface between security and technology, human rights and economic policy. The fundamental issue the tension between security needs and civil rights is not new. A great deal of experience has been amassed in various countries in this regard, and the question that now arises is whether the existing system of principles and laws, developed on the basis of experience gathered in the concrete world, is applicable to the digital environment. This book presents the position that the online environment is a significant and relevant theater of activity in the fight against terror, and will identify the threats, the security needs, and the issues that are unique to this environment. We examine whether the unique characteristics of this environment require new legal solutions, or whether existing solutions are sufficient. Three areas of online activity are identified that require reexamination: security, monitoring, and propaganda. For each of these, we will indicate the issues, examine existing legal arrangements, and offer guidelines for formulating legal policy. There is a demonstrated need to relate to the digital environment as a battlefront, map the new security threats, and thereby hope to provide focus to the pressing discussion on today's legislative and technological agenda.
    Description / Table of Contents: Front Matter; The Balance Between Security and Civil Rights; The Legal Situation: Prevention and Enforcement in the Information Age; The Legal Framework in Israel; Technological Issues; Recommendations: Is There a Need for New Regulations?; Back Matter
    Note: Includes bibliographical references and indexes
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781402066627
    Language: English
    Pages: 1 Online-Ressource (319 Seiten)
    Edition: Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    Series Statement: The International Library of Ethics, Law and Technology 1
    Series Statement: The international library of ethics, law and technology
    RVK:
    Keywords: Computer science ; Information systems ; Computers Law and legislation ; Economics
    Abstract: Aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI)
    Description / Table of Contents: Front Matter; Introduction; The brave new world of ambient intelligence; Dark scenarios; Threats and vulnerabilities; Safeguards; Recommendations for stakeholders; Conclusions; Back Matter;
    Note: Includes bibliographical references (p. 273-286) and index , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...